• [CFNews] Ediscovery: 4 scenarios that call for computer forensics


    E-discovery: 4 scenarios that call for computer forensics

    Computer forensics can recover hard-to-reach data, but is sometimes risky and expensive

    BY STEVEN HUNTER

    August 21, 2012

    A working knowledge of the science of computer forensics should be an essential part of every litigation counsel’s e-discovery toolkit. Unlike traditional e-discovery, which only compels the exchange of computer data that is reasonably accessible, computer forensics uncovers computer data that is hard to reach, has been lost/destroyed or is too voluminous/disparate to comprehend.

    Although the information uncovered after a forensic analysis can often alter the course of a case, it can be risky and expensive. It generally costs between $500 and $800 to collect and preserve a hard drive. Moreover, a licensed computer forensics specialist (whom you must engage if you want your evidence to hold up in court) will charge between $100 and $250 per hour to analyze the collected information, and even though you’ve spent the money, there is no guarantee the analysis will yield a shred of information that is useful to your case. Therefore, to hedge your company’s risk, you should understand how computer forensics can help your case before engaging an expert.

    Business disputes that traditionally benefit from computer forensics

    Although every case will require an independent assessment of the costs of computer forensics vs. the benefit of the information it might yield, there are a few fact scenarios in which computer forensics has proved helpful.

    1. Deleted information/Destroyed device

    Just because you can’t find it doesn’t mean it’s lost forever. “Deleted” computer files are not destroyed; they are saved in a computer’s “unallocated space,” in a format not easily understood by humans. A computer forensics specialist can retrieve and understand information that was previously deleted, including (but not limited to) emails, Internet browsing history, document drafts and calendar appointments. Furthermore, computer forensics specialists have been able to uncover similar data from devices that appear to have been physically destroyed (e.g., fire, water damage, will not turn on). Therefore, if you believe your case involves important information that may have been deleted from a device, or a device itself that has been destroyed, don’t assume the information you seek is lost. Instead, consult a computer forensics specialist to ascertain what’s left.

    2. Stolen/Leaked information

    Whether someone improperly downloaded information to a thumb disk or stole it through illegal online access to your company’s computer system, computer forensics can help you determine what information was stolen, when it was stolen and (in some instances) who stole it. This capability is especially helpful in proving that former employees have absconded with a company’s intellectual property (i.e., financial information, client lists and other proprietary information) or that competitors are stealing trade secrets.

    3. Fraud

    Generally, cases of complex business fraud (whether  internal or external) require expertise in the interplay between disparate and complex IT systems (e.g., how the inventory software relates to the billing software) to uncover irregularities and inconsistencies. Computer forensics is becoming increasingly adept at synthesizing voluminous data to help prove the fraud.

    4. Timeline of events

    Computers keep accurate usage logs, i.e., metadata. Metadata can be critical in cases in which notice or intent are elements, but can be easily (and permanently) destroyed if not collected in a forensically defensible manner.

    In conclusion, forensic computing is not for every case. To use it effectively, you have to understand what information you are seeking and how it will help your case.

    About the Author
    Steven Hunter

    Steven Hunter

    Steven V. Hunter, Esq. is a partner in the Chicago office of Quarles & Brady LLP where he specializes in business litigation.

  • 相关阅读:
    【洛谷3214】[HNOI2011] 卡农(思维)
    【洛谷2609】[ZJOI2012] 数列(高精度)
    【洛谷4501】[ZJOI2018] 胖(二分+RMQ)
    【洛谷4726】【模板】多项式指数函数(多项式 exp)
    uC/OS-II之入门与介绍20160525
    [转]Delphi 关键字详解
    [转]单元文件结构
    Delphi ComboBox的属性和事件、及几个鼠标事件的触发
    Delphi 用ToolButton和MonthCalendar实现DateTimePicker的功能
    Delphi 动态改变Rzsplitter的Orientation(方向)属性
  • 原文地址:https://www.cnblogs.com/ysun/p/2661441.html
Copyright © 2020-2023  润新知