Deck 2: A Brief History of E-Discovery

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is a term used to describe work done by an attorney to help those that can't afford their services?

A) non gratis
B) per diem
C) exculpatory
D) pro bono
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following happened during the mid-1980's?

A) companies began using mainframes
B) the Internet backbone was developed
C) government made use of the ARPANET
D) the U.S. PATRIOT Act was passed
سؤال
In the EDRM, the collection stage comes before the preservation stage.
سؤال
Which of the following is a law that requires publicly held corporations to maintain e-mail records for five years?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) ANSI X12
سؤال
Which of the following is a service that allowed students to access mainframes remotely but is not secure?

A) Telnet
B) Ethernet
C) HTTP
D) CFAA
سؤال
What does the 1928 Olmstead v. United States case make evident when examining the history of e-discovery?

A) the law can be applied retroactively
B) technology is frequently ahead of the law
C) wiretapping has always required a warrant
D) entrapment is a useful tool in law enforcement
سؤال
What does e-discovery tend to focus on in criminal cases compared to civil cases?

A) digital forensics
B) data organization
C) document requests
D) organic evidence
سؤال
Which act requires patients to be notified when their medical records are shared with third parties?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) METS
سؤال
Which of the following is NOT a typical perspective that affects how people approach e-discovery projects?

A) legal professional
B) e-discovery professional
C) medical professional
D) IT professional
سؤال
Which of the following allows prosecution if the victim and perpetrator are in the same state and allows victims to seek restitution?

A) Computer Fraud and Abuse Act
B) Counterfeit Access Device and Abuse Act
C) Identity Theft Enforcement and Restitution Act
D) U.S. PATRIOT Act
سؤال
Which of the following is NOT a category for metadata in digital documents or books defined by METS?

A) administrative
B) structural map
C) encrypted
D) behavior
سؤال
Which of the following is true about data and metadata?

A) OS metadata is most important in civil cases
B) the content of documents in civil cases is more important than the metadata
C) document metadata is never captured in civil cases
D) OS metadata stores information such as a document's author
سؤال
Which is a rule in FRCrP that is most likely to come into play in a criminal case but not in a civil case?

A) Rule 34: Producing of Documents
B) Rule 36: Duty to Disclose
C) Rule 19: Equal Protection Clause
D) Rule 41: Search and Seizure
سؤال
Which law came into effect in 1986 to address the growing problem of computers being hacked?

A) CADAA
B) U.S. PATRIOT ACT
C) CFAA
D) NIIPA
سؤال
Arthur Andersen was charged with obstruction of justice after destroying documents related to its audit of Enron.
سؤال
Which of the following best describes a "protected computer" as defined by the CFAA?

A) one with passwords installed and a properly configured firewall
B) one kept in a properly secured room
C) one with adequate security controls installed
D) one used by a financial institution for commerce or communication
سؤال
ARPANET was the precursor to the Internet.
سؤال
Prior to the explosion of the Internet, most hackers were employees of the organizations they hacked into.
سؤال
What was developed during the 1970's to make exchanging information electronically easier?

A) EDI
B) VANs
C) ISPs
D) ESI
سؤال
Civil attorneys tend to rely on OS metadata rather than metadata embedded in documents.
سؤال
Match between columns
a method for ensuring that data is managed correctly from the top down
EDRM
a method for ensuring that data is managed correctly from the top down
METS
a method for ensuring that data is managed correctly from the top down
VANs
a method for ensuring that data is managed correctly from the top down
FIRAC
a method for ensuring that data is managed correctly from the top down
IGRM
a method for ensuring that data is managed correctly from the top down
Sarbanes-Oxley Act
a method for ensuring that data is managed correctly from the top down
custodians
a method for ensuring that data is managed correctly from the top down
protected computer
a method for ensuring that data is managed correctly from the top down
computer abuse
a method for ensuring that data is managed correctly from the top down
information governance
سؤال
Match between columns
gaining illegal access to a computer or the information stored on it
EDRM
gaining illegal access to a computer or the information stored on it
METS
gaining illegal access to a computer or the information stored on it
VANs
gaining illegal access to a computer or the information stored on it
FIRAC
gaining illegal access to a computer or the information stored on it
IGRM
gaining illegal access to a computer or the information stored on it
Sarbanes-Oxley Act
gaining illegal access to a computer or the information stored on it
custodians
gaining illegal access to a computer or the information stored on it
protected computer
gaining illegal access to a computer or the information stored on it
computer abuse
gaining illegal access to a computer or the information stored on it
information governance
سؤال
The Computer Fraud and Abuse Act (CFAA) came into effect to address the growing problem of computers being ____________.
سؤال
Match between columns
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
EDRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
METS
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
VANs
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
FIRAC
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
IGRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
Sarbanes-Oxley Act
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
custodians
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
protected computer
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
computer abuse
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
information governance
سؤال
Match between columns
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
EDRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
METS
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
VANs
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
FIRAC
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
IGRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
Sarbanes-Oxley Act
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
custodians
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
protected computer
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
computer abuse
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
information governance
سؤال
Which of the following are NOT among the three main groups addressed by the IGRM model?

