SlideShare una empresa de Scribd logo
1 de 13
F RENSICS
       CORPORATION            TM




Implications of e-Discovery
      For Companies



     www.forensicscorp.com
     info@forensicscorp.com
          877.248.DATA
          480.747.1732
What is “Discovery”?

The initial (pretrial) period of a lawsuit during
which the parties may request and receive
information relating to the factual issues in
dispute.

Rule 26(b)
“Parties may obtain discovery regarding any
matter, not privileged, that is relevant to the claim
or defense of any party…”




              www.forensicscorp.com
Sources: Traditional




    www.forensicscorp.com
Sources: New

•   IM
•   VOIP
•   MP3 Storage Devices (iPods)
•   Memory sticks and flash drives
•   Global positioning systems
•   Blogs




               www.forensicscorp.com
Sources: Volume
• 1 Megabyte (MB) will average around 75 pages
• 1 Gigabyte (GB) will average around 75,000 pages
• 1 Terabyte (TB) will average around 75,000,000 pages

•   Email                           average 1-2 pages per each
•   Word Processing File            average 5-8 pages per each
•   Spreadsheets                    average 15-30 pages per each
•   Presentation                    average 12-24 pages per each
•   Graphic                         average 1 page per each
•   Adobe PDF File                  average 35 pages per each

•   Diskette 1.44 MB                if full 50-150 pgs
•   Zip Disk 100 MB or 250 MB       if full 7,500-18,750 pgs
•   CD       640 MB - 800 MB        if full 48,000-64,000 pgs
•   DVD      4.7 GB - 17 GB         if full 350,000 - 1.3 million
•   Tape Drive 2 GB - 360 GB        if full 150,000 - 27 million
•   Hard Drive 20 GB and over       if full 1.5 million and up




                  www.forensicscorp.com
Cases
Microsoft. Microsoft balks at the government's frequent requests
for e-mails because many revealed aggressive business tactics.
Microsoft eventually settles.

Morgan Stanley. Court imposes sanctions against Morgan Stanley
and Ronald Perelman obtains $1.45 billion award.

UBS Warburg. In Zubulake v. UBS Warburg, U.S. District Judge
Shira Scheindlin makes an adverse inference ruling against UBS,
leading to a $29.3 million verdict.

Merck. Jury returns $253 million verdict against Merck & Co. Inc.,
when a scientist's e-mail suggests that the company knew two
years before it put Vioxx on sale that it might cause heart problems.

     Is your company prepared?
                  www.forensicscorp.com
Top 10 Corporate Pitfalls
 Before & During Discovery
1. Failing to Have a Data           6. Performing Ad Hoc Desk-side
   Collection Plan                     Collection
2. Failing to Prioritize the Data   7. Failing to Mirror Image v.
3. Neglecting to Conduct               Imaging Excessively
   Thorough Interviews
                                    8. Limiting Names
4. Ignoring Key Data Locations &
   Important File Types             9. Assuming IT Can Manage on
5. Conducting Do-It-Yourself Data      Their Own
   Collection
                                    10.Failing to Maintain Proper
                                      Chain of Custody




                      www.forensicscorp.com
…And Remember
• Courts are not afraid and, in fact, increasingly prone, to
  hold companies accountable for deficient discovery
  practices

• Courts are unsympathetic to e-discovery ignorance and
  misconduct, and are increasingly issuing more severe
  sanctions for preservation failures and other discovery
  misconduct.
• Courts consider electronic data a part of mainstream
  discovery & are unwilling to tolerate destruction of
  relevant information
• Counsel, organizations & individuals must take
  affirmative steps to prevent intentional and negligent
  spoliation
• Spoliation as a result of document mismanagement is
  now seldom, if ever, excused


                  www.forensicscorp.com
Bottom Line
• Risk Management Must Take Ownership of This Issue to
  Create and Manage an ESI Team to:
    – Develop a strategy, policies and procedures
    – Obtain all necessary approvals from senior management and
      in-house & outside counsel
    – Enforce, assess, review and audit compliance


