SlideShare ist ein Scribd-Unternehmen logo
1 von 52
Electronic Forensic Protocols
and Working with Computer
Forensic Examiners
Houston Paralegal Association
Kasi Chadwick
What we will
Cover…
PAGE
Overview
• What is an electronic forensic examination and what
is its purpose?
• The execution of electronic forensic protocols and the
life cycle of a protocol.
• Best practices for completing a forensic examination.
3
What is an electronic
forensic examination?
PAGE
What is an Electronic Forensic Examination?
• Electronic forensic examinations can be used to
review the contents of an individual’s:
 Computer;
 Cell phone;
 Cloud-based e-mail system (Hotmail; Gmail);
 USB device; or
 Generally any medium upon which data is stored.
• Generally, an inventory of the content of the target
device, called a file listing, is provided to the
requesting party.
• The review is principally conducted using the file
listing.
5
PAGE
Ease of Review
“Possession is 9/10 of the law”
• Examination of devices in your possession.
• Examination of devices not in your possession.
• Alternative is to execute a forensic protocol.
6
What is an Electronic
Forensic Protocol
PAGE
What is an Electronic Forensic Protocol?
• An electronic forensic protocol is a set of procedures
through which the harvesting, review, and
(sometimes) the destruction of electronic content is
conducted.
• Agreed forensic protocols can be drafted pursuant
Rule 11 of the Texas Rules of Civil Procedure and/or in
conjunction with injunctive relief.
• Alternatively, court-ordered forensic discovery can be
issued—generally to remedy discovery abuses.
8
PAGE 9
• Be careful when
seeking to deploy a
found or form protocol.
• Each case presents
unique considerations
for forensic
assessment.
• Each requires a
protocol tailored to the
needs, sources, parties
and risks attendant to
the matter.
PAGE
Why an Electronic Forensic Protocol?
Agree Forensic Protocol
• Generally speaking, executing an agreed forensic
protocol is a way to fast-track the discovery
processes.
• Provides a mechanism through which the parties may
expeditiously locate and collect allegedly
misappropriated data.
Court Ordered Forensic Protocol
• Provides a way to access data that has not been
produced through discovery.
10
Legal Basis
PAGE
In re Weekley Homes, L.P.
• Alleged discovery abuse  Trial court ordered a forensic
protocol
• In re Weekley Protocol:
 Four forensic experts identified.
 Experts to take an evidentiary image of the hard drives in
question using “procedures that is generally acceptable as
forensically sound.”
 From the images, experts would search for deleted emails from
the relevant year using specified search terms.
 Owner of data then had opportunity to review the responsive
data.
 Responsive data was to be provided to requesting party.
• Responding party sought mandamus relief.
12
PAGE
• Supreme Court concluded the trial court abused its
discretion.
• Made this finding because the requesting party’s
“conclusory statements that the deleted emails it
seeks ‘must exist’ and that deleted emails are in
some cases recoverable is not enough to justify the
highly intrusive method of discovery the trial court
ordered…”
• In order to obtain a court-ordered forensic protocol,
more must be shown.
• Case-by-case analysis.
13
In re Weekley Homes, L.P.
PAGE
In re Weekley Homes, L.P. - Dicta
• The Supreme Court contrasted their decision with In
re Honza, 242 S.W.3d 578, 583 (Tex. App.—Waco 2008).
• The Supreme Court distinguished In re Weekley from
Honza:
 Honza sought forensic review to obtain the
metadata for a document. No question of
document’s existence.
 There was a direct relationship between the hard
drives sought and the plaintiff’s claims.
 There was extensive testimony as to the forensic
expert’s experience and qualifications prior to
granting the forensic review.
14
Legal Standard for Court-
Ordered Electronic Forensic
Protocols
PAGE
In re Weekley Homes, L.P.
• Per Rule 196.4 of the Texas Rules of Civil Procedure:
• Employing Rule 196.4, the In re Weekley outlined the
legal standard for a court-ordered electronic forensic
examination sought to remedy an alleged discovery
abuse.
16
Agreed Forensic Protocols
PAGE
Agreed Forensic Protocols
• If the parties agree to execute an agreed forensic
protocol, there is more freedom to craft the review.
18
Selecting Your Forensic
Expert
PAGE
Selecting Your Forensic Expert
• Selecting a qualified forensic expert is critical.
 Qualified and experienced forensic experts help ensure
proper collections and processing of data.
 In the world of forensics, there are many way to skin
the cat.
 Using an inexperienced expert can cause omissions of
critical evidence—and in some cases—destruction of
the evidence altogether.
• Per In re Weekley, your expert’s credentials are
important in obtaining a court-ordered forensic
protocol.
20
PAGE
Selecting the expert is a great place to add value!
• When selecting an expert, paralegals can add
significant value.
 Questions are critical!
 It is important that you find an expert with whom you
can collaborate.
21
PAGE
• Important to involve forensic expert as early in
process as possible. Protocols put in place without
expertise often create unrealistic expectations with
respect to the practical limits of forensic analysis. You
can't order an examiner to fly.
• Optimum outcomes are achieved using a neutral
examiner, abetted by input and consensus from
partisan experts from each side.
• Clear delineation of examiner's ethical responsibilities
is essential. Obligations to Court and opposing party
should be made manifest, where applicable, to avoid
inherent conflicts.
22
Selecting Your Forensic Expert
PAGE
Selecting Your Forensic Examiner
• No company is skilled at digital forensics. Examiners
are individuals, and no affiliation guarantees
competency. Look closely at the examiner, not the
company.
• Referrals from colleagues helpful.
• Know what licensure requirements apply to the
examiner.
• Examiners should be experienced in writing
intelligible reports.
23
What are we Examining?
PAGE
What are we Examining?
• Paralegal/Examiner relationship is critical at this stage.
• Paralegals and Lawyers should know their case to best
identify the target information.
• How will target information be identified?
• We need to consider:
 The potential custodians of information,