A) business users
B) legal department
C) vendors and customers
D) IT support staff
سؤال
The final stage in the EDRM process is ____________.
سؤال
Match between columns
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
EDRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
METS
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
VANs
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
FIRAC
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
IGRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
Sarbanes-Oxley Act
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
custodians
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
protected computer
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
computer abuse
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
information governance
سؤال
Match between columns
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
EDRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
METS
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
VANs
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
FIRAC
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
IGRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
Sarbanes-Oxley Act
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
custodians
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
protected computer
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
computer abuse
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
information governance
سؤال
Which of the following is a method devised for handling an overwhelming amount of electronic evidence that attorneys must deal with?

A) CFAA
B) EDRM
C) HIPAA
D) METS
سؤال
What legal instrument is usually bypassed in civil e-discovery that is required for discovery in criminal cases?

A) document metadata
B) search warrant
C) FRCP rules
D) legal counsel
سؤال
Which of the following is a method for reading and analyzing legal cases?

A) FIRAC
B) EDRM
C) HIPAA
D) IGRM
سؤال
________________ data interchange was created in the mid-1970s to make exchanging digital information easier.
سؤال
Match between columns
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
EDRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
METS
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
VANs
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
FIRAC
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
IGRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
Sarbanes-Oxley Act
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
custodians
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
protected computer
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
computer abuse
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
information governance
سؤال
Which act was passed as a result of corporate scandals such as Enron?

A) Sarbanes-Oxley
B) HIPAA
C) FRCrP
D) Jencks
سؤال
Match between columns
third-party service providers for transferring EDI documents
EDRM
third-party service providers for transferring EDI documents
METS
third-party service providers for transferring EDI documents
VANs
third-party service providers for transferring EDI documents
FIRAC
third-party service providers for transferring EDI documents
IGRM
third-party service providers for transferring EDI documents
Sarbanes-Oxley Act
third-party service providers for transferring EDI documents
custodians
third-party service providers for transferring EDI documents
protected computer
third-party service providers for transferring EDI documents
computer abuse
third-party service providers for transferring EDI documents
information governance
سؤال
Match between columns
the standard used for objects in a digital library
EDRM
the standard used for objects in a digital library
METS
the standard used for objects in a digital library
VANs
the standard used for objects in a digital library
FIRAC
the standard used for objects in a digital library
IGRM
the standard used for objects in a digital library
Sarbanes-Oxley Act
the standard used for objects in a digital library
custodians
the standard used for objects in a digital library
protected computer
the standard used for objects in a digital library
computer abuse
the standard used for objects in a digital library
information governance
سؤال
Match between columns
a model developed as a guideline for handling electronic evidence and culling what's relevant
EDRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
METS
a model developed as a guideline for handling electronic evidence and culling what's relevant
VANs
a model developed as a guideline for handling electronic evidence and culling what's relevant
FIRAC
a model developed as a guideline for handling electronic evidence and culling what's relevant
IGRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
Sarbanes-Oxley Act
a model developed as a guideline for handling electronic evidence and culling what's relevant
custodians
a model developed as a guideline for handling electronic evidence and culling what's relevant
protected computer
a model developed as a guideline for handling electronic evidence and culling what's relevant
computer abuse
a model developed as a guideline for handling electronic evidence and culling what's relevant
information governance
سؤال
The IGRM model reflects the common lack of communication and collaboration in dealing with _______________ management.
سؤال
The Brady doctrine influenced the disclosure of ____________ discovery.
سؤال
What two guidelines must be met for a computer to be classified as a "protected computer?"
سؤال
Describe EDRM and why it was developed. List the 9 stages of EDRM.
سؤال
What are four perspectives that affect how people approach e-discovery projects? Describe each.
سؤال
What is the purpose of the HIPAA law?
سؤال
Explain how corporate civil and criminal cases differ regarding the discovery process and the protection of individual rights.
سؤال
List four of the seven types of computer offenses under Title 18 Section 1030(a) of the CFAA.
سؤال
What is FIRAC? Give an example of how it is used.
سؤال
Why and when did the CFAA come into effect?
سؤال
List and describe three of the five categories for metadata as defined by METS.
سؤال
Describe how Rule 41 of the FRCrP comes into play in criminal cases. How does it relate to the U.S. Constitution?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: A Brief History of E-Discovery
1
Which of the following is a term used to describe work done by an attorney to help those that can't afford their services?

