Related By Tag: data recovery

What Are the Chances of Recovering Deleted Data?

Forensicon’s president Lee Neubecker describes factors that impact the potential for recovering deleted data.  Key factors such as the size and type of media, as well as the percentage of used versus free space available on the hard drive are discussed.  Other factors impacting the prospects for recovery include the level of usage of the[…Read More]

7th Circuit Proposes New Standing Orders for ESI

Beginning October 1st, 2009, the Seventh Circuit Electronic Discovery Pilot Program entered it’s Phase One Implementation and Evaluation period. During the seven months from now until May 1st, 2010, individual Seventh Circuit judges have agreed to adopt new principles concerning the discovery of electronically stored information (ESI) and implement them in select cases. “The Principles”[…Read More]

Implementing Security Measures at the OS Level

After SoBig and Blaster worms inundated computer systems worldwide, targeting vulnerabilities in the Microsoft systems, Microsoft started to make security one of its priorities. The demand to heighten security at the application level makes sense, as about 90 percent of desktops run Microsoft – meaning if there was a large-scaled cyber attack against this global[…Read More]

One in 10 Secondhand Hard Drives Contain Data

Recent research performed for Britain’s Information Commissioner’s Office (ICO) by NCC Group found that 11 percent of secondhand drives contain data from the original owner that is recoverable. The lack of data wiping isn’t always the end user’s fault. Often times customers send old hard drives in to computer manufacturers and trust that their personal[…Read More]

CE Design Ltd. v. Cy’s Crabhouse North, Inc.

Court Orders Supplelemtal Expert Report on New Hard Drive Evidence 2010 U. S. Dist. LEXIS 59000 (N.D. Ill. June 11, 2010) In a case involving an alleged violation of the Telephone Consumer Protection Act (TCPA) due to the use of an automated fax advertisement service, the Northern District of Illinois ordered the defendant’s computer expert[…Read More]

Pinstripe, Inc. v. Manpower, Inc.

On Oct. 25th, 2007, Pinstripe filed suit against Manpower, Inc. and IBM for breach of contract. Attorneys for Manpower immediately drafted a litigation hold, but in January 2009, in-house counsel the company had failed to issue the hold. Further investigation revealed that two employees may have deleted pertinent email data. Forensicon was hired to conduct[…Read More]

YCA, LLC v. Berry

Party’s Inconsistent Testimony Justifies Delayed Disclosure Of Computer Forensic Expert 2004 WL 1093385 (N.D. Ill. 2004) In a case involving an alleged breach of a restrictive covenant, the defendant moved to strike the testimony of a computer expert who recovered deleted documents from the defendant’s computer. The defendant argued that allowing the expert’s testimony would[…Read More]

The Liability of Email as Evidence

What You Don’t Know May Hurt You – Email Evidence You can shred paper documents, but electronic files, including email, live on. And don’t think that deleting them, or even emptying your recycle bin, is going to get rid of them. Out of sight may mean out of mind for most computer users, but the[…Read More]

Track Former Employee’s Computer Activities

(The following is a theoretical scenario staged to help the reader understand the essential role that a computer forensic expert plays in tracing the theft of intellectual property.) An employee (Jane Doe) preparing to leave ACME for a competitor, NEWCO, wanted to make sure that she could take all of her clients with her to[…Read More]

Bryant, et al v. Chicago Public Schools, et al.

Forensicon was jointly retained by Plaintiff and Defendants. Defendant Gardner submitted a printed copy of a letter dated September 28, 2007 purportedly containing information in opposition to one or more of Plaintiff’s. Defendant Gardner also submitted a sworn declaration under penalty of perjury. Forensicon created and analyzed a forensic image of Gardner’s laptop computer and[…Read More]