Access Data

Displaying 1-3 of 3 results

  • White Papers // Aug 2009

    Divide & Conquer: Overcoming Computer Forensic Backlog Through Distributed Processing and Division of Labor

    Until an organization is able to efficiently leverage existing resources, it will find itself trapped in the vicious cycle of too much work, too few people. Implementing a solution that amplifies existing resources by streamlining the investigative process and getting the most out of an organization's hardware is a permanent...

    Provided By Access Data

  • White Papers // Jul 2009

    The Collection Process: Collecting Evidence Or Collecting Sanctions?

    Documents and other information are central to every legal matter - even for those matters that do not involve litigation. For matters involving litigation (even potential litigation), and extra duty-preservation-is imposed upon the party. Spoliation of evidence, when there is a duty to preserve it, can prompt a court to...

    Provided By Access Data

  • White Papers // Dec 2008

    Using SilentRunner in Compliance With EU Privacy Laws

    As technology has advanced to include the capabilities to monitor networks and view individual transactions on all forms of networks, including the internet, the European Union (EU) and its member countries have become increasingly concerned about the privacy of the individual. The EU has passed directives outlining the guidelines that...

    Provided By Access Data

  • White Papers // Jul 2009

    The Collection Process: Collecting Evidence Or Collecting Sanctions?

    Documents and other information are central to every legal matter - even for those matters that do not involve litigation. For matters involving litigation (even potential litigation), and extra duty-preservation-is imposed upon the party. Spoliation of evidence, when there is a duty to preserve it, can prompt a court to...

    Provided By Access Data

  • White Papers // Aug 2009

    Divide & Conquer: Overcoming Computer Forensic Backlog Through Distributed Processing and Division of Labor

    Until an organization is able to efficiently leverage existing resources, it will find itself trapped in the vicious cycle of too much work, too few people. Implementing a solution that amplifies existing resources by streamlining the investigative process and getting the most out of an organization's hardware is a permanent...

    Provided By Access Data

  • White Papers // Dec 2008

    Using SilentRunner in Compliance With EU Privacy Laws

    As technology has advanced to include the capabilities to monitor networks and view individual transactions on all forms of networks, including the internet, the European Union (EU) and its member countries have become increasingly concerned about the privacy of the individual. The EU has passed directives outlining the guidelines that...

    Provided By Access Data