SlideShare una empresa de Scribd logo
1 de 17
Divorce in the Digital Era
What Every Divorce Lawyer Needs to Know About
Electronic Discovery, Internet Investigations, and
               Computer Forensics



                        Frederick S. Lane

   Vermont Family Law Conference
                         15 February 2013
www.FrederickLane.com                 www.ComputerForensicsDigest.com
General Background
                        • Attorney, Educational
                          Consultant & Lecturer
                        • Author of 6 Books
                        • Computer Forensics
                          Expert
                        • 10 Years -- Burlington
                          (VT) School Board
                        • Technology & Privacy
                          Specialist
                        • Student Safety Advocate
www.FrederickLane.com         www.ComputerForensicsDigest.com
Previous Books




www.FrederickLane.com   www.ComputerForensicsDigest.com
Computer Background
• Thirty years of personal computer
  experience
• More than twenty years lecturing on
  technology and the law
• Fourteen years of computer forensics
  experience in a variety of cases
• 40 hours of instruction in X-Ways Forensics
  and computer file systems
  www.FrederickLane.com     www.ComputerForensicsDigest.com
Seminar Outline
• The Pre-Divorce Digital Checklist
• Identifying and Finding Relevant
  Information
• Digital Investigation by Your Client
• Digital Investigation by You and Your
  Agents
• Electronic Discovery and Subpoenas
• Computer Forensics in Divorce Cases
• Issues of Digital Behavior During and
  Post-Divorce
www.FrederickLane.com     www.ComputerForensicsDigest.com
The Pre-Divorce Digital Checklist
 • Inventory of All Known Electronic
   Devices
 • List of All Known Electronic
   Accounts
 • Inventory of Shared Data (or Data
   That Should Be Shared)
 • Planning to Live a Separate Electronic
   Life
 • Those Who Live in Gorilla Glass
   Houses …
  www.FrederickLane.com   www.ComputerForensicsDigest.com
Identifying/Finding Relevant Info.

• Categories of Information
    – Emotional Betrayal and Infidelity
    – Hidden or Dissipated Assets
    – Addictions
    – Criminal Behavior
    – Harm or Risks to Children
• Leading Digital Sources
    – Social Media, Texts, Emails, Files, Web
www.FrederickLane.com          www.ComputerForensicsDigest.com
Identifying/Finding Relevant Info.

• Information in the Domicile
    – Desktops, Laptops, Gaming Consoles
    – External and Removable Storage
• Information on the Go
    – Smartphones, Tablets, eReaders
• Information in the Cloud
    – Social media, Web email, online financial
      accounts, online data storage, etc.
www.FrederickLane.com         www.ComputerForensicsDigest.com
Digital Investigation by Your Client

 • A Brief Overview of Privacy in
   Marriage
 • Factors to Consider Before
   Snooping:
     – Who Owns the Device?
     – Where Is the Device Located?
     – Shared Account?
     – Password-Protected?
 www.FrederickLane.com        www.ComputerForensicsDigest.com
Digital Investigation by Your Client

 • Legal Risks of Client Snooping:
     – Google Searches
     – Listening to or Taping Phone Calls
     – Reading Emails on a Computer
     – Intercepting Emails
     – Unauthorized Access to Devices or
       Accounts
     – Location-Tracking using Apps or GPS
       Devices

 www.FrederickLane.com        www.ComputerForensicsDigest.com
Digital Investigation by You
            and Your Agents
• Attorneys Are Not Witnesses
• The Perils of Digital Investigations
    – Rule 4.1 – Truthfulness in Statements to
      Others
    – Rule 4.2 – Communication with Person
      Represented by Counsel
    – Rule 5.3 – Responsibility Regarding Non-
      Lawyer Assistant
    – Rule 8.4 – Misconduct
• See Previous Slide (Similar Legal Risks)
www.FrederickLane.com           www.ComputerForensicsDigest.com
Electronic Discovery and Subpoenas

 • VRCP 16.2 – Scheduling orders may
   provide for e-discovery
 • VRCP 26(b)(1) – No duty to provide
   discovery if inaccessible because of
   undue burden or cost
 • VRCP 33(c) – it is sufficient to specify
   business records from which
   information can be derived
 • VRCP 34 – Covering production and
   form of electronic data
 www.FrederickLane.com     www.ComputerForensicsDigest.com
Electronic Discovery and Subpoenas

