eDiscovery
A brief introduction to eDiscovery
What is
it?
Electronic
discovery involves the exchange of data between parties whom are in civil or
criminal litigation.
Example;
a company investigating a worker who is suspected of stealing files.
tip: To conduct a successful enquiry there is a need for efficiency and organisation as deadlines are tight and delay costs highly, keep in mind that organisations will want to know what you are doing at all times, so documentation is essential!
Law
Law
is a huge aspect, the investigation MUST follow UK law, meaning ACPO guidelines. I will upload these in a separate document, however they are available from here.
Pre-investigation
Before
starting there should be a meeting with the clients and IT staff as you need to
know how the business runs; this meeting should also involve an asset inventory
check.
Case example: A CEO
had been accused of stealing documents and provides a laptop for investigation
upon which nothing is found. However, an asset inventory check reveals that the
CEO had two laptops, the second having the relevant data.
Note: BE CAREFUL, you do not know
who is trying to hinder your investigation.
before
starting, there should also be a clear outline of what will be done. This will
include things such as keywords, data ranges and media that will be searched.
This should also include the price.
Create
a list of the custodians who will be investigated and include details such as
their image data, email in GB on laptop, desktop, home etc. Although this will
be updated and new custodians may be added as the investigation begins and
continues, it will have benefits.
Benefits
include:
Saving
time
may
aid in identifying evidence, for example, John Smith has significantly more GB
on email compared to other custodians in same job role
allows
for data to avoid being mixed up and wrong custodians having data tied to them
The five locations typical in e-discovery
Workstation
environment (e.g home laptops)
PDAs
such as Mobiles- currently on the increase
Removable
media- USBs
Server
environment- Email (often contains VERY useful information)
Backup
environment- disaster backups
You
should also ask about previous investigations as data may have already been
preserved.
Finally...Interview
the custodians; determine
what they own, how they store data, do they email?
note: if they say one laptop but asset inventory shows two then this is a good indication of something suspicious
tip: When interviewing, it is
best not to give away all the information you have. Rather than tell custodian
what they were going at 10pm, ask. This way you can gauge how deceitful they
are being.
Comments
Post a Comment