Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka Jan 2006

Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …


Arkansas's Public Records Retention Program: Records Retention As A Cornerstone Of Citizenship And Self-Government, Richard J. Peltz-Steele Jan 2006

Arkansas's Public Records Retention Program: Records Retention As A Cornerstone Of Citizenship And Self-Government, Richard J. Peltz-Steele

Faculty Publications

This article first provides background, charting the scope of record retention in relation to the freedom of information, then outlining record retention through its history and development in the federal government, through its general principles and modes of practice, through a sketch of the problems that have arisen specially in the electronic era, and through an overview of its development at the state level. The article then describes the recent history of record retention law in Arkansas, up to and including the initiative enacted by the General Assembly in 2005, and the process and product of a state working group …


Reining In The Data Traders: A Tort For The Misuse Of Personal Information, Sarah Ludington Jan 2006

Reining In The Data Traders: A Tort For The Misuse Of Personal Information, Sarah Ludington

Faculty Scholarship

In 2005, three spectacular data security breaches focused public attention on the vast databases of personal information held by data traders such as ChoicePoint and LexisNexis, and the vulnerability of that data. The personal information of hundreds of thousands of people had either been hacked or sold to identity thieves, yet the data traders refused to reveal to those people the specifics of the information sold or stolen. While Congress and many state legislatures swiftly introduced bills to force data traders to be more accountable to their data subjects, fewer states actually enacted laws, and none of the federal bills …