Deck 2: A Brief History of E-Discovery

Full screen (f)
exit full mode
Question
Which of the following is a term used to describe work done by an attorney to help those that can't afford their services?

A) non gratis
B) per diem
C) exculpatory
D) pro bono
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following happened during the mid-1980's?

A) companies began using mainframes
B) the Internet backbone was developed
C) government made use of the ARPANET
D) the U.S. PATRIOT Act was passed
Question
In the EDRM, the collection stage comes before the preservation stage.
Question
Which of the following is a law that requires publicly held corporations to maintain e-mail records for five years?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) ANSI X12
Question
Which of the following is a service that allowed students to access mainframes remotely but is not secure?

A) Telnet
B) Ethernet
C) HTTP
D) CFAA
Question
What does the 1928 Olmstead v. United States case make evident when examining the history of e-discovery?

A) the law can be applied retroactively
B) technology is frequently ahead of the law
C) wiretapping has always required a warrant
D) entrapment is a useful tool in law enforcement
Question
What does e-discovery tend to focus on in criminal cases compared to civil cases?

A) digital forensics
B) data organization
C) document requests
D) organic evidence
Question
Which act requires patients to be notified when their medical records are shared with third parties?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) METS
Question
Which of the following is NOT a typical perspective that affects how people approach e-discovery projects?

A) legal professional
B) e-discovery professional
C) medical professional
D) IT professional
Question
Which of the following allows prosecution if the victim and perpetrator are in the same state and allows victims to seek restitution?

A) Computer Fraud and Abuse Act
B) Counterfeit Access Device and Abuse Act
C) Identity Theft Enforcement and Restitution Act
D) U.S. PATRIOT Act
Question
Which of the following is NOT a category for metadata in digital documents or books defined by METS?

A) administrative
B) structural map
C) encrypted
D) behavior
Question
Which of the following is true about data and metadata?

A) OS metadata is most important in civil cases
B) the content of documents in civil cases is more important than the metadata
C) document metadata is never captured in civil cases
D) OS metadata stores information such as a document's author
Question
Which is a rule in FRCrP that is most likely to come into play in a criminal case but not in a civil case?

A) Rule 34: Producing of Documents
B) Rule 36: Duty to Disclose
C) Rule 19: Equal Protection Clause
D) Rule 41: Search and Seizure
Question
Which law came into effect in 1986 to address the growing problem of computers being hacked?

A) CADAA
B) U.S. PATRIOT ACT
C) CFAA
D) NIIPA
Question
Arthur Andersen was charged with obstruction of justice after destroying documents related to its audit of Enron.
Question
Which of the following best describes a "protected computer" as defined by the CFAA?

A) one with passwords installed and a properly configured firewall
B) one kept in a properly secured room
C) one with adequate security controls installed
D) one used by a financial institution for commerce or communication
Question
ARPANET was the precursor to the Internet.
Question
Prior to the explosion of the Internet, most hackers were employees of the organizations they hacked into.
Question
What was developed during the 1970's to make exchanging information electronically easier?

A) EDI
B) VANs
C) ISPs
D) ESI
Question
Civil attorneys tend to rely on OS metadata rather than metadata embedded in documents.
Question
Match between columns
a method for ensuring that data is managed correctly from the top down
EDRM
a method for ensuring that data is managed correctly from the top down
METS
a method for ensuring that data is managed correctly from the top down
VANs
a method for ensuring that data is managed correctly from the top down
FIRAC
a method for ensuring that data is managed correctly from the top down
IGRM
a method for ensuring that data is managed correctly from the top down
Sarbanes-Oxley Act
a method for ensuring that data is managed correctly from the top down
custodians
a method for ensuring that data is managed correctly from the top down
protected computer
a method for ensuring that data is managed correctly from the top down
computer abuse
a method for ensuring that data is managed correctly from the top down
information governance
Question
Match between columns
gaining illegal access to a computer or the information stored on it
EDRM
gaining illegal access to a computer or the information stored on it
METS
gaining illegal access to a computer or the information stored on it
VANs
gaining illegal access to a computer or the information stored on it
FIRAC
gaining illegal access to a computer or the information stored on it
IGRM
gaining illegal access to a computer or the information stored on it
Sarbanes-Oxley Act
gaining illegal access to a computer or the information stored on it
custodians
gaining illegal access to a computer or the information stored on it
protected computer
gaining illegal access to a computer or the information stored on it
computer abuse
gaining illegal access to a computer or the information stored on it
information governance
Question
The Computer Fraud and Abuse Act (CFAA) came into effect to address the growing problem of computers being ____________.
Question
Match between columns
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
EDRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
METS
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
VANs
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
FIRAC
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
IGRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
Sarbanes-Oxley Act
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
custodians
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
protected computer
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
computer abuse
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
information governance
Question
Match between columns
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
EDRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
METS
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
VANs
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
FIRAC
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
IGRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
Sarbanes-Oxley Act
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
custodians
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
protected computer
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
computer abuse
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
information governance
Question
Which of the following are NOT among the three main groups addressed by the IGRM model?

