X hits on this document

Powerpoint document

Cyber Security - the Laws that Govern Incident Response - page 29 / 38

116 views

0 shares

0 downloads

0 comments

29 / 38

3l. Compelling Production of Opened e-Mail and Stored Communications

If a communication is on non-public system and is already read, or if there are other file stored on the non-public system, these are not covered by ECPA

Only a Subpoena is needed to compel production

Document info
Document views116
Page views116
Page last viewedSun Dec 11 06:11:43 UTC 2016
Pages38
Paragraphs396
Words2817

Comments