Part 3: What is the Chain of Custody for Email Discovery?
The chain of custody refers to the order of sequence of control of digital evidence content, including emails handled during an investigation. Proof that they correctly dealt with the evidence is required to prove their legal acceptance at trial in...
Part 2: What is a Retention Policy for Emails?
An effective email retention policy helps manage several risks by retaining email messages for a period aligned with ongoing electronic discovery (eDiscovery) cases and government regulations. According to a 2015 study by the Rand Institute for Civil Justice, complying with...
Part 1: How to Prepare for an E-Discovery Investigation
E-discovery investigations require organizations to be able to archive, retrieve, perform legal holds, and manage following the organization’s retention policy. Early preparation of the e-discovery process can decrease risk and improve your chances of winning your case. It can help...
How Does Email Security Help Auto Dealers Comply with FTC Safeguards Rule?
The FTC Safeguards2s2 Rule requires financial services companies, including National Automobile Dealers Association (NADA) members, to comply with this ruling. The Safeguards2s2 Rule governs the transmitting and storing of sensitive consumer data collected during various financial activities. The new deadline...
What is a SuperMailer Email Phishing Attack?
SuperMailer is a software program for the desktop market that provides email templates for newsletters. Global email security platform providers like Trustifi understand attack vectors like the SuperMailer credential phishing and provide their clients the ability to scale up their...
What is the CPRA
The California Privacy Rights Act (CPRA) amends the California Consumer Privacy Act (CCPA) by strengthening Consumer Privacy Rights and tightening business regulations for personal information use. This article will discuss the details of CPRA and the changes compared to the...