 What types of files will be extracted, and
 How the potentially responsive data will be culled for review.
25
PAGE
What are we Examining?
• Where is the target
information kept?
• While forensic
examinations of cell
phones and cloud-
based accounts do not
normally produce
reviewable documents,
these extractions can
provide important clues
to the rest of the puzzle.
26
PAGE
What are we Examining?
• The easy targets:
 Computers (personal and company devices)
 External storage devices
• The more complex:
 Cell phones
 Cloud-based storage systems (e.g. cloud-based e-mail
accounts, DropBox)
27
How will we be Examining?
PAGE
Methodologies
• Specific methodologies should be agreed upon,
where feasible; else, range of and limits upon
investigator's discretion must be expressly addressed
in the protocol.
29
What will be Pulled from the
Target Devices?
PAGE
What will be Pulled from the Target Devices?
• Question: What is the universe of data to be
extracted?
• Will the forensic expert be harvesting:
 Active Files (e.g. .docs, .pdfs, .xls)
 Deleted file identification
 Device connection log
 Internet Artifacts
31
PAGE
Giga-what?:Format for the Information
• Depending on your firm’s staffing and electronic capabilities,
many paralegals my be chiefly responsible for obtaining the data
in the proper format.
• Another place where working with your examiner is important.
• Examiners can provide the target information in a variety of
formats.
• If you don’t ask, you won’t know.
• Sometimes, failure to ask questions results in an inability to
process the data.
32
Additional Front-End
Considerations
PAGE
Additional Considerations to be Decided Before
Execution
• Who will hold the devices while the protocol is
executed?
 For how long will the devices be sequestered?
 How will the devices be kept secure?
• How will the forensic images be maintained?
• Confidentiality?
 Confidential designations?
 AEO designations?
34
PAGE
Additional Considerations to be Decided Before
Execution
• Consider an iterative process to keep the case
moving forward.
• A few key issues examined first, then a few more. Don't boil the
ocean.
• Address whether the examiner can assess the
integrity of the evidence. If the digital books have
been cooked (e.g., drives swapped, wrong machine
supplied, drive wiping seen, etc.), can the examiner
address this as a threshold matter?
35
Harvesting the Data
PAGE
Harvesting the Data from the Target Devices
• After the protocol is executed by the parties, the
forensic expert’s work comes into play.
• Selecting the right expert is critical.
 There are a number of tools forensic experts can use.
The forensic expert’s expertise is important here.
• Example: Different data extraction programs work
best on different devices.
 Incorrect collection methods or incorrect tools can
destroy critical metadata (e.g. creation date, last
accessed date).
37
Data Review
PAGE
Review of Target Information
• File listings and
extractions are
generally produced in
.xls format.
• Listings can be
thousands of pages
long.
• .xls proficiency is
critical.
• Most time-intensive
activity. 39
PAGE
Review of Target Information
• Spreadsheets of extracted metadata are increasingly
ill-suited as a form of production for review because
of row limitations.
• 1,048,576+ Excel rows sound like a lot until you
realize that more than that number of discrete items
are routinely seen on a single device (after processing
compressed and container files).
• Alternatives?
40
PAGE
What are we Reviewing?
• Files
– Names
– Sizes
– Creation dates
– Last accessed dates
– Last modified dates
– Whether files are deleted
and
– Whether a file is
overwritten
• Web Information
– Browser history
– Web bookmarks
– Cookie history
• Mobile Devices
– Call logs
– Text messages
– SMS messages
– Applications
– Contacts
41
With the careful review of a listing or extraction, we can
see:
What to do with Identified
Files?
PAGE
What’s Next?
• Once the requesting party has identified the files for
review, the parties should collectively review the
identified files.
• The forensic expert is instructed to pull the files from
the forensic image. (Normally, devices are returned to
the custodian after imagining.)
43
PAGE
What are we Searching for in our Review of the
Identified Files?
• Who’s data is it?
• In the protocol, the parties should identify what
files/data will be subject to deletion.
• The protocol should also provide what to do if the
parties cannot agree as to the proper classification
content of the file/data.
 Who is responsible for motion practice concerning the
data?
44
Deletion of Identified Files
PAGE
Deletion Considerations in Your Protocol
• In the deletion process, it is important that your
protocol provides that an image of the original file
listing be maintained.
• The expert should only be instructed to delete the
data from the device—not the device’s image.
• Spoliation.
• May need image to prove use and/or damages.
46
Additional Notes
PAGE
Spoliation
• Because a file listing can show the life and death of a
file, improperly preserved evidence can present
significant problems to a responding party.
• Whether a deleted file is recoverable dictates the
degree of any spoliation implications.
• Many times, spoliation happens inadvertently.
– Especially in more protracted litigation, paralegals can help monitor a
case’s activity to help their lawyers.
48
PAGE
International Collections
• Because we are searching for electronically
misappropriated information, it is common for target
devices to be located in different countries.
• International Collections
 Kits
 On-site collections
• Compliance with international laws
 EU laws are different.
 Sometimes, if the information is personal in nature, the
information belongs to the employee, even if the
information is located on the employer’s devices.
 There are exceptions.
49
PAGE
Defend Trade Secret Act of 2016
• The DTSA was signed into law by President Obama last
week.
• The DTSA creates a “civil seizure” mechanism to collect
and sequester electronic storage devices believed to
contain a stolen trade secret soon after filing suit.
• The DTSA—and the “best practices” expected to be
created under the DTSA—may have implications on how
forensic discovery is conducted in the future.
50
Additional Resources
PAGE
Questions?
Kasi Chadwick
BoyarMiller
kchadwick@boyarmiller.com
(832) 615-4290
52

