29.10.2014 Views

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />

© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />

A lawyer managing electr<strong>on</strong>ic discovery is obliged to do more than just tell their clients to<br />

“produce the e-mail.” You’ve got to make an effort to understand their systems and<br />

procedures and ask the right questi<strong>on</strong>s, as well as know when you aren’t getting the right<br />

answers. That’s asking a lot, but 95% of all business documents are born digitally and few<br />

are ever printed. Almost seventy billi<strong>on</strong> e-mails traverse the Internet daily, far more than<br />

teleph<strong>on</strong>e and postal traffic combined, and the average business pers<strong>on</strong> sends and receives<br />

between 50 and 150 e-mails every business day. E-mail c<strong>on</strong>tributes 500 times greater<br />

volume to the Internet than web page c<strong>on</strong>tent. In discovery, it’s increasingly infeasible to put<br />

enough pairs of trained eyes in fr<strong>on</strong>t of enough computers to thoroughly review every e-mail.<br />

Much as we might like, we lawyers can’t put our heads under our pillows and hope that it all<br />

goes away. The volume keeps increasing, and there’s no end in sight.<br />

Test Your E.Q.<br />

While I’m delivering bad news, let me share worse news: if you d<strong>on</strong>’t change the way your<br />

business clients do business by persuading them to initiate and enforce web- and e-mail<br />

usage restricti<strong>on</strong>s with an ir<strong>on</strong> fist, complete with Big Brother-style m<strong>on</strong>itoring, you will fail to<br />

locate and produce a sizable part of your clients’ electr<strong>on</strong>ic communicati<strong>on</strong>s--and you w<strong>on</strong>’t<br />

even know you missed them until you see examples attached to opposing counsel’s moti<strong>on</strong><br />

for sancti<strong>on</strong>s. Of course, e-mail enabled cell ph<strong>on</strong>es like the Blackberry, Treo and other<br />

PDAs present pitfalls, but I’m also alluding to the digital channels that fall outside your client’s<br />

e-mail server and back up tape system, like Instant Messaging, browser based e-mail and<br />

voice messaging.<br />

Suppose opposing counsel serves a preservati<strong>on</strong> letter or even a restraining order requiring<br />

your client to preserve electr<strong>on</strong>ic messaging. You c<strong>on</strong>fidently assure opposing counsel and<br />

the court that your client’s crack team of informati<strong>on</strong> technologists will faithfully back up and<br />

preserve the data <strong>on</strong> the e-mail servers. You’re more tech-savvy than most, so you even<br />

think to suspend the recycling of back up tapes. But are you really capturing all of the<br />

discoverable communicati<strong>on</strong>s? How much of the ‘Net is falling outside your net?<br />

Can you answer these questi<strong>on</strong>s about your client’s systems?<br />

• Do all discoverable electr<strong>on</strong>ic communicati<strong>on</strong>s come in and leave via the company’s e-<br />

mail server?<br />

• Does your client’s archival system capture e-mail stored <strong>on</strong> individual user’s hard<br />

drives, including company-owned laptops?<br />

• Do your clients’ employees use pers<strong>on</strong>al e-mail addresses or browser-based e-mail<br />

services (like Gmail or Yahoo Mail) for business communicati<strong>on</strong>s?<br />

• Do your clients’ employees use Instant Messaging <strong>on</strong> company computers or over<br />

company-owned networks?<br />

• How do your clients’ voice messaging systems store messages, and how l<strong>on</strong>g are they<br />

retained?<br />

Troubled that you can’t answer some of these questi<strong>on</strong>s? You should be, but know you’re<br />

not al<strong>on</strong>e. If your client runs a large network, capturing all the messaging traffic is a<br />

<strong>Page</strong> 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!