Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Court Reminds Party Of Its Power to
Appoint Computer Forensics Exam
In a discovery dispute, the plaintiff filed an emergency motion with the court to clarify its discovery order concerning the defendants' production of documents. The plaintiff anticipated less than adequate discovery responses from the defendants in responding to the court's order. The plaintiff also expressed concern that the defendants not be permitted to simply produce an unorganized body of electronic or paper records that the plaintiff would then be required to search through to locate documents responsive to particular requests. The defendants claimed that they didn't have to produce the electronic data because during the plaintiff's original seizure of documents, several hard drives and servers belonging to the defendants were damaged, and many documents were lost. The court did not find the defendants' arguments credible; instead, the court noted that the defendants had not produced any evidence to show that the hard drives were damaged and that no information could be gleaned from the drives. The court also cautioned that it could order a computer-forensics examination of the alleged damaged drives to determine whether the defendants were truthful and to establish whether any discoverable information was retrievable. The court also warned that the costs of the examination and sanctions could be imposed on either party, depending on what the investigation revealed. Koninklijke Philips Elec. N.V. v. KXD Tech., Inc., 2007 WL 879683 (D. Nev. Mar. 20, 2007).
Computer Forensics Docket Sheet was written by Michele C.S. Lange, a staff attorney with Kroll Ontrack. Lange has published numerous articles and speaks regularly on the topics of electronic discovery, computer forensics and technology's role in the law. Information in these summaries is taken from the Kroll Ontrack monthly E-Discovery Case Law Update and Computer Forensics newsletters, which may be accessed at http://www.krollontrack.com/. Lange is a member of e-Discovery Law & Strategy's Board of Editors, and can be reached at [email protected].
Court Reminds Party Of Its Power to
Appoint Computer Forensics Exam
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?