A) business users
B) legal department
C) vendors and customers
D) IT support staff
Question
The final stage in the EDRM process is ____________.
Question
Match between columns
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
EDRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
METS
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
VANs
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
FIRAC
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
IGRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
Sarbanes-Oxley Act
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
custodians
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
protected computer
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
computer abuse
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
information governance
Question
Match between columns
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
EDRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
METS
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
VANs
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
FIRAC
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
IGRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
Sarbanes-Oxley Act
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
custodians
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
protected computer
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
computer abuse
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
information governance
Question
Which of the following is a method devised for handling an overwhelming amount of electronic evidence that attorneys must deal with?

A) CFAA
B) EDRM
C) HIPAA
D) METS
Question
What legal instrument is usually bypassed in civil e-discovery that is required for discovery in criminal cases?

A) document metadata
B) search warrant
C) FRCP rules
D) legal counsel
Question
Which of the following is a method for reading and analyzing legal cases?

A) FIRAC
B) EDRM
C) HIPAA
D) IGRM
Question
________________ data interchange was created in the mid-1970s to make exchanging digital information easier.
Question
Match between columns
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
EDRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
METS
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
VANs
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
FIRAC
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
IGRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
Sarbanes-Oxley Act
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
custodians
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
protected computer
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
computer abuse
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
information governance
Question
Which act was passed as a result of corporate scandals such as Enron?

A) Sarbanes-Oxley
B) HIPAA
C) FRCrP
D) Jencks
Question
Match between columns
third-party service providers for transferring EDI documents
EDRM
third-party service providers for transferring EDI documents
METS
third-party service providers for transferring EDI documents
VANs
third-party service providers for transferring EDI documents
FIRAC
third-party service providers for transferring EDI documents
IGRM
third-party service providers for transferring EDI documents
Sarbanes-Oxley Act
third-party service providers for transferring EDI documents
custodians
third-party service providers for transferring EDI documents
protected computer
third-party service providers for transferring EDI documents
computer abuse
third-party service providers for transferring EDI documents
information governance
Question
Match between columns
the standard used for objects in a digital library
EDRM
the standard used for objects in a digital library
METS
the standard used for objects in a digital library
VANs
the standard used for objects in a digital library
FIRAC
the standard used for objects in a digital library
IGRM
the standard used for objects in a digital library
Sarbanes-Oxley Act
the standard used for objects in a digital library
custodians
the standard used for objects in a digital library
protected computer
the standard used for objects in a digital library
computer abuse
the standard used for objects in a digital library
information governance
Question
Match between columns
a model developed as a guideline for handling electronic evidence and culling what's relevant
EDRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
METS
a model developed as a guideline for handling electronic evidence and culling what's relevant
VANs
a model developed as a guideline for handling electronic evidence and culling what's relevant
FIRAC
a model developed as a guideline for handling electronic evidence and culling what's relevant
IGRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
Sarbanes-Oxley Act
a model developed as a guideline for handling electronic evidence and culling what's relevant
custodians
a model developed as a guideline for handling electronic evidence and culling what's relevant
protected computer
a model developed as a guideline for handling electronic evidence and culling what's relevant
computer abuse
a model developed as a guideline for handling electronic evidence and culling what's relevant
information governance
Question
The IGRM model reflects the common lack of communication and collaboration in dealing with _______________ management.
Question
The Brady doctrine influenced the disclosure of ____________ discovery.
Question
What two guidelines must be met for a computer to be classified as a "protected computer?"
Question
Describe EDRM and why it was developed. List the 9 stages of EDRM.
Question
What are four perspectives that affect how people approach e-discovery projects? Describe each.
Question
What is the purpose of the HIPAA law?
Question
Explain how corporate civil and criminal cases differ regarding the discovery process and the protection of individual rights.
Question
List four of the seven types of computer offenses under Title 18 Section 1030(a) of the CFAA.
Question
What is FIRAC? Give an example of how it is used.
Question
Why and when did the CFAA come into effect?
Question
List and describe three of the five categories for metadata as defined by METS.
Question
Describe how Rule 41 of the FRCrP comes into play in criminal cases. How does it relate to the U.S. Constitution?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: A Brief History of E-Discovery
1
Which of the following is a term used to describe work done by an attorney to help those that can't afford their services?

