17.03.2014 Views

Complete 2012 forensic audit documents - Kansas Bioscience ...

Complete 2012 forensic audit documents - Kansas Bioscience ...

Complete 2012 forensic audit documents - Kansas Bioscience ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mr. Eisenbrandt, Thornton’s attorney, stated that he was unaware of the removal or wiping of<br />

information from Thornton’s KBA-owned computer until notified by BKD. When interviewed<br />

on August 24, 2011, Mr. Thornton indicated that he had removed information from KBA-owned<br />

computer and then used wiping software to remove data from the hard drive. Mr. Thornton<br />

indicated that he did so because he was concerned that representatives of the State of <strong>Kansas</strong><br />

would be involved in the review of the computer’s content and would possibly be politically<br />

motivated to inappropriately construe or use its contents. Mr. Thornton indicated that he had<br />

used the KBA-owned computer for his personal use and that it contained personal financial and<br />

tax information, family photos and other information of a personal nature, some of which would<br />

be embarrassing if made public. 81 BKD requested to analyze the USB device utilized to remove<br />

information from the KBA-owned computer and any computer to which that device was<br />

subsequently connected. Mr. Thornton indicated that he would consider that request. However,<br />

as of the date of this report, the USB device and computer have not been provided.<br />

Mr. Thornton’s computer would synchronize or “back up” to the server when connected.<br />

However, David O’Dell of Summit Computer Solutions, KBA’s external IT provider, indicated<br />

to BKD that the user could define or select which folders and files would automatically back up<br />

when connected to the server. BKD reviewed the information stored on KBA server from the<br />

last back up of Mr. Thornton’s KBA computer. The folders and files contained information<br />

related to various KBA operations and initiatives, none of which were determined to be of an<br />

inappropriate nature given their content. However, there is evidence on Thornton’s KBA<br />

computer of files that once resided on the computer that are not found to be present on the server.<br />

Therefore, BKD cannot verify that all files on the Thornton computer were backed up to the<br />

server. It remains possible that files containing information important to the results of the<br />

Forensic Audit were never backed up to the server and were wiped from Thornton’s computer.<br />

In summary, Mr. Thornton resigned from KBA on April 13, 2011 and removed and/or destroyed<br />

information stored on his KBA-owned computer prior to returning it to KBA on April 26, 2011.<br />

KBA’s General Counsel, Tariq Abdullah, indicated that KBA does not have to comply with the<br />

document retention requirements of the <strong>Kansas</strong> State Historical Society as the State’s record<br />

retention laws do not apply to an “independent instrumentality of the State.” KBA’s Retention<br />

Policy indicates that “In the event of a governmental <strong>audit</strong>, investigation, or pending litigation,<br />

record disposal may be suspended at the direction of the CFO/COO.” According to Mr.<br />

Abdullah, Ms. Katterhenry made an announcement at a staff meeting on April 8, 2011 that a<br />

litigation hold was in place; however, Thornton was not in attendance at that meeting. The<br />

written dissemination of the litigation hold was transmitted as a reminder via email on May 5,<br />

2011, which was after Thornton had resigned and no longer had access to his email. Please see<br />

Exhibit 40 for the described emails. 82<br />

81 Based on BKD’s computer <strong>forensic</strong> procedures, we discovered certain file remnants and file descriptions that<br />

could be consistent with files containing pornography. However, no pornographic images were found on the<br />

computer.<br />

82 KBA received a subpoena from the Johnson County District Attorney’s Office on April 20, 2011.<br />

102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!