Related By Tag: forensic imaging

7th Circuit Proposes New Standing Orders for ESI

Beginning October 1st, 2009, the Seventh Circuit Electronic Discovery Pilot Program entered it’s Phase One Implementation and Evaluation period. During the seven months from now until May 1st, 2010, individual Seventh Circuit judges have agreed to adopt new principles concerning the discovery of electronically stored information (ESI) and implement them in select cases. “The Principles”[…Read More]

ADHI Parasakthi v. Township of W. Pikeland

On an appeal from a town Zoning Board, the district court ordered the plaintiff to allow the defendant’s computer expert to inspect its computers for responsive emails not produced in the first round of discovery. The plaintiff sought a variance from the defendant’s zoning regulations in order to build a religious temple on a parcel[…Read More]

Compelling Production of Hard Drives

In today’s heyday of electronic discovery, production of computer-generated documents has become more commonplace than it was just a few short years ago. Most major law firms understand that letters, agreements, reports, statistical and financial data may exist electronically, and they are willing to include “documents” created with everyday software programs in their discovery requests[…Read More]

Data Security – What To Do When An Employee Leaves

Unfortunately for employers, unconditional trust in an employee’s honesty is not a luxury any employer can afford. The Computer Security Institute’s “2003 Computer Crime and Security Survey” indicates that “theft of proprietary information caused the greatest financial loss” and, additionally, 62 percent of those who responded to the survey reported that an insider was involved[…Read More]

What is Forensic Hard Drive Imaging?

(Sometimes referred to as Hard Drive Cloning, Mirror Image or Mirror Imaging) When a computer is identified as possibly containing electronic evidence, it is imperative to follow a strict set of procedures to ensure a proper (i.e. admissible) extraction of any evidence that may exist on the subject computer. The first thing to remember is[…Read More]

Monitoring Employees

It’s a problem no one wants to think about, but statistics and case law suggest the problem is a real one and its growing, and one that corporate security, HR, and management must address. Evidence of Problem Think it’s not a problem in your organization? Do you take the risk? Consider that organizations have been[…Read More]

Track Former Employee’s Computer Activities

(The following is a theoretical scenario staged to help the reader understand the essential role that a computer forensic expert plays in tracing the theft of intellectual property.) An employee (Jane Doe) preparing to leave ACME for a competitor, NEWCO, wanted to make sure that she could take all of her clients with her to[…Read More]

Bryant, et al v. Chicago Public Schools, et al.

Forensicon was jointly retained by Plaintiff and Defendants. Defendant Gardner submitted a printed copy of a letter dated September 28, 2007 purportedly containing information in opposition to one or more of Plaintiff’s. Defendant Gardner also submitted a sworn declaration under penalty of perjury. Forensicon created and analyzed a forensic image of Gardner’s laptop computer and[…Read More]

Schreiber v. Schreiber

NY Supreme Court Establishes a Search Protocol 2010 N.Y. Misc. LEXIS 6058 (N.Y. Sup. Ct. June 25, 2010) During the discovery phase of a martial dispute, the New York Supreme Court established guidelines for a search protocol to assist the forensic examination of the defendant-husband’s work computer. Plaintiff-wife Sarah Schreiber moved for an order compelling[…Read More]