A) non gratis
B) per diem
C) exculpatory
D) pro bono
D
2
Which of the following happened during the mid-1980's?

A) companies began using mainframes
B) the Internet backbone was developed
C) government made use of the ARPANET
D) the U.S. PATRIOT Act was passed
B
3
In the EDRM, the collection stage comes before the preservation stage.
False
4
Which of the following is a law that requires publicly held corporations to maintain e-mail records for five years?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) ANSI X12
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a service that allowed students to access mainframes remotely but is not secure?

A) Telnet
B) Ethernet
C) HTTP
D) CFAA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What does the 1928 Olmstead v. United States case make evident when examining the history of e-discovery?

A) the law can be applied retroactively
B) technology is frequently ahead of the law
C) wiretapping has always required a warrant
D) entrapment is a useful tool in law enforcement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What does e-discovery tend to focus on in criminal cases compared to civil cases?

A) digital forensics
B) data organization
C) document requests
D) organic evidence
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which act requires patients to be notified when their medical records are shared with third parties?

A) HIPAA
B) Sarbanes-Oxley
C) UN/EDIFACT
D) METS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a typical perspective that affects how people approach e-discovery projects?

A) legal professional
B) e-discovery professional
C) medical professional
D) IT professional
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following allows prosecution if the victim and perpetrator are in the same state and allows victims to seek restitution?

A) Computer Fraud and Abuse Act
B) Counterfeit Access Device and Abuse Act
C) Identity Theft Enforcement and Restitution Act
D) U.S. PATRIOT Act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT a category for metadata in digital documents or books defined by METS?

A) administrative
B) structural map
C) encrypted
D) behavior
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is true about data and metadata?

A) OS metadata is most important in civil cases
B) the content of documents in civil cases is more important than the metadata
C) document metadata is never captured in civil cases
D) OS metadata stores information such as a document's author
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which is a rule in FRCrP that is most likely to come into play in a criminal case but not in a civil case?

A) Rule 34: Producing of Documents
B) Rule 36: Duty to Disclose
C) Rule 19: Equal Protection Clause
D) Rule 41: Search and Seizure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which law came into effect in 1986 to address the growing problem of computers being hacked?

A) CADAA
B) U.S. PATRIOT ACT
C) CFAA
D) NIIPA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Arthur Andersen was charged with obstruction of justice after destroying documents related to its audit of Enron.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following best describes a "protected computer" as defined by the CFAA?

A) one with passwords installed and a properly configured firewall
B) one kept in a properly secured room
C) one with adequate security controls installed
D) one used by a financial institution for commerce or communication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
ARPANET was the precursor to the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Prior to the explosion of the Internet, most hackers were employees of the organizations they hacked into.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What was developed during the 1970's to make exchanging information electronically easier?

A) EDI
B) VANs
C) ISPs
D) ESI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Civil attorneys tend to rely on OS metadata rather than metadata embedded in documents.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
a method for ensuring that data is managed correctly from the top down
EDRM
a method for ensuring that data is managed correctly from the top down
METS
a method for ensuring that data is managed correctly from the top down
VANs
a method for ensuring that data is managed correctly from the top down
FIRAC
a method for ensuring that data is managed correctly from the top down
IGRM
a method for ensuring that data is managed correctly from the top down
Sarbanes-Oxley Act
a method for ensuring that data is managed correctly from the top down
custodians
a method for ensuring that data is managed correctly from the top down
protected computer
a method for ensuring that data is managed correctly from the top down
computer abuse
a method for ensuring that data is managed correctly from the top down
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
gaining illegal access to a computer or the information stored on it
EDRM
gaining illegal access to a computer or the information stored on it
METS
gaining illegal access to a computer or the information stored on it
VANs
gaining illegal access to a computer or the information stored on it
FIRAC
gaining illegal access to a computer or the information stored on it
IGRM
gaining illegal access to a computer or the information stored on it
Sarbanes-Oxley Act
gaining illegal access to a computer or the information stored on it
custodians
gaining illegal access to a computer or the information stored on it
protected computer
gaining illegal access to a computer or the information stored on it
computer abuse
gaining illegal access to a computer or the information stored on it
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The Computer Fraud and Abuse Act (CFAA) came into effect to address the growing problem of computers being ____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match between columns
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
EDRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
METS
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
VANs
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
FIRAC
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
IGRM
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
Sarbanes-Oxley Act
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
custodians
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
protected computer
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
computer abuse
a computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
EDRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
METS
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
VANs
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
FIRAC
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
IGRM
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
Sarbanes-Oxley Act
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
custodians
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
protected computer
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
computer abuse
people in an organization with the responsibility of granting access to data or e-mail and protecting the organization's assets
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following are NOT among the three main groups addressed by the IGRM model?