Weitere ähnliche Inhalte

Was ist angesagt?

Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model orderSeth Row
 
Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Michael Geske
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Through a Router Darkly - Remote Investigation of Internet Censorship
Through a Router Darkly - Remote Investigation of Internet CensorshipThrough a Router Darkly - Remote Investigation of Internet Censorship
Through a Router Darkly - Remote Investigation of Internet CensorshipJoss Wright
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
CS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VCS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VArthyR3
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...Kirby Drake
 

Was ist angesagt? (20)

Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
File000116
File000116File000116
File000116
 
File000168
File000168File000168
File000168
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model order
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Through a Router Darkly - Remote Investigation of Internet Censorship
Through a Router Darkly - Remote Investigation of Internet CensorshipThrough a Router Darkly - Remote Investigation of Internet Censorship
Through a Router Darkly - Remote Investigation of Internet Censorship
 
File000162
File000162File000162
File000162
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
CHFI
CHFICHFI
CHFI
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
CS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VCS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT V
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...
 

Ähnlich wie Electronic Forensic Protocols and Working with Computer Forensic Examiners

Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Digital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptxDigital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptxShubhamKadam807802
 
Digital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptxDigital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptxShubhamKadam807802
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayThe Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayRob Robinson
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdfGnanavi2
 
Ethical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommEthical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommKlemchuk LLP
 
Systemising advice
Systemising adviceSystemising advice
Systemising adviceDavid Harvey
 
Small Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalSmall Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalShawn J. Roberts
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsShanaAneevan
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Judging E-Discovery Disputes
Judging E-Discovery DisputesJudging E-Discovery Disputes
Judging E-Discovery DisputesDavid Harvey
 

Ähnlich wie Electronic Forensic Protocols and Working with Computer Forensic Examiners (20)

Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptxDigital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptx
 