A) non gratis
B) per diem
C) exculpatory
D) pro bono
D
2
Which of the following happened during the mid-1980's?

A) companies began using mainframes
B) the Internet backbone was developed
C) government made use of the ARPANET
D) the U.S. PATRIOT Act was passed
B
3
In the EDRM, the collection stage comes before the preservation stage.
False
4
Which of the following is a law that requires publicly held corporations to maintain e-mail records for five years?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) ANSI X12
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is a service that allowed students to access mainframes remotely but is not secure?

A) Telnet
B) Ethernet
C) HTTP
D) CFAA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What does the 1928 Olmstead v. United States case make evident when examining the history of e-discovery?

A) the law can be applied retroactively
B) technology is frequently ahead of the law
C) wiretapping has always required a warrant
D) entrapment is a useful tool in law enforcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What does e-discovery tend to focus on in criminal cases compared to civil cases?

A) digital forensics
B) data organization
C) document requests
D) organic evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which act requires patients to be notified when their medical records are shared with third parties?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) METS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT a typical perspective that affects how people approach e-discovery projects?

A) legal professional
B) e-discovery professional
C) medical professional
D) IT professional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following allows prosecution if the victim and perpetrator are in the same state and allows victims to seek restitution?

A) Computer Fraud and Abuse Act
B) Counterfeit Access Device and Abuse Act
C) Identity Theft Enforcement and Restitution Act
D) U.S. PATRIOT Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT a category for metadata in digital documents or books defined by METS?

A) administrative
B) structural map
C) encrypted
D) behavior
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is true about data and metadata?

A) OS metadata is most important in civil cases
B) the content of documents in civil cases is more important than the metadata
C) document metadata is never captured in civil cases
D) OS metadata stores information such as a document's author
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which is a rule in FRCrP that is most likely to come into play in a criminal case but not in a civil case?

A) Rule 34: Producing of Documents
B) Rule 36: Duty to Disclose
C) Rule 19: Equal Protection Clause
D) Rule 41: Search and Seizure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which law came into effect in 1986 to address the growing problem of computers being hacked?

A) CADAA
B) U.S. PATRIOT ACT
C) CFAA
D) NIIPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Arthur Andersen was charged with obstruction of justice after destroying documents related to its audit of Enron.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following best describes a "protected computer" as defined by the CFAA?

A) one with passwords installed and a properly configured firewall
B) one kept in a properly secured room
C) one with adequate security controls installed
D) one used by a financial institution for commerce or communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
ARPANET was the precursor to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Prior to the explosion of the Internet, most hackers were employees of the organizations they hacked into.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What was developed during the 1970's to make exchanging information electronically easier?

A) EDI
B) VANs
C) ISPs
D) ESI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Civil attorneys tend to rely on OS metadata rather than metadata embedded in documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
a method for ensuring that data is managed correctly from the top down
EDRM
a method for ensuring that data is managed correctly from the top down
METS
a method for ensuring that data is managed correctly from the top down
VANs
a method for ensuring that data is managed correctly from the top down
FIRAC
a method for ensuring that data is managed correctly from the top down
IGRM
a method for ensuring that data is managed correctly from the top down
Sarbanes-Oxley Act
a method for ensuring that data is managed correctly from the top down
custodians
a method for ensuring that data is managed correctly from the top down
protected computer
a method for ensuring that data is managed correctly from the top down
computer abuse
a method for ensuring that data is managed correctly from the top down
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
gaining illegal access to a computer or the information stored on it
EDRM
gaining illegal access to a computer or the information stored on it
METS
gaining illegal access to a computer or the information stored on it
VANs
gaining illegal access to a computer or the information stored on it
FIRAC
gaining illegal access to a computer or the information stored on it
IGRM
gaining illegal access to a computer or the information stored on it
Sarbanes-Oxley Act
gaining illegal access to a computer or the information stored on it
custodians
gaining illegal access to a computer or the information stored on it
protected computer
gaining illegal access to a computer or the information stored on it
computer abuse
gaining illegal access to a computer or the information stored on it
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Computer Fraud and Abuse Act (CFAA) came into effect to address the growing problem of computers being ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match between columns
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
EDRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
METS
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
VANs
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
FIRAC
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
IGRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
Sarbanes-Oxley Act
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
custodians
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
protected computer
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
computer abuse
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match between columns
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
EDRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
METS
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
VANs
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
FIRAC
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
IGRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
Sarbanes-Oxley Act
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
custodians
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
protected computer
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
computer abuse
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following are NOT among the three main groups addressed by the IGRM model?