• Otherwise, your company will find itself at the sharp end of
  regulation
    – Unnecessarily at a disadvantage in legal proceedings
    – Potentially under threat of severe legal damages
    – Subject to high discovery costs




                    www.forensicscorp.com
We Can Help
• The legal department and the IT department often do not have
  experience working closely together.
      o “Legalese” versus “tech-talk”
      o Responsibilities may not be clearly delineated (e.g., Who is responsible
        for handling subpoenas and discovery requests? How should these
        requests be handled?)
• The IT organization may not be prepared for these requests
      o Where is the requested data stored? What type of data is needed to
        respond (documents, voice, etc.) Across multiple systems? Multiple
        types of media (tapes, emails, etc.)? Where is the “original” electronic
        record?
      o What form is the data in? Native format? Metadata?
      o What data is automatically being deleted or overwritten, and how
        frequently?
• Record retention (ordinary course of business)
      o Routine policies and practices for retention and destruction of
        information.
• Litigation hold (actual litigation, or threat of litigation)
      o Who is responsible for invoking a litigation hold? Who is responsible for
        communicating it? What policies are in place? Who is responsible for
        implementing in? Who has authority to lift hold? What If you’re
        investigating someone in IT dept with access to this info?


                      www.forensicscorp.com
Services Offered
• Computer forensics / investigative
    – Recovering material previously thought to have
      been deleted or lost
    – Restoring to usable format data contained in
      outdated formats, e.g., old e-mail systems
• Electronic discovery / litigation support
    – Data collection and conversion
    – Data hosting
    – Filtering and searching data
• Consulting
    – Advising on electronic discovery issues
    – Reviewing / developing processes dealing with
      litigations and discovery
    – Acting as special masters
                www.forensicscorp.com
Why Us
• Unmatched Experience
     o Over 12 years experience in this field working with many Global 2000
       companies.
• Proven Methodology & Technologies
     o Our elite cross-disciplinary team is comprised of computer forensic
       investigators, attorneys, law enforcement specialists, and seasoned
       business professionals who possess the technical expertise,
       understanding of the legal system, and specialized tools
       and processes that enables the expert discovery, collection,
       investigation, and production of electronic information for investigating
       and handling computer-related crimes or misuse.
• Legal Consulting
     o Veteran legal consultants create a framework that effectively and
       efficiently integrates sophisticated technology, relentless and clever
       investigative processes, and rigorous evidentiary procedures to align
       case strategies with electronic evidence and directly support litigations.
• Security and Strict Confidentiality
     o Formal internal security procedures and processes are employed to
       maintain tight controls over all forensic analysts and forensic laboratory
       technicians. Strict chain of custody procedures are mandated, with only
       industry leading equipment utilized to ensure that no data is lost or
       equipment damaged during the data collection or analysis process.

                     www.forensicscorp.com
Contact Us
Email: info@forensicscorp.com

Tel.: +1.480.747.1732 or
Tel.: 1.877.248.DATA (3282)

Or for more information visit us at:
www.forensicscorp.com




              www.forensicscorp.com

Más contenido relacionado

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Implications Of E Discovery To Companies

