Informative Articles About Digital Forensics Litigation Support
E-Discovery Opens a New World in Drug Litigation
As most large pharmaceutical companies face dozens of lawsuits at any given time, the rapid growth of electronic documents and e-mail has opened up the new legal frontier of electronic document discovery (EDD). Recent cases have made plain that plaintiffs’ attorneys will attempt any legal maneuver to gain access to drug companies’ internal electronic documents during the discovery part of litigation — and that many judges are granting access. “The e-discovery landscape is changing rapidly, and pharmaceutical companies face exploding costs attempting to manage oceans of electronic data,” says Robert Owen, a partner with the law firm Fulbright & Jaworski, headquartered in Houston, who launched his firm’s e-discovery group in 2003. “Many firms are struggling with this transition from paper to electronics.” At stake is the vast trove of data related to drug safety and communications between management, marketing and research. Generally speaking, EDD entails gathering and organizing electronic documents on databases that can be easily searched and accessed. Legal teams can enter search words, such as “cardiovascular risk,” to identify all relevant documents. But EDD programs aren’t simply means to satisfy judges and regulators. Drug firms that do not maintain electronic document retention programs and store relevant electronic communications run the risk that key documents may be unavailable for their defense in litigation. “Pharmaceutical companies need to put their e-discovery houses in order,” Owen says. “Litigation is a huge risk factor for…
Read MoreWhat is Forensic Hard Drive Imaging?
What is Forensic Hard Drive Imaging? When a computer is identified as possibly containing electronic evidence, it is imperative to follow a strict set of procedures to ensure a proper (i.e. admissible) extraction of any evidence that may exist on the subject computer. The first thing to remember is the “golden rule of electronic evidence” – never, in any way, modify the original media if at all possible. Thus, before any data analysis occurs, it usually makes sense to create an exact, bit stream copy of the original storage media that exists on the subject computer. This may include a single or multiple hard drives, floppy disk(s), CD(s), Zip drive(s) or DVD(s), plus many other types of storage media that now exist. Imaging the subject media by making a bit-for-bit copy of all sectors on the media is a well-established process that is commonly performed on the hard drive level, hence often referred to as hard drive imaging. The creation of a true forensic hard drive image is a highly detailed process. If you do not have it performed by a trained professional, you may severely compromise your chances of obtaining admissible evidence as a result of your discovery efforts. Also, to avoid accusations of evidence tampering or spoliation, it is a recommended best practice that imaging be performed by an objective third party. Suggested protocols for hard drive imaging can be found…
Read MoreEffective Preservation Letters for Electronic Evidence
Since 90% of the world’s information is stored as computer generated data, electronic discovery has become an imperative part of litigation. Billions of e-mails are being sent each day and more information is primarily (and sometimes only) stored electronically. When litigation occurs, evidence is most likely found hidden between the bits and bytes of electronic information. But the flexibility in today’s computerized information era can just as easily work against you; data can easily be overwritten and purged. Time is of the essence when it comes to protecting short-lived log files that may be overwritten on a daily basis. You should send a preservation letter to the opposing party as soon as you expect litigation so that you can maximize the available information to help you prove your case. If a company’s document retention policy involves routine destruction of electronic documents, or continued use of pertinent electronic devices, then you need to act as soon as possible. Sending a preservation letter can, and often should, occur even before you file your case. When prompt action is taken, the opposing party will more likely be able to manage the electronic evidence better and make necessary preparations in response to the request for e-discovery. Rule 26(a)(1)(B) of the Federal Rules of Civil Procedure requires “a copy of, or a description by category and location of, all documents, data compilations, and tangible things that are in…
Read MoreWays to Have a Handy Backup of Your Files
Do you always want to carry a handy backup copy of your website, photos or music collection? Let’s face it, some users want to have the ability to have a backup copy of their files so that they can show their friends their latest photos wherever they maybe. Whether it’s at an internet cafe or the local library, a lot of people wishing they had their files don’t because carrying around a large CD-R just isn’t very handy. Luckily, the recent years have lead to an explosion in handy little ways to allow you to always be able to carry a backup of your files. First off are the little flash memory sticks that are being produced by literally every computer company on the face of the earth. Most are smaller than a pack of Wrigley’s chewing gum, but have the ability to store tons of data. Talk about handy! Handy flash memory based keychains starting at around fifteen dollars are perfect storage mediums for backup files. Starting at around fifteen dollars, a user can go out and buy a 128 megabyte memory keychain. Plug it into your computer’s USB port and boom; easy access to your files. Since the memory keychains utilize the USB port for their power, users do not need to worry about carrying a power pack, or replacing batteries. The small flash memory units are extremely handy because you…
Read MoreComputer Forensics Guidelines
Contributed by Andrew Whitehead Computer Forensic Examination and Analysis A thorough Computer forensic examination and its subsequent analysis is not something that can be done by anyone, a specialist in the field will be required to examine any suspect computer system that has been seized for this purpose. He will be able examine it as a detective rather than as an IT expert, he will not chase after isolated piece of information; instead he will let the clues and the digital data as a whole tell the story. To do this, and ensure that the evidence is acceptable to a court, he needs a foot in both camps – IT expert and detective. Protecting Media during Computer Forensic Analysis A computer forensic examination will follow several guidelines, starting with switching the computer on – he won’t do it. When a computer runs through the start up sequence access times of certain files is altered, and this information may be critical to the investigation. To avoid this the original media needs to be made safe, either by disconnecting the hard drive and booting from a floppy disk, or installing the hard drive as a slave drive in another machine.