Digital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptxDigital emerging trends in computer engineering Evidences.pptx
Digital emerging trends in computer engineering Evidences.pptx
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayThe Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Ethical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from QualcommEthical Issues in eDiscovery - Lessons from Qualcomm
Ethical Issues in eDiscovery - Lessons from Qualcomm
 
Systemising advice
Systemising adviceSystemising advice
Systemising advice
 
Daniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdfDaniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdf
 
Small Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalSmall Law Office Management for the Legal Professional
Small Law Office Management for the Legal Professional
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Judging E-Discovery Disputes
Judging E-Discovery DisputesJudging E-Discovery Disputes
Judging E-Discovery Disputes
 

Mehr von BoyarMiller

Key Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldKey Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldBoyarMiller
 
Women's Event Takeaways
Women's Event TakeawaysWomen's Event Takeaways
Women's Event TakeawaysBoyarMiller
 
2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuideBoyarMiller
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller
 
Information & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesInformation & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesBoyarMiller
 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideBoyarMiller
 
Acc oct 22 2019 presentation
Acc oct 22 2019 presentationAcc oct 22 2019 presentation
Acc oct 22 2019 presentationBoyarMiller
 
Acc oct 8 2019 presentation
Acc oct 8 2019 presentationAcc oct 8 2019 presentation
Acc oct 8 2019 presentationBoyarMiller
 
ALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesBoyarMiller
 
BoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller
 
2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs2019 Information & Insights For Entrepreneurs
2019 Information & Insights For EntrepreneursBoyarMiller
 
BoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller
 
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller
 
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller
 
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation""Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation"BoyarMiller
 
BoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller
 
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo WorldBoyarMiller
 
BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller
 
#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online WorldBoyarMiller
 

Mehr von BoyarMiller (20)

Key Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldKey Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI World
 
Women's Event Takeaways
Women's Event TakeawaysWomen's Event Takeaways
Women's Event Takeaways
 
2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptx
 
Information & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesInformation & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and Employees
 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguide
 
Acc oct 22 2019 presentation
Acc oct 22 2019 presentationAcc oct 22 2019 presentation
Acc oct 22 2019 presentation
 
Acc oct 8 2019 presentation
Acc oct 8 2019 presentationAcc oct 8 2019 presentation
Acc oct 8 2019 presentation
 
ALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of Leases
 
BoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBook
 
2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs
 
BoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of Employment
 
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
 
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
 
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation""Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
 
BoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appeal
 
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
 
BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018
 
#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World
 

Kürzlich hochgeladen

The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 

Kürzlich hochgeladen (20)