 • VRCP 37 – No sanction for
   destruction of data by “routine, good-
   faith” operation of device
 • VRCP 45 – Rules governing subpoena
   of electronic data
 • Compelling production of passwords
 • Obtaining electronic data from
   online service providers
 www.FrederickLane.com    www.ComputerForensicsDigest.com
Digital Forensics in Divorce Cases

• Defining Digital Forensics
    – Mobile, Computer, Network, Cloud
• The Great “Delete” Myth
• Relevant Data, Installed Programs
  and Internet History
• Discovery Issues
    – Ownership, Invasion of Privacy, Burden
• Time Is of the Essence
www.FrederickLane.com        www.ComputerForensicsDigest.com
Digital Behavior During
              and Post-Divorce
• Your Client’s Posts Can and Will
  Be Used in a Court of Law
• Electronic Contact with Minor
  Children
• Cyberstalking and
  Cyberharrassment
• Digital Child Custody and
  Electronic Co-Parenting
www.FrederickLane.com     www.ComputerForensicsDigest.com
Contact Information
• Please Visit My Web Sites:
  – www.ComputerForensicsDigest.com
  – www.FrederickLane.com
  – www.CybertrapsfortheYoung.com
• Send Me an Email:
  – FSLane3@gmail.com
• Call Me:
  – 802-318-4604
  www.FrederickLane.com        www.ComputerForensicsDigest.com
Divorce in the Digital Era
What Every Divorce Lawyer Needs to Know About
Electronic Discovery, Internet Investigations, and
               Computer Forensics



                        Frederick S. Lane

   Vermont Family Law Conference
                         15 February 2013
www.FrederickLane.com                 www.ComputerForensicsDigest.com

Más contenido relacionado

La actualidad más candente

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
Dan Michaluk
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
mcgilla
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 

La actualidad más candente (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Chapter2
Chapter2Chapter2
Chapter2
 

Destacado

American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
Frederick Lane
 

Destacado (20)

2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
 
2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad
 
2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators
 
2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint
 
2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators
 
2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media
 
2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries
 
2010-07-20 American Privacy
2010-07-20 American Privacy2010-07-20 American Privacy
2010-07-20 American Privacy
 
2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It
 
2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators
 
2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of Privacy
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"
 
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
 

Similar a Divorce in the Digital Era

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationData Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Chuck Kunz
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
ImageSoft
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
amprivacy
 

Similar a Divorce in the Digital Era (20)

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer Techniques
 
Due Diligence Online by Cynthia Hetherington
Due Diligence Online by Cynthia HetheringtonDue Diligence Online by Cynthia Hetherington
Due Diligence Online by Cynthia Hetherington
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for Educators
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy Law
 
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationData Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 

Más de Frederick Lane

Más de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Divorce in the Digital Era