Read MoreComputer Forensic: Seizing the Evidence
The computer forensic experts have to conform with many rules and regulations if the evidence they uncover is to be acceptable to the courts. The first step in obtaining computer forensic evidence is obtaining a search warrant to seize the suspect system. This warrant must include wording allowing the investigators to seize not only the computer, but also any peripherals thought to be connected with the crime. A suspected counterfeiter, for instance, may have used his computer, a scanner, and a printer to produce his counterfeit documents, in which case all three items would need to be seized to provide evidence. If it is thought that evidence is contained in emails, this also should specifically mentioned in the search warrant. Email is a sensitive area as it can be considered personal, so solid justification is needed before a suspects email is allowed to be searched. A warrant also needs to be clear about the searching of network and file servers, whether backup media is included, and if hardware, software, and peripherals can be removed to another location to conduct the search. In all circumstances, data not connected to the crime must not be touched. Doctors, lawyers, and clergy store documents on their PCs and much of this information is confidential. While the computer forensic expert needs to uncover evidence, care must be exercised to protect the personal information of any innocent third parties.…
Read MoreTop Ten Disaster Recovery Tips
Disaster Recovery is ‘make or Break’ Research shows that most firms hit by a catastrophic event, without no disaster recovery plan, go out of business within two years. Even a basic disaster recovery plan will increase the chances of recovery. Disaster Recovery Tips 1. Store your system passwords in at least two separate secure locations. only one of which is in the same building as your IT equipment. At least two staff have should have access to them. 2. Document, document, document! Make sure that the whole recovery process to get you up and running again is documented, and includes the locations of system recovery and other critical discs. Make sure that key staff are familiar with these.
Read MoreAmendments to the federal rules of civil procedure
Rule 16. Pretrial Conferences; Scheduling; Management (b) Scheduling and Planning. Except in categories of actions exempted by district court rule as inappropriate, the district judge, or a magistrate judge when authorized by district court rule, shall, after receiving the report from the parties under Rule 26(f) or after consulting with the attorneys for the parties and any unrepresented parties by a scheduling conference, telephone, mail, or other suitable means, enter a scheduling order that limits the time To join other parties and to amend the pleadings; To file motions; and To complete discovery. The scheduling order also may include modifications of the times for disclosures underRules 26(a) and 26(e)(1) and of the extent of discovery to be permitted; provisions for disclosure or discovery of electronically stored information; any agreements the parties reach for assertingclaims of privilege or of protection as trial preparation material after production; the date or dates for conferences before trial, afinal pretrial conference, and trial; and any other matters appropriate in the circumstances of the case. The order shall issue as soon as practicable but in any event within 90 days after the appearance of a defendant and within 120 days after the complaint has been served on a defendant. A schedule shall not be modified except upon a showing of good cause and by leave of the district judge or, when authorized by local rule, by a magistrate judge.…
Read More- « Previous
- 1
- …
- 9
- 10
- 11
Contact us
(Free initial consultation – no spam)
Contact form (1)
"*" indicates required fields