I am in the digital forensics business. That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like: “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover...
Law360, New York (June 19, 2014, 9:59 AM ET) — A real case study: The principal of a Chicago-area school had been accused of engaging in an inappropriate relationship with a student. The student produced a suggestive text message that...
Electronic Discovery Issues Lead Once Again to “The Law of Unintended Consequences” Knowledge is Power. Want more knowledge? Contact Impact for a FREE on-site EDiscovery CLE on how to avoid the Qualcomm pitfalls… Visit us at www.impactforensics.com to download a...
Defendants in Trade Secret Case Try to Trick Court by “Re- Naming” Their Computers Prior to Presenting Them for Computer Forensics Analysis The Background A Fortune 500 technology company filed suit against a Chinese – based competitor and a number...
At the beginning of 2010, six-years after Zubulake V (Legal Hold best practices case), Judge Scheindlin in Pension Comm. of Univer. of Montreal Pension Plan. Banc of Am. Secs., LLC, 2010 WL 184312 (S.D.N.Y. Jan. 15, 2010), in part addresses...
Computer User Activity Can Help Tell the Story in Many Cases A Case Study in Re-Creating a Computer User’s Actvity The Background The client was a large multi-national technology company with a billion dollar household brand. They had been recently...