Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Discovery in general is a process that involves time ' a seeking of destination or a particular item. And in legal discovery, and e-discovery especially, the process begins long before the first-level review.
With the arrival of personal computers, decentralized computing, Web-based e-mail, personal storage devices such as USB drives, and a highly mobile, educated and diverse workforce, computers are becoming crime scenes themselves.
And like the painstakingly professional criminalists depicted in the various CSI television shows, computer forensics experts must take care to adequately identify, collect and secure electronic evidence without corrupting (or inadvertently damaging) the source data, and ensure that the collection and processing of the evidence is done without compromise.
With state laws governing the capture and securing of evidence ' including electronic data ' the possibility of spoliation is a genuine concern. Not only could evidence subjected to spoliation be inadmissible, but misdemeanor or felony charges could apply to the collector and the contracting party.
Identifying electronic evidence, much like in a physical crime scene, starts with drawing increasing concentric circles around the victim or perpetrator. Some care must be taken regarding a company's policies and practices. State and federal law on personal property may be involved if the employee used personal devices legally or illegally in combination with the company's assets, and a warrant or commencement of discovery may be required to access personal property or equipment on private property.
Getting on the Trail
The first step in identifying potential sources of evidence starts with the company's assets and procedures. Lawyers and other key players involved should begin by finding out as much about their client's IT infrastructure as possible.
After you see how your client handles data, you will be prepared to ask for, and receive, the data you require.
An on-site visit will prove invaluable. This field trip will serve you well in the case, and will serve you effectively well into the future as you become more familiar with technical terms, technical equipment and the techies (the IT people whose job it is to keep the companies' systems running).
Plan to spend at least a couple of days acquainting yourself with a client's setup and procedures. Use this time to talk with the client's IT people and see for yourself what they do on a daily basis. Sitting in a conference room discussing the client's electronic documents with the chief information officer or the chief legal officer is like looking at an iceberg from afar: you'll get only 10% of the picture. You need to literally get down to the job, and to get down and dirty. For instance, going to the server rooms and asking questions ' lots of questions ' will allow you to help your client identify, locate, secure and produce e-docs, while allowing you to 'smell a rat' when the other side comes back with objections to your document requests. If you have visited an IT operation and asked many, many seemingly 'dumb' questions, then you'll be able to quickly dismiss the same tired objections filed by opposing counsel. The blissfully wed pairs of words unduly burdensome and extraordinarily difficult, and their relatives cost-prohibitive and fishing expedition, can be dealt with in short order because you've seen an IT operation with your own eyes.
Advancing on the Search
Now that a site visit's planned, what's next? What kind of questions can you ask? Who will translate the techie-speak into lawyer-speak?
A certified computer forensics expert will be extremely valuable in these situations. The expert will be able to translate your concerns about spoliation, for instance, to the techies, will be able to translate the technical setup, and explain why certain elements may be important for the case at hand. You shouldn't expect the computer forensics expert to do all the talking, though. After all, it's your case ' you're the lawyer. A sample list of questions the likes of which might serve as a starting point when investigating your client's e-mail system ' and the reasons why they're important ' are provided in the next section of this article. When asking these questions, you'll want to know the reasons the people you're querying chose for making the decisions they did, and whether their procedures are common in the industry.
While the list might seem fundamental and tedious, find a copy of Judge Elizabeth Maas' Adverse Inference Order in Coleman v Morgan Stanley in the 15th Judicial Circuit, Palm Beach County, and you'll see that the questions are worthy of consideration.
Interrogatories
Identify personnel responsible for administering the electronic mail system(s). This is important, because the person doing the mailbox creation for new users might not be the same person performing the backup and restoration process; and you'll want to talk to them all.
Describe all type(s) of e-mail programs in use at the time, and their installation dates. This is important to know because companies sometimes change e-mail programs, which requires data migration to the new system. In large-scale data migrations, occasionally documents are lost or corrupted. If there's a gap in e-mails for a particular custodian, then knowing that a data migration was performed, and when it occurred, could help identify a cause for the gap.
Then, you're ready to ask the following questions.
Moving Forward
Now that you have met with the IT department and spoken to the people performing the tasks, it's time to turn your attention to the PCs that the custodians of interest use daily.
