Why E-Discovery Protocol?

Too many Electronically Saved Information cases are left pending, without ever discovering the light of a solution in sight. The E-Discovery protocol is expected to facilitate the just, speedy, and inexpensive conduct of discovery involving Electronically Stored Information (ESI) in civil cases, and to promote, whenever possible, the resolution of disputes regarding the discovery of…

Read More

The Process for Recovering Electronic Evidence

There are two primary steps in the process of recovering electronic data; “acquisition” of the target medium, and a forensic byte-by-byte analysis of the data. Computer forensic science was created to address the specific and articulated needs of law enforcement to make the most of this new form of electronic evidence. Computer forensic science is…

Read More

Role of the Computer Forensics Expert Witness in the Litigation Process

Computer Forensics Computer forensics are used in criminal investigation, civil litigation, hacking, embezzlement, industrial espionage, insurance fraud and law enforcement or Internet/company property abuse. Computer forensics focuses on acquisition, restoration and analysis of digital data. In business world, computer forensics can be used to restore corrupted or lost data, resurrect outdated software environment, and analyze…

Read More

Intrusion Detection System Logs as Evidence and Legal Aspects

Modern techniques and methodologies for detecting attacks and malicious activities on computers and networks have evolved a lot over the last couple of years. The need for detecting intrusion attempts before the actual attack simplifies the job of securely administering computer networks. Often an attacker will probe different ports and services on a network to…

Read More