03
Feb

Is there digital evidence that needs examination in my case?

Ask yourself a simple question: “Do I know how to identify the presence of digital evidence in my case?” .  And then you should ask another question. “If I overlook the presence of digital evidence, am I doing my job well ? Am I providing the best defence to my client? Am I doing my due diligence? ” Most solicitors I first spoke to were surprised with the answers they ended up giving themselves. When in doubt, ASK ! Experts are there for solicitors to use them. And the best advice is to ask as early as possible, not let…
14
Feb

Video Surveillance as Legal Evidence

The law is often said to be formalized, rigid in its formulation and slow to evolve. Advances made in science and technology, now quicker in evolution, seem to always bring new challenges to the legal industry. Technology has clearly changed law enforcement over the last 20 years. It has become an integral part of a police officer’s daily work life, from use of social network sites to keep citizens aware of what is occurring in the community to the use of sophisticated recording devices for undercover operations. With the advent of new technology in law enforcement, such as the use…
05
Apr

Famous Cases Involving Digital Forensics

2000 Michelle Theer E-mails document the conspiracy to murder her husband On Dec. 17, 2000, John Diamond shot and killed Air Force Capt. Marty Theer. "There [was] no direct evidence, no eyewitness evidence. There is no physical evidence. There is no confusion," said Theer's attorney Daniel Pollitt<ref>http://www.wral.com/news/local/story/1061742/ </ref> after the conviction. But what prosecutors did have was 88,000 e-mails and instant messages on Theer's computer, including personal ads that Theer had written in 1999, web-mail that she had written in response to those ads, clear evidence of a sexual relationship between Theer and Diamond, and messages documenting the conspiracy to…
14
Dec

Is my Employee stealing confidential company information?

In simpler times, a devious employee would have to devote countless hours and energy into stealing pertinent information from their Company. In the current technologically driven age where nearly all Company files (financial statements, trade secrets) are stored electronically, one can never be absolutely certain if employees are secretly stealing company information. Electronic documents are easy to copy and are naturally more prone to theft than old fashioned hard-copy documents. In prior posts we discussed the importance of limiting access to confidential Company information by creating passwords and other various precautionary measures, which is certainly a good starting point. However,…
14
Dec

Legal recourse after employee data theft has occurred

In previous blog posts we covered the in’s and out’s regarding employee’s stealing confidential company information (hyperlink) and the role of forensics after employee data theft has occurred (hyperlink). To provide some context, we discussed how having the most efficient and thorough internal policy or preventive measures in place can still result in employee data theft. It may be unsettling to realize that a resourceful and persistent employee may inevitably be able to steal Company data. The role of computer forensics is pivotal in helping to gather information and evidence about the perpetrator, which enables the employer to seek legal…