News

Tips from the trenches in light of the recent Ex-Motorola Software Engineer Prison Sentence. Hanjuan Jin, a Motorola Software Engineer, stepped onto the terminal at O’Hare International Airport a few years ago and stepped into history as one of the...
Your E-Reader may be called as an “electronic witness” [1] The Background The defendant was accused of murdering his wife.  He claimed it was self-defense, that his wife tried to shoot him during a heated argument and he shot her as...
No need to explain complicated patent law to jurors when the ESI is so convincing the iPhone has a “beautiful design”, and “easy to copy” hardware. – internal Samsung report [1] The Background In one of the most significant Intellectual...
Emails Continue to Provide a Rich Source of Relevant Electronic Evidence Not notifying authorities “is a more humane” way to handle the incident – email authored by key player in the Penn State Scandal[1] The Background Over a decade ago, in...
IBM lets employees use iPhones on-site, but bans the use of Siri, Apple’s new voice recognition and processing software, over privacy and data collection fears. http://www.wired.com/wiredenterprise/2012/05/ibm-bans-siri/ The Background Apple’s newest iPhone model comes packaged with groundbreaking voice recognition technology called...
BP engineer criminally charged after allegedly deleting damaging text messages detailing oil spillage in the Gulf from his iPhone. The Background The Fourth Amendment prohibits unreasonable searches and seizures, and searches without a warrant are generally per se unreasonable, barring...
Electronic Discovery Issues Lead Once Again to “The Law of Unintended Consequences” Knowledge is Power. Want more knowledge? Contact Impact for a FREE on-site EDiscovery CLE on how to avoid the Qualcomm pitfalls… Visit us at www.impactforensics.com to download a...
“I’m dead if this leaks. I really am…and my career is over. I’ll be like Martha f…..g Stewart.” –Defendant Danielle Chiesi to an unnamed alleged co-conspirator. The Background The biggest insider-trading ring in a generation is what federal authorities are...
Defendants in Trade Secret Case Try to Trick Court by “Re- Naming” Their Computers Prior to Presenting Them for Computer Forensics Analysis The Background A Fortune 500 technology company filed suit against a Chinese – based competitor and a number...
A Historical Application of the Fourth Amendment in our Information Age The Background The personal use of company – issued hand-held digital devices like BlackBerries and smart phones is wide-spread. Companies and government agencies understand, for the most part, that...