A complete profile of the individual's technical abilities and access to technology, whether via the company or personal resources, must be built and considered. You must determine where the individual's personal computer is, and ask whether that person uses or has access to handhelds such as:
Also, determine whether the following are available:
Questions particular to the ex-employee's conduct include:
Once the identification of potentially discoverable evidence is finished, the collection of the information and permission to gain access must be addressed with care to ensure that spoliation doesn't occur. Leaving the issue of permission to access private property to another discussion, we'll address the collection of e-evidence.
Most states require some professional license for evidence collection, including electronic evidence. Using Texas as an example, data must be secured by a private investigator licensed by the Texas Department of Public Safety to 'secure evidence for use before a court.' Under Texas law, to provide these services, a vendor's staff must maintain private investigator licenses. Vendors collecting electronic evidence, processing it, recovering such evidence or moving it without this licensing are in violation of Texas law, which, in this case, is a Class A misdemeanor for a first offense and a felony for subsequent offenses. These vendors also risk the courts rejecting all the evidence collected. And remember: law firms, corporations and organizations hiring unlicensed vendors are also subject to the law and penalties.
It's also important to note that being licensed and qualified to collect e-evidence may be different things. Some states, through professional courtesy or position, allow CPAs, attorneys, police personnel and others to collect evidence ' whether qualified or not. Spoliation can occur in procedure and process. The legal license to collect evidence must be combined with the professional credentials to secure and process the data.
Scoping Out Vendors and Beyond
When selecting vendors, one should ensure that the vendors targeted have certified and qualified staff that might include licensed private investigators (or the equivalent) and certified computer examiners (CCEs). Certified computer examiners are trained to forensically secure data, forensically copy data, adhere to rigorous procedures and implement a chain of custody to avoid spoliation, and possibly recover data that might be hidden, corrupted or deleted. And a properly qualified external vendor can be called as an expert witness.
Once the private investigator collects and secures the devices, the chain of custody moves to the CCE to further secure, forensically copy, process and recover the data. After the devices are collected, the evidence should then be secured by following specific steps and procedures including:
With the evidence now secure, e-discovery, beginning with the recovery of files, encrypted data, deleted data and evidence in temporary files can begin with confidence that spoliation is not a concern.
Discovery in general is a process that involves time ' a seeking of destination or a particular item. And in legal discovery, and e-discovery especially, the process begins long before the first-level review.
With the arrival of personal computers, decentralized computing, Web-based e-mail, personal storage devices such as USB drives, and a highly mobile, educated and diverse workforce, computers are becoming crime scenes themselves.
And like the painstakingly professional criminalists depicted in the various CSI television shows, computer forensics experts must take care to adequately identify, collect and secure electronic evidence without corrupting (or inadvertently damaging) the source data, and ensure that the collection and processing of the evidence is done without compromise.
With state laws governing the capture and securing of evidence ' including electronic data ' the possibility of spoliation is a genuine concern. Not only could evidence subjected to spoliation be inadmissible, but misdemeanor or felony charges could apply to the collector and the contracting party.
Identifying electronic evidence, much like in a physical crime scene, starts with drawing increasing concentric circles around the victim or perpetrator. Some care must be taken regarding a company's policies and practices. State and federal law on personal property may be involved if the employee used personal devices legally or illegally in combination with the company's assets, and a warrant or commencement of discovery may be required to access personal property or equipment on private property.
Getting on the Trail
The first step in identifying potential sources of evidence starts with the company's assets and procedures. Lawyers and other key players involved should begin by finding out as much about their client's IT infrastructure as possible.
After you see how your client handles data, you will be prepared to ask for, and receive, the data you require.
An on-site visit will prove invaluable. This field trip will serve you well in the case, and will serve you effectively well into the future as you become more familiar with technical terms, technical equipment and the techies (the IT people whose job it is to keep the companies' systems running).
Plan to spend at least a couple of days acquainting yourself with a client's setup and procedures. Use this time to talk with the client's IT people and see for yourself what they do on a daily basis. Sitting in a conference room discussing the client's electronic documents with the chief information officer or the chief legal officer is like looking at an iceberg from afar: you'll get only 10% of the picture. You need to literally get down to the job, and to get down and dirty. For instance, going to the server rooms and asking questions ' lots of questions ' will allow you to help your client identify, locate, secure and produce e-docs, while allowing you to 'smell a rat' when the other side comes back with objections to your document requests. If you have visited an IT operation and asked many, many seemingly 'dumb' questions, then you'll be able to quickly dismiss the same tired objections filed by opposing counsel. The blissfully wed pairs of words unduly burdensome and extraordinarily difficult, and their relatives cost-prohibitive and fishing expedition, can be dealt with in short order because you've seen an IT operation with your own eyes.