A) business users
B) legal department
C) vendors and customers
D) IT support staff
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The final stage in the EDRM process is ____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
EDRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
METS
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
VANs
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
FIRAC
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
IGRM
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
Sarbanes-Oxley Act
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
custodians
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
protected computer
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
computer abuse
a law passed in the wake of the bankruptcies of Enron and WorldCom that requires retaining documentation for up to seven years
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match between columns
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
EDRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
METS
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
VANs
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
FIRAC
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
IGRM
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
Sarbanes-Oxley Act
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
custodians
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
protected computer
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
computer abuse
illustrates the processes of information management and the effects on these processes of communication and collaboration between three groups
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a method devised for handling an overwhelming amount of electronic evidence that attorneys must deal with?

A) CFAA
B) EDRM
C) HIPAA
D) METS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What legal instrument is usually bypassed in civil e-discovery that is required for discovery in criminal cases?

A) document metadata
B) search warrant
C) FRCP rules
D) legal counsel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is a method for reading and analyzing legal cases?

A) FIRAC
B) EDRM
C) HIPAA
D) IGRM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
________________ data interchange was created in the mid-1970s to make exchanging digital information easier.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match between columns
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
EDRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
METS
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
VANs
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
FIRAC
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
IGRM
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
Sarbanes-Oxley Act
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
custodians
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
protected computer
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
computer abuse
a method used to analyze cases; stands for facts, issues, rules and references, analysis, and conclusions
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which act was passed as a result of corporate scandals such as Enron?

A) Sarbanes-Oxley
B) HIPAA
C) FRCrP
D) Jencks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match between columns
third-party service providers for transferring EDI documents
EDRM
third-party service providers for transferring EDI documents
METS
third-party service providers for transferring EDI documents
VANs
third-party service providers for transferring EDI documents
FIRAC
third-party service providers for transferring EDI documents
IGRM
third-party service providers for transferring EDI documents
Sarbanes-Oxley Act
third-party service providers for transferring EDI documents
custodians
third-party service providers for transferring EDI documents
protected computer
third-party service providers for transferring EDI documents
computer abuse
third-party service providers for transferring EDI documents
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match between columns
the standard used for objects in a digital library
EDRM
the standard used for objects in a digital library
METS
the standard used for objects in a digital library
VANs
the standard used for objects in a digital library
FIRAC
the standard used for objects in a digital library
IGRM
the standard used for objects in a digital library
Sarbanes-Oxley Act
the standard used for objects in a digital library
custodians
the standard used for objects in a digital library
protected computer
the standard used for objects in a digital library
computer abuse
the standard used for objects in a digital library
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match between columns
a model developed as a guideline for handling electronic evidence and culling what's relevant
EDRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
METS
a model developed as a guideline for handling electronic evidence and culling what's relevant
VANs
a model developed as a guideline for handling electronic evidence and culling what's relevant
FIRAC
a model developed as a guideline for handling electronic evidence and culling what's relevant
IGRM
a model developed as a guideline for handling electronic evidence and culling what's relevant
Sarbanes-Oxley Act
a model developed as a guideline for handling electronic evidence and culling what's relevant
custodians
a model developed as a guideline for handling electronic evidence and culling what's relevant
protected computer
a model developed as a guideline for handling electronic evidence and culling what's relevant
computer abuse
a model developed as a guideline for handling electronic evidence and culling what's relevant
information governance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The IGRM model reflects the common lack of communication and collaboration in dealing with _______________ management.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The Brady doctrine influenced the disclosure of ____________ discovery.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What two guidelines must be met for a computer to be classified as a "protected computer?"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe EDRM and why it was developed. List the 9 stages of EDRM.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are four perspectives that affect how people approach e-discovery projects? Describe each.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the purpose of the HIPAA law?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain how corporate civil and criminal cases differ regarding the discovery process and the protection of individual rights.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List four of the seven types of computer offenses under Title 18 Section 1030(a) of the CFAA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is FIRAC? Give an example of how it is used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Why and when did the CFAA come into effect?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
List and describe three of the five categories for metadata as defined by METS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe how Rule 41 of the FRCrP comes into play in criminal cases. How does it relate to the U.S. Constitution?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.