News

Defendants in Trade Secret Case Try to Trick Court by “Re- Naming” Their Computers Prior to Presenting Them for Computer Forensics Analysis The Background A Fortune 500 technology company filed suit against a Chinese – based competitor and a number...
A Historical Application of the Fourth Amendment in our Information Age The Background The personal use of company – issued hand-held digital devices like BlackBerries and smart phones is wide-spread. Companies and government agencies understand, for the most part, that...
Cost-Containment Tips You Can Not Afford to Ignore The BackgroundYou are working on a small case, and you have a hunch that Electronically Stored Information (ESI) could be helpful in obtaining a just, speedy, and inexpensive conclusion to the matter....
Electronic Evidence Helps Prosecutors Know the Answers to Questions before they were Asked The Background You remember the story; Detroit’s former “Hip Hop” mayor, Kwame Kilpatrick was convicted of lying under oath and obstruction of justice in 2008 in a...
At the beginning of 2010, six-years after Zubulake V (Legal Hold best practices case), Judge Scheindlin in Pension Comm. of Univer. of Montreal Pension Plan. Banc of Am. Secs., LLC, 2010 WL 184312 (S.D.N.Y. Jan. 15, 2010), in part addresses...
What do half of us do everyday? Log into Facebook. We are more likely to use social media (e.g., Facebook, LinkedIn, YouTube, or Wikipedia) to socialize than have a cup of coffee with a loved one. When people use social...
Computer User Activity Can Help Tell the Story in Many Cases A Case Study in Re-Creating a Computer User’s Actvity The Background The client was a large multi-national technology company with a billion dollar household brand. They had been recently...
Defendant’s on-line postings about his “reckless drunkenness” come back to haunt him The Background A young woman came home on May 25, 2007 and found her 2 year old daughter unconscious. A call is placed to 911, and police arrive...