Advancing on the Search
Now that a site visit's planned, what's next? What kind of questions can you ask? Who will translate the techie-speak into lawyer-speak?
A certified computer forensics expert will be extremely valuable in these situations. The expert will be able to translate your concerns about spoliation, for instance, to the techies, will be able to translate the technical setup, and explain why certain elements may be important for the case at hand. You shouldn't expect the computer forensics expert to do all the talking, though. After all, it's your case ' you're the lawyer. A sample list of questions the likes of which might serve as a starting point when investigating your client's e-mail system ' and the reasons why they're important ' are provided in the next section of this article. When asking these questions, you'll want to know the reasons the people you're querying chose for making the decisions they did, and whether their procedures are common in the industry.
While the list might seem fundamental and tedious, find a copy of Judge Elizabeth Maas' Adverse Inference Order in Coleman v
Interrogatories
Identify personnel responsible for administering the electronic mail system(s). This is important, because the person doing the mailbox creation for new users might not be the same person performing the backup and restoration process; and you'll want to talk to them all.
Describe all type(s) of e-mail programs in use at the time, and their installation dates. This is important to know because companies sometimes change e-mail programs, which requires data migration to the new system. In large-scale data migrations, occasionally documents are lost or corrupted. If there's a gap in e-mails for a particular custodian, then knowing that a data migration was performed, and when it occurred, could help identify a cause for the gap.
Then, you're ready to ask the following questions.
Moving Forward
Now that you have met with the IT department and spoken to the people performing the tasks, it's time to turn your attention to the PCs that the custodians of interest use daily.
A complete profile of the individual's technical abilities and access to technology, whether via the company or personal resources, must be built and considered. You must determine where the individual's personal computer is, and ask whether that person uses or has access to handhelds such as:
Also, determine whether the following are available:
Questions particular to the ex-employee's conduct include:
Once the identification of potentially discoverable evidence is finished, the collection of the information and permission to gain access must be addressed with care to ensure that spoliation doesn't occur. Leaving the issue of permission to access private property to another discussion, we'll address the collection of e-evidence.
Most states require some professional license for evidence collection, including electronic evidence. Using Texas as an example, data must be secured by a private investigator licensed by the Texas Department of Public Safety to 'secure evidence for use before a court.' Under Texas law, to provide these services, a vendor's staff must maintain private investigator licenses. Vendors collecting electronic evidence, processing it, recovering such evidence or moving it without this licensing are in violation of Texas law, which, in this case, is a Class A misdemeanor for a first offense and a felony for subsequent offenses. These vendors also risk the courts rejecting all the evidence collected. And remember: law firms, corporations and organizations hiring unlicensed vendors are also subject to the law and penalties.
It's also important to note that being licensed and qualified to collect e-evidence may be different things. Some states, through professional courtesy or position, allow CPAs, attorneys, police personnel and others to collect evidence ' whether qualified or not. Spoliation can occur in procedure and process. The legal license to collect evidence must be combined with the professional credentials to secure and process the data.
Scoping Out Vendors and Beyond
When selecting vendors, one should ensure that the vendors targeted have certified and qualified staff that might include licensed private investigators (or the equivalent) and certified computer examiners (CCEs). Certified computer examiners are trained to forensically secure data, forensically copy data, adhere to rigorous procedures and implement a chain of custody to avoid spoliation, and possibly recover data that might be hidden, corrupted or deleted. And a properly qualified external vendor can be called as an expert witness.
Once the private investigator collects and secures the devices, the chain of custody moves to the CCE to further secure, forensically copy, process and recover the data. After the devices are collected, the evidence should then be secured by following specific steps and procedures including:
With the evidence now secure, e-discovery, beginning with the recovery of files, encrypted data, deleted data and evidence in temporary files can begin with confidence that spoliation is not a concern.
A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.
In a recent decision, the U.S. Court of Appeals for the Ninth Circuit addressed the issue of whether purchasing market competitors’ search engine keyword terms, known as “conquesting,” constitutes trademark infringement.
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.
The legal industry is at an inflection point, grappling with challenges that range from rising client demands to technological disruption. There are five critical areas where firms can take a proactive, strategic approach, including actionable insights and recommendations for navigating 2025 and beyond.
The Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.