Digital Forensics & E-Discovery

Electronically stored information (ESI) is becoming increasingly difficult to manage in litigation. Big Data, Cloud data, corporate infrastructures, mobile devices, privacy concerns, inadequate preservations or productions, and Honza/Weekley Homes court rulings are issues attorneys often face on a daily basis. The resources available on this site are provided to aid attorneys in navigating this difficult realm.

If you would like to be a contributor, want to provide a single posting, or just have a comment, go to the Feedback page.

If you have a question for us, please use the Contact page.

Most Recent Posts

Police Giving Parents Spyware

Police Giving Parents Spyware According to the Electronic Frontier Foundation, “Police chiefs, sheriffs, and district attorneys have handed out hundreds of thousands of copies of the disc to families for free at schools, libraries, and community events, usually as a part of an “Internet Safety” outreach initiative.” This information just released a few days after the FBI arrested a man for just developing this type of software. See our previous post. While the complete feature set is unclear, the ComputerCOP website clearly states, “KeyAlert immediately emails parent of child’s inappropriate Chat or Texting.” If you are monitoring and receiving two […]

Read full article »

Man Indicted for Selling 'StealthGenie' Spyware App

From the Department of Justice, “Man Indicted for Selling ‘StealthGenie’ Spyware App” I would highly recommend anyone thinking about using or recommend the use of spyware read the above article. Quote from the article, “Selling spyware is not just reprehensible, it’s a crime,” said Assistant Attorney General Caldwell.  “Apps like StealthGenie are expressly designed for use by stalkers and domestic abusers who want to know every detail of a victim’s personal life – all without the victim’s knowledge.  The Criminal Division is committed to cracking down on those who seek to profit from technology designed and used to commit brazen […]

Read full article »

Law Firms Hosting Data in the Cloud. Beware.

The article below about using clouds services in the legal industry makes many very valid points. Flying in the Clouds. A Safety Checklist The most important points: Private cloud: Please give Private Cloud serious consideration. It is the absolute best way to limit your exposure. Make sure it is installed, maintained, and monitored by qualified personnel. Data (encryption): This is a must. Antivirus: Does the provider properly maintain antivirus protection at the server level. PLEASE DON’T RELY ON THIS. Always maintain antivirus on your systems accessing this data. Data (disclosure): Include provisions in your contract regarding third party requests for […]

Read full article »

Truecrypt Discontinued

From the Truecrypt Sourceforge page; “WARNING: Using TrueCrypt is not secure.” “The development of TrueCrypt ended in 5/2014….” “You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.” Mac OS X: Apple provides FileVault and FileVault 2, its proprietary encryption. It works well and should be used for your iMac and MacBook encryption needs. Windows 7 and Windows 8: Microsoft provides BitLocker its proprietary encryption and should be utilized on your Desktops and especially Laptop computers. Only certain versions of Windows 7 support BitLocker. What should be done for data that […]

Read full article »

Clawback Enforcement and Vendor Mistakes

The Whitepaper: e-Discovery Cost Control is about ways to save on e-Discovery services. The paper is not about cutting corners or price shopping. It is about defensible processes, qualified and ethical vendor selection, the proper identification of potentially relevant information, sustainable collection techniques, appropriate pre-filtering of datasets, and utilizing the right tools for the task. As shown in the e-Discovery Team Blog on Clawback Enforcement, the wrong vendor selection can potentially cost you much more than the price per GB. Qualifications must be the first criteria followed by ethics, infrastructure, and finally price. Get the first three right and price […]

Read full article »

Orders

Coming soon

Motions

Coming soon

Subpoenas

Coming soon