25.01.2015 Views

Digital Contraband Finding Child Porn in the ... - Stroz Friedberg

Digital Contraband Finding Child Porn in the ... - Stroz Friedberg

Digital Contraband Finding Child Porn in the ... - Stroz Friedberg

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Even if an employee did not <strong>in</strong>tentionally “save” illegal images onto a company<br />

computer, <strong>the</strong> images may still be stored <strong>the</strong>re. Images viewed on web pages are<br />

automatically saved to a browser cache folder and stored on <strong>the</strong> user’s hard drive until <strong>the</strong><br />

contents are overwritten or deleted. Evidence from such browser caches have been used<br />

to convict <strong>in</strong>dividuals of possession of child pornography, particularly when <strong>the</strong> user has<br />

shown a sophisticated understand<strong>in</strong>g of his computer, even <strong>in</strong> <strong>the</strong> absence of evidence<br />

that <strong>the</strong> defendant affirmatively saved images to his hard drive. 21<br />

One predicament that can confound counsel is <strong>the</strong> unearth<strong>in</strong>g of child porn <strong>in</strong> <strong>the</strong><br />

course of electronic discovery. Dur<strong>in</strong>g that process <strong>the</strong> graphic files may also have been<br />

<strong>in</strong>cluded <strong>in</strong> data produced to counsel for review or uploaded onto a litigation review<br />

database. In those circumstances, <strong>the</strong> media polluted by <strong>the</strong> child porn images may be<br />

accessible to many people and, at <strong>the</strong> same time, may be critical to meet<strong>in</strong>g legal<br />

obligations of <strong>the</strong> company. This highlights <strong>the</strong> importance of ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g accurate<br />

records that track both <strong>the</strong> orig<strong>in</strong> and disposition of data as it is collected and processed <strong>in</strong><br />

electronic discovery projects. Moreover, evaluat<strong>in</strong>g <strong>the</strong> file types necessary for extraction<br />

and process<strong>in</strong>g at <strong>the</strong> outset of an electronic discovery project -- and exclud<strong>in</strong>g graphic<br />

file formats from process<strong>in</strong>g and upload to <strong>the</strong> litigation review database -- can spare <strong>the</strong><br />

company any issue that <strong>the</strong> database has been polluted with child porn. In <strong>the</strong> worst case<br />

scenario, however, where copies of contraband images have found <strong>the</strong>ir way <strong>in</strong>to<br />

litigation-critical media or databases, counsel can work out a protocol with law<br />

enforcement to purge <strong>the</strong> copies of <strong>the</strong> images with m<strong>in</strong>imal disruption to <strong>the</strong> review<br />

process.<br />

F<strong>in</strong>ally, when <strong>the</strong> matter is referred to law enforcement, how can confidential,<br />

bus<strong>in</strong>ess-related data be protected when that data is located on <strong>the</strong> same hard drive with<br />

<strong>the</strong> child porn Companies may be reluctant to make law enforcement referrals <strong>in</strong> part<br />

due to <strong>the</strong> distraction of cooperat<strong>in</strong>g with a crim<strong>in</strong>al <strong>in</strong>vestigation and <strong>the</strong> potential for<br />

bad publicity, but <strong>the</strong>y are also greatly concerned that such cooperation will require<br />

disclosure of confidential bus<strong>in</strong>ess <strong>in</strong>formation. None<strong>the</strong>less, <strong>the</strong> alternatives of ignor<strong>in</strong>g<br />

illegal images, transferr<strong>in</strong>g <strong>the</strong>m, or destroy<strong>in</strong>g <strong>the</strong>m carries significant risk of crim<strong>in</strong>al<br />

liability for possession or distribution of child pornography, destruction of evidence, and<br />

obstruction of justice.<br />

Segregat<strong>in</strong>g bus<strong>in</strong>ess data from <strong>the</strong> suspected child porn images to be turned over<br />

to law enforcement may not be possible. Law enforcement will likely want to take<br />

custody of <strong>the</strong> entire hard drive or o<strong>the</strong>r media on which <strong>the</strong> contraband was found. If a<br />

company is concerned about privileged documents or sensitive bus<strong>in</strong>ess records that exist<br />

on a hard drive that is be<strong>in</strong>g turned over to law enforcement, a company may want to<br />

negotiate a protocol with <strong>the</strong> <strong>in</strong>vestigat<strong>in</strong>g law enforcement agency to ma<strong>in</strong>ta<strong>in</strong> a copy of<br />

<strong>the</strong> bus<strong>in</strong>ess-related data. Alternatively, <strong>the</strong> company may want to negotiate a protocol to<br />

redact its bus<strong>in</strong>ess-related data from <strong>the</strong> media before turn<strong>in</strong>g it over to law enforcement,<br />

or restrict law enforcement’s exam<strong>in</strong>ation just to <strong>the</strong> images at issue. In any of <strong>the</strong>se<br />

scenarios, company lawyers and law enforcement may want to seek direction from <strong>the</strong><br />

court. 22 Separate from any handl<strong>in</strong>g protocols, <strong>the</strong> company also may want to seek a<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!