Complete 2012 forensic audit documents - Kansas Bioscience ...
Complete 2012 forensic audit documents - Kansas Bioscience ...
Complete 2012 forensic audit documents - Kansas Bioscience ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Mr. Eisenbrandt, Thornton’s attorney, stated that he was unaware of the removal or wiping of<br />
information from Thornton’s KBA-owned computer until notified by BKD. When interviewed<br />
on August 24, 2011, Mr. Thornton indicated that he had removed information from KBA-owned<br />
computer and then used wiping software to remove data from the hard drive. Mr. Thornton<br />
indicated that he did so because he was concerned that representatives of the State of <strong>Kansas</strong><br />
would be involved in the review of the computer’s content and would possibly be politically<br />
motivated to inappropriately construe or use its contents. Mr. Thornton indicated that he had<br />
used the KBA-owned computer for his personal use and that it contained personal financial and<br />
tax information, family photos and other information of a personal nature, some of which would<br />
be embarrassing if made public. 81 BKD requested to analyze the USB device utilized to remove<br />
information from the KBA-owned computer and any computer to which that device was<br />
subsequently connected. Mr. Thornton indicated that he would consider that request. However,<br />
as of the date of this report, the USB device and computer have not been provided.<br />
Mr. Thornton’s computer would synchronize or “back up” to the server when connected.<br />
However, David O’Dell of Summit Computer Solutions, KBA’s external IT provider, indicated<br />
to BKD that the user could define or select which folders and files would automatically back up<br />
when connected to the server. BKD reviewed the information stored on KBA server from the<br />
last back up of Mr. Thornton’s KBA computer. The folders and files contained information<br />
related to various KBA operations and initiatives, none of which were determined to be of an<br />
inappropriate nature given their content. However, there is evidence on Thornton’s KBA<br />
computer of files that once resided on the computer that are not found to be present on the server.<br />
Therefore, BKD cannot verify that all files on the Thornton computer were backed up to the<br />
server. It remains possible that files containing information important to the results of the<br />
Forensic Audit were never backed up to the server and were wiped from Thornton’s computer.<br />
In summary, Mr. Thornton resigned from KBA on April 13, 2011 and removed and/or destroyed<br />
information stored on his KBA-owned computer prior to returning it to KBA on April 26, 2011.<br />
KBA’s General Counsel, Tariq Abdullah, indicated that KBA does not have to comply with the<br />
document retention requirements of the <strong>Kansas</strong> State Historical Society as the State’s record<br />
retention laws do not apply to an “independent instrumentality of the State.” KBA’s Retention<br />
Policy indicates that “In the event of a governmental <strong>audit</strong>, investigation, or pending litigation,<br />
record disposal may be suspended at the direction of the CFO/COO.” According to Mr.<br />
Abdullah, Ms. Katterhenry made an announcement at a staff meeting on April 8, 2011 that a<br />
litigation hold was in place; however, Thornton was not in attendance at that meeting. The<br />
written dissemination of the litigation hold was transmitted as a reminder via email on May 5,<br />
2011, which was after Thornton had resigned and no longer had access to his email. Please see<br />
Exhibit 40 for the described emails. 82<br />
81 Based on BKD’s computer <strong>forensic</strong> procedures, we discovered certain file remnants and file descriptions that<br />
could be consistent with files containing pornography. However, no pornographic images were found on the<br />
computer.<br />
82 KBA received a subpoena from the Johnson County District Attorney’s Office on April 20, 2011.<br />
102