  • 1. Divorce in the Digital Era What Every Divorce Lawyer Needs to Know About Electronic Discovery, Internet Investigations, and Computer Forensics Frederick S. Lane Vermont Family Law Conference 15 February 2013 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 2. General Background • Attorney, Educational Consultant & Lecturer • Author of 6 Books • Computer Forensics Expert • 10 Years -- Burlington (VT) School Board • Technology & Privacy Specialist • Student Safety Advocate www.FrederickLane.com www.ComputerForensicsDigest.com
  • 3. Previous Books www.FrederickLane.com www.ComputerForensicsDigest.com
  • 4. Computer Background • Thirty years of personal computer experience • More than twenty years lecturing on technology and the law • Fourteen years of computer forensics experience in a variety of cases • 40 hours of instruction in X-Ways Forensics and computer file systems www.FrederickLane.com www.ComputerForensicsDigest.com
  • 5. Seminar Outline • The Pre-Divorce Digital Checklist • Identifying and Finding Relevant Information • Digital Investigation by Your Client • Digital Investigation by You and Your Agents • Electronic Discovery and Subpoenas • Computer Forensics in Divorce Cases • Issues of Digital Behavior During and Post-Divorce www.FrederickLane.com www.ComputerForensicsDigest.com
  • 6. The Pre-Divorce Digital Checklist • Inventory of All Known Electronic Devices • List of All Known Electronic Accounts • Inventory of Shared Data (or Data That Should Be Shared) • Planning to Live a Separate Electronic Life • Those Who Live in Gorilla Glass Houses … www.FrederickLane.com www.ComputerForensicsDigest.com
  • 7. Identifying/Finding Relevant Info. • Categories of Information – Emotional Betrayal and Infidelity – Hidden or Dissipated Assets – Addictions – Criminal Behavior – Harm or Risks to Children • Leading Digital Sources – Social Media, Texts, Emails, Files, Web www.FrederickLane.com www.ComputerForensicsDigest.com
  • 8. Identifying/Finding Relevant Info. • Information in the Domicile – Desktops, Laptops, Gaming Consoles – External and Removable Storage • Information on the Go – Smartphones, Tablets, eReaders • Information in the Cloud – Social media, Web email, online financial accounts, online data storage, etc. www.FrederickLane.com www.ComputerForensicsDigest.com
  • 9. Digital Investigation by Your Client • A Brief Overview of Privacy in Marriage • Factors to Consider Before Snooping: – Who Owns the Device? – Where Is the Device Located? – Shared Account? – Password-Protected? www.FrederickLane.com www.ComputerForensicsDigest.com
  • 10. Digital Investigation by Your Client • Legal Risks of Client Snooping: – Google Searches – Listening to or Taping Phone Calls – Reading Emails on a Computer – Intercepting Emails – Unauthorized Access to Devices or Accounts – Location-Tracking using Apps or GPS Devices www.FrederickLane.com www.ComputerForensicsDigest.com
  • 11. Digital Investigation by You and Your Agents • Attorneys Are Not Witnesses • The Perils of Digital Investigations – Rule 4.1 – Truthfulness in Statements to Others – Rule 4.2 – Communication with Person Represented by Counsel – Rule 5.3 – Responsibility Regarding Non- Lawyer Assistant – Rule 8.4 – Misconduct • See Previous Slide (Similar Legal Risks) www.FrederickLane.com www.ComputerForensicsDigest.com
  • 12. Electronic Discovery and Subpoenas • VRCP 16.2 – Scheduling orders may provide for e-discovery • VRCP 26(b)(1) – No duty to provide discovery if inaccessible because of undue burden or cost • VRCP 33(c) – it is sufficient to specify business records from which information can be derived • VRCP 34 – Covering production and form of electronic data www.FrederickLane.com www.ComputerForensicsDigest.com
  • 13. Electronic Discovery and Subpoenas • VRCP 37 – No sanction for destruction of data by “routine, good- faith” operation of device • VRCP 45 – Rules governing subpoena of electronic data • Compelling production of passwords • Obtaining electronic data from online service providers www.FrederickLane.com www.ComputerForensicsDigest.com
  • 14. Digital Forensics in Divorce Cases • Defining Digital Forensics – Mobile, Computer, Network, Cloud • The Great “Delete” Myth • Relevant Data, Installed Programs and Internet History • Discovery Issues – Ownership, Invasion of Privacy, Burden • Time Is of the Essence www.FrederickLane.com www.ComputerForensicsDigest.com
  • 15. Digital Behavior During and Post-Divorce • Your Client’s Posts Can and Will Be Used in a Court of Law • Electronic Contact with Minor Children • Cyberstalking and Cyberharrassment • Digital Child Custody and Electronic Co-Parenting www.FrederickLane.com www.ComputerForensicsDigest.com
  • 16. Contact Information • Please Visit My Web Sites: – www.ComputerForensicsDigest.com – www.FrederickLane.com – www.CybertrapsfortheYoung.com • Send Me an Email: – FSLane3@gmail.com • Call Me: – 802-318-4604 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 17. Divorce in the Digital Era What Every Divorce Lawyer Needs to Know About Electronic Discovery, Internet Investigations, and Computer Forensics Frederick S. Lane Vermont Family Law Conference 15 February 2013 www.FrederickLane.com www.ComputerForensicsDigest.com