The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 

Electronic Forensic Protocols and Working with Computer Forensic Examiners

  • 1. Electronic Forensic Protocols and Working with Computer Forensic Examiners Houston Paralegal Association Kasi Chadwick
  • 3. PAGE Overview • What is an electronic forensic examination and what is its purpose? • The execution of electronic forensic protocols and the life cycle of a protocol. • Best practices for completing a forensic examination. 3
  • 4. What is an electronic forensic examination?
  • 5. PAGE What is an Electronic Forensic Examination? • Electronic forensic examinations can be used to review the contents of an individual’s:  Computer;  Cell phone;  Cloud-based e-mail system (Hotmail; Gmail);  USB device; or  Generally any medium upon which data is stored. • Generally, an inventory of the content of the target device, called a file listing, is provided to the requesting party. • The review is principally conducted using the file listing. 5
  • 6. PAGE Ease of Review “Possession is 9/10 of the law” • Examination of devices in your possession. • Examination of devices not in your possession. • Alternative is to execute a forensic protocol. 6
  • 7. What is an Electronic Forensic Protocol
  • 8. PAGE What is an Electronic Forensic Protocol? • An electronic forensic protocol is a set of procedures through which the harvesting, review, and (sometimes) the destruction of electronic content is conducted. • Agreed forensic protocols can be drafted pursuant Rule 11 of the Texas Rules of Civil Procedure and/or in conjunction with injunctive relief. • Alternatively, court-ordered forensic discovery can be issued—generally to remedy discovery abuses. 8
  • 9. PAGE 9 • Be careful when seeking to deploy a found or form protocol. • Each case presents unique considerations for forensic assessment. • Each requires a protocol tailored to the needs, sources, parties and risks attendant to the matter.
  • 10. PAGE Why an Electronic Forensic Protocol? Agree Forensic Protocol • Generally speaking, executing an agreed forensic protocol is a way to fast-track the discovery processes. • Provides a mechanism through which the parties may expeditiously locate and collect allegedly misappropriated data. Court Ordered Forensic Protocol • Provides a way to access data that has not been produced through discovery. 10
  • 12. PAGE In re Weekley Homes, L.P. • Alleged discovery abuse  Trial court ordered a forensic protocol • In re Weekley Protocol:  Four forensic experts identified.  Experts to take an evidentiary image of the hard drives in question using “procedures that is generally acceptable as forensically sound.”  From the images, experts would search for deleted emails from the relevant year using specified search terms.  Owner of data then had opportunity to review the responsive data.  Responsive data was to be provided to requesting party. • Responding party sought mandamus relief. 12
  • 13. PAGE • Supreme Court concluded the trial court abused its discretion. • Made this finding because the requesting party’s “conclusory statements that the deleted emails it seeks ‘must exist’ and that deleted emails are in some cases recoverable is not enough to justify the highly intrusive method of discovery the trial court ordered…” • In order to obtain a court-ordered forensic protocol, more must be shown. • Case-by-case analysis. 13 In re Weekley Homes, L.P.
  • 14. PAGE In re Weekley Homes, L.P. - Dicta • The Supreme Court contrasted their decision with In re Honza, 242 S.W.3d 578, 583 (Tex. App.—Waco 2008). • The Supreme Court distinguished In re Weekley from Honza:  Honza sought forensic review to obtain the metadata for a document. No question of document’s existence.  There was a direct relationship between the hard drives sought and the plaintiff’s claims.  There was extensive testimony as to the forensic expert’s experience and qualifications prior to granting the forensic review. 14
  • 15. Legal Standard for Court- Ordered Electronic Forensic Protocols
  • 16. PAGE In re Weekley Homes, L.P. • Per Rule 196.4 of the Texas Rules of Civil Procedure: • Employing Rule 196.4, the In re Weekley outlined the legal standard for a court-ordered electronic forensic examination sought to remedy an alleged discovery abuse. 16
  • 18. PAGE Agreed Forensic Protocols • If the parties agree to execute an agreed forensic protocol, there is more freedom to craft the review. 18
  • 20. PAGE Selecting Your Forensic Expert • Selecting a qualified forensic expert is critical.  Qualified and experienced forensic experts help ensure proper collections and processing of data.  In the world of forensics, there are many way to skin the cat.  Using an inexperienced expert can cause omissions of critical evidence—and in some cases—destruction of the evidence altogether. • Per In re Weekley, your expert’s credentials are important in obtaining a court-ordered forensic protocol. 20
  • 21. PAGE Selecting the expert is a great place to add value! • When selecting an expert, paralegals can add significant value.  Questions are critical!  It is important that you find an expert with whom you can collaborate. 21
  • 22. PAGE • Important to involve forensic expert as early in process as possible. Protocols put in place without expertise often create unrealistic expectations with respect to the practical limits of forensic analysis. You can't order an examiner to fly. • Optimum outcomes are achieved using a neutral examiner, abetted by input and consensus from partisan experts from each side. • Clear delineation of examiner's ethical responsibilities is essential. Obligations to Court and opposing party should be made manifest, where applicable, to avoid inherent conflicts. 22 Selecting Your Forensic Expert
  • 23. PAGE Selecting Your Forensic Examiner • No company is skilled at digital forensics. Examiners are individuals, and no affiliation guarantees competency. Look closely at the examiner, not the company. • Referrals from colleagues helpful. • Know what licensure requirements apply to the examiner. • Examiners should be experienced in writing intelligible reports. 23
  • 24. What are we Examining?
  • 25. PAGE What are we Examining? • Paralegal/Examiner relationship is critical at this stage. • Paralegals and Lawyers should know their case to best identify the target information. • How will target information be identified? • We need to consider:  The potential custodians of information,  What types of files will be extracted, and  How the potentially responsive data will be culled for review. 25