A) business users
B) legal department
C) vendors and customers
D) IT support staff
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
The final stage in the EDRM process is ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match between columns
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
EDRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
METS
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
VANs
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
FIRAC
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
IGRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
Sarbanes-Oxley Act
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
custodians
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
protected computer
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
computer abuse
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match between columns
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
EDRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
METS
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
VANs
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
FIRAC
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
IGRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
Sarbanes-Oxley Act
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
custodians
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
protected computer
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
computer abuse
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is a method devised for handling an overwhelming amount of electronic evidence that attorneys must deal with?

A) CFAA
B) EDRM
C) HIPAA
D) METS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
What legal instrument is usually bypassed in civil e-discovery that is required for discovery in criminal cases?

A) document metadata
B) search warrant
C) FRCP rules
D) legal counsel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is a method for reading and analyzing legal cases?

A) FIRAC
B) EDRM
C) HIPAA
D) IGRM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
________________ data interchange was created in the mid-1970s to make exchanging digital information easier.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match between columns
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
EDRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
METS
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
VANs
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
FIRAC
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
IGRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
Sarbanes-Oxley Act
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
custodians
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
protected computer
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
computer abuse
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which act was passed as a result of corporate scandals such as Enron?

A) Sarbanes-Oxley
B) HIPAA
C) FRCrP
D) Jencks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match between columns
third-party service providers for transferring EDI documents
EDRM
third-party service providers for transferring EDI documents
METS
third-party service providers for transferring EDI documents
VANs
third-party service providers for transferring EDI documents
FIRAC
third-party service providers for transferring EDI documents
IGRM
third-party service providers for transferring EDI documents
Sarbanes-Oxley Act
third-party service providers for transferring EDI documents
custodians
third-party service providers for transferring EDI documents
protected computer
third-party service providers for transferring EDI documents
computer abuse
third-party service providers for transferring EDI documents
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match between columns
the standard used for objects in a digital library
EDRM
the standard used for objects in a digital library
METS
the standard used for objects in a digital library
VANs
the standard used for objects in a digital library
FIRAC
the standard used for objects in a digital library
IGRM
the standard used for objects in a digital library
Sarbanes-Oxley Act
the standard used for objects in a digital library
custodians
the standard used for objects in a digital library
protected computer
the standard used for objects in a digital library
computer abuse
the standard used for objects in a digital library
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match between columns
a model developed as a guideline for handling electronic evidence and culling what's relevant
EDRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
METS
a model developed as a guideline for handling electronic evidence and culling what's relevant
VANs
a model developed as a guideline for handling electronic evidence and culling what's relevant
FIRAC
a model developed as a guideline for handling electronic evidence and culling what's relevant
IGRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
Sarbanes-Oxley Act
a model developed as a guideline for handling electronic evidence and culling what's relevant
custodians
a model developed as a guideline for handling electronic evidence and culling what's relevant
protected computer
a model developed as a guideline for handling electronic evidence and culling what's relevant
computer abuse
a model developed as a guideline for handling electronic evidence and culling what's relevant
information governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
The IGRM model reflects the common lack of communication and collaboration in dealing with _______________ management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
The Brady doctrine influenced the disclosure of ____________ discovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What two guidelines must be met for a computer to be classified as a "protected computer?"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe EDRM and why it was developed. List the 9 stages of EDRM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are four perspectives that affect how people approach e-discovery projects? Describe each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is the purpose of the HIPAA law?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Explain how corporate civil and criminal cases differ regarding the discovery process and the protection of individual rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
List four of the seven types of computer offenses under Title 18 Section 1030(a) of the CFAA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is FIRAC? Give an example of how it is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Why and when did the CFAA come into effect?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
List and describe three of the five categories for metadata as defined by METS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe how Rule 41 of the FRCrP comes into play in criminal cases. How does it relate to the U.S. Constitution?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.