  • 1. F RENSICS CORPORATION TM Implications of e-Discovery For Companies www.forensicscorp.com info@forensicscorp.com 877.248.DATA 480.747.1732
  • 2. What is “Discovery”? The initial (pretrial) period of a lawsuit during which the parties may request and receive information relating to the factual issues in dispute. Rule 26(b) “Parties may obtain discovery regarding any matter, not privileged, that is relevant to the claim or defense of any party…” www.forensicscorp.com
  • 3. Sources: Traditional www.forensicscorp.com
  • 4. Sources: New • IM • VOIP • MP3 Storage Devices (iPods) • Memory sticks and flash drives • Global positioning systems • Blogs www.forensicscorp.com
  • 5. Sources: Volume • 1 Megabyte (MB) will average around 75 pages • 1 Gigabyte (GB) will average around 75,000 pages • 1 Terabyte (TB) will average around 75,000,000 pages • Email average 1-2 pages per each • Word Processing File average 5-8 pages per each • Spreadsheets average 15-30 pages per each • Presentation average 12-24 pages per each • Graphic average 1 page per each • Adobe PDF File average 35 pages per each • Diskette 1.44 MB if full 50-150 pgs • Zip Disk 100 MB or 250 MB if full 7,500-18,750 pgs • CD 640 MB - 800 MB if full 48,000-64,000 pgs • DVD 4.7 GB - 17 GB if full 350,000 - 1.3 million • Tape Drive 2 GB - 360 GB if full 150,000 - 27 million • Hard Drive 20 GB and over if full 1.5 million and up www.forensicscorp.com
  • 6. Cases Microsoft. Microsoft balks at the government's frequent requests for e-mails because many revealed aggressive business tactics. Microsoft eventually settles. Morgan Stanley. Court imposes sanctions against Morgan Stanley and Ronald Perelman obtains $1.45 billion award. UBS Warburg. In Zubulake v. UBS Warburg, U.S. District Judge Shira Scheindlin makes an adverse inference ruling against UBS, leading to a $29.3 million verdict. Merck. Jury returns $253 million verdict against Merck & Co. Inc., when a scientist's e-mail suggests that the company knew two years before it put Vioxx on sale that it might cause heart problems. Is your company prepared? www.forensicscorp.com
  • 7. Top 10 Corporate Pitfalls Before & During Discovery 1. Failing to Have a Data 6. Performing Ad Hoc Desk-side Collection Plan Collection 2. Failing to Prioritize the Data 7. Failing to Mirror Image v. 3. Neglecting to Conduct Imaging Excessively Thorough Interviews 8. Limiting Names 4. Ignoring Key Data Locations & Important File Types 9. Assuming IT Can Manage on 5. Conducting Do-It-Yourself Data Their Own Collection 10.Failing to Maintain Proper Chain of Custody www.forensicscorp.com
  • 8. …And Remember • Courts are not afraid and, in fact, increasingly prone, to hold companies accountable for deficient discovery practices • Courts are unsympathetic to e-discovery ignorance and misconduct, and are increasingly issuing more severe sanctions for preservation failures and other discovery misconduct. • Courts consider electronic data a part of mainstream discovery & are unwilling to tolerate destruction of relevant information • Counsel, organizations & individuals must take affirmative steps to prevent intentional and negligent spoliation • Spoliation as a result of document mismanagement is now seldom, if ever, excused www.forensicscorp.com
  • 9. Bottom Line • Risk Management Must Take Ownership of This Issue to Create and Manage an ESI Team to: – Develop a strategy, policies and procedures – Obtain all necessary approvals from senior management and in-house & outside counsel – Enforce, assess, review and audit compliance • Otherwise, your company will find itself at the sharp end of regulation – Unnecessarily at a disadvantage in legal proceedings – Potentially under threat of severe legal damages – Subject to high discovery costs www.forensicscorp.com
  • 10. We Can Help • The legal department and the IT department often do not have experience working closely together. o “Legalese” versus “tech-talk” o Responsibilities may not be clearly delineated (e.g., Who is responsible for handling subpoenas and discovery requests? How should these requests be handled?) • The IT organization may not be prepared for these requests o Where is the requested data stored? What type of data is needed to respond (documents, voice, etc.) Across multiple systems? Multiple types of media (tapes, emails, etc.)? Where is the “original” electronic record? o What form is the data in? Native format? Metadata? o What data is automatically being deleted or overwritten, and how frequently? • Record retention (ordinary course of business) o Routine policies and practices for retention and destruction of information. • Litigation hold (actual litigation, or threat of litigation) o Who is responsible for invoking a litigation hold? Who is responsible for communicating it? What policies are in place? Who is responsible for implementing in? Who has authority to lift hold? What If you’re investigating someone in IT dept with access to this info? www.forensicscorp.com
  • 11. Services Offered • Computer forensics / investigative – Recovering material previously thought to have been deleted or lost – Restoring to usable format data contained in outdated formats, e.g., old e-mail systems • Electronic discovery / litigation support – Data collection and conversion – Data hosting – Filtering and searching data • Consulting – Advising on electronic discovery issues – Reviewing / developing processes dealing with litigations and discovery – Acting as special masters www.forensicscorp.com
  • 12. Why Us • Unmatched Experience o Over 12 years experience in this field working with many Global 2000 companies. • Proven Methodology & Technologies o Our elite cross-disciplinary team is comprised of computer forensic investigators, attorneys, law enforcement specialists, and seasoned business professionals who possess the technical expertise, understanding of the legal system, and specialized tools and processes that enables the expert discovery, collection, investigation, and production of electronic information for investigating and handling computer-related crimes or misuse. • Legal Consulting o Veteran legal consultants create a framework that effectively and efficiently integrates sophisticated technology, relentless and clever investigative processes, and rigorous evidentiary procedures to align case strategies with electronic evidence and directly support litigations. • Security and Strict Confidentiality o Formal internal security procedures and processes are employed to maintain tight controls over all forensic analysts and forensic laboratory technicians. Strict chain of custody procedures are mandated, with only industry leading equipment utilized to ensure that no data is lost or equipment damaged during the data collection or analysis process. www.forensicscorp.com
  • 13. Contact Us Email: info@forensicscorp.com Tel.: +1.480.747.1732 or Tel.: 1.877.248.DATA (3282) Or for more information visit us at: www.forensicscorp.com www.forensicscorp.com