  • 26. PAGE What are we Examining? • Where is the target information kept? • While forensic examinations of cell phones and cloud- based accounts do not normally produce reviewable documents, these extractions can provide important clues to the rest of the puzzle. 26
  • 27. PAGE What are we Examining? • The easy targets:  Computers (personal and company devices)  External storage devices • The more complex:  Cell phones  Cloud-based storage systems (e.g. cloud-based e-mail accounts, DropBox) 27
  • 28. How will we be Examining?
  • 29. PAGE Methodologies • Specific methodologies should be agreed upon, where feasible; else, range of and limits upon investigator's discretion must be expressly addressed in the protocol. 29
  • 30. What will be Pulled from the Target Devices?
  • 31. PAGE What will be Pulled from the Target Devices? • Question: What is the universe of data to be extracted? • Will the forensic expert be harvesting:  Active Files (e.g. .docs, .pdfs, .xls)  Deleted file identification  Device connection log  Internet Artifacts 31
  • 32. PAGE Giga-what?:Format for the Information • Depending on your firm’s staffing and electronic capabilities, many paralegals my be chiefly responsible for obtaining the data in the proper format. • Another place where working with your examiner is important. • Examiners can provide the target information in a variety of formats. • If you don’t ask, you won’t know. • Sometimes, failure to ask questions results in an inability to process the data. 32
  • 34. PAGE Additional Considerations to be Decided Before Execution • Who will hold the devices while the protocol is executed?  For how long will the devices be sequestered?  How will the devices be kept secure? • How will the forensic images be maintained? • Confidentiality?  Confidential designations?  AEO designations? 34
  • 35. PAGE Additional Considerations to be Decided Before Execution • Consider an iterative process to keep the case moving forward. • A few key issues examined first, then a few more. Don't boil the ocean. • Address whether the examiner can assess the integrity of the evidence. If the digital books have been cooked (e.g., drives swapped, wrong machine supplied, drive wiping seen, etc.), can the examiner address this as a threshold matter? 35
  • 37. PAGE Harvesting the Data from the Target Devices • After the protocol is executed by the parties, the forensic expert’s work comes into play. • Selecting the right expert is critical.  There are a number of tools forensic experts can use. The forensic expert’s expertise is important here. • Example: Different data extraction programs work best on different devices.  Incorrect collection methods or incorrect tools can destroy critical metadata (e.g. creation date, last accessed date). 37
  • 39. PAGE Review of Target Information • File listings and extractions are generally produced in .xls format. • Listings can be thousands of pages long. • .xls proficiency is critical. • Most time-intensive activity. 39
  • 40. PAGE Review of Target Information • Spreadsheets of extracted metadata are increasingly ill-suited as a form of production for review because of row limitations. • 1,048,576+ Excel rows sound like a lot until you realize that more than that number of discrete items are routinely seen on a single device (after processing compressed and container files). • Alternatives? 40
  • 41. PAGE What are we Reviewing? • Files – Names – Sizes – Creation dates – Last accessed dates – Last modified dates – Whether files are deleted and – Whether a file is overwritten • Web Information – Browser history – Web bookmarks – Cookie history • Mobile Devices – Call logs – Text messages – SMS messages – Applications – Contacts 41 With the careful review of a listing or extraction, we can see:
  • 42. What to do with Identified Files?
  • 43. PAGE What’s Next? • Once the requesting party has identified the files for review, the parties should collectively review the identified files. • The forensic expert is instructed to pull the files from the forensic image. (Normally, devices are returned to the custodian after imagining.) 43
  • 44. PAGE What are we Searching for in our Review of the Identified Files? • Who’s data is it? • In the protocol, the parties should identify what files/data will be subject to deletion. • The protocol should also provide what to do if the parties cannot agree as to the proper classification content of the file/data.  Who is responsible for motion practice concerning the data? 44
  • 46. PAGE Deletion Considerations in Your Protocol • In the deletion process, it is important that your protocol provides that an image of the original file listing be maintained. • The expert should only be instructed to delete the data from the device—not the device’s image. • Spoliation. • May need image to prove use and/or damages. 46
  • 48. PAGE Spoliation • Because a file listing can show the life and death of a file, improperly preserved evidence can present significant problems to a responding party. • Whether a deleted file is recoverable dictates the degree of any spoliation implications. • Many times, spoliation happens inadvertently. – Especially in more protracted litigation, paralegals can help monitor a case’s activity to help their lawyers. 48
  • 49. PAGE International Collections • Because we are searching for electronically misappropriated information, it is common for target devices to be located in different countries. • International Collections  Kits  On-site collections • Compliance with international laws  EU laws are different.  Sometimes, if the information is personal in nature, the information belongs to the employee, even if the information is located on the employer’s devices.  There are exceptions. 49
  • 50. PAGE Defend Trade Secret Act of 2016 • The DTSA was signed into law by President Obama last week. • The DTSA creates a “civil seizure” mechanism to collect and sequester electronic storage devices believed to contain a stolen trade secret soon after filing suit. • The DTSA—and the “best practices” expected to be created under the DTSA—may have implications on how forensic discovery is conducted in the future. 50