Jannica Houben and Katarzyna Golonka on Complex Investigations
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of November 3-9. Here’s what’s...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
U.S. Eleventh Circuit Court of Appeals - Parrott v. Neway - bankruptcy, appeal, timeliness - Muscogee (Creek) Nation v. Rolin - tribal immunity - Hornady v. Outekumpu Stainless - default judgment sanction - USA...more
One will be forgiven for not closely following the myriad crypto developments in recent years. Mixed signals from regulators have complicated matters: some cryptocurrencies may be securities, some are commodities, some...more
1. THE ATTORNEY-CLIENT PRIVILEGE - Historically, the attorney-client privilege developed upon two assumptions: (1) good legal assistance requires full disclosure of a client’s legal problems; and (2) a client will only...more
If you’re an attorney, a paralegal, an investigator, a law enforcement officer, or even if you just watch a lot of legal dramas on television, you’re likely familiar with the term “chain of custody”....more
This course will cover: - Different types of engineering analyses - Steps in root cause failure analysis - The importance of the chain of custody - How a failure analysis lab can contribute to Subrogation matters...more
Conducting ediscovery in Outlook may be tempting – but although it’s a free and familiar tool, it carries risks and limitations for document review. Email continues to be the primary source of electronic evidence in...more
Data migration is a critical process that involves transferring data from one location, format, or application to another. Typically, this occurs when an organization introduces a new system or location for its data, often...more
New technologies, regulatory shifts, and an evolving economic landscape are transforming the M&A process (again). According to the FTC, HSR filings in 2021 more than doubled from the previous year, reaching a total of 3,644. ...more
Whether a property damage loss involves vehicle impact, structural collapse, construction defect, equipment failure, fire or explosion, hail, lightning, storm, animal activity, or water, at some point the expert may need to...more
Editor’s Note: On May 18, 2022, HaystackID shared an educational webcast developed to highlight the foundational basics of blockchain, cryptocurrencies, and NFTs and to present practical considerations for the investigational...more
You’re about to begin a complex investigation. What should you be thinking about? What should your first steps be? And what tricks of the trade are there? To find out we spoke with Tech Data’s Jannica Houben, Vice President...more
Sometimes, I like to take a topic I’ve written about before and revisit it to discuss how the topic has changed and evolved over time. I’ve been working in litigation support and eDiscovery long enough (over 35 years) that...more
The Arkansas Department of Energy and Environment – Division of Environmental Quality (“DEQ”) and the City of Magazine, Arkansas, (“Magazine”) entered into a February 10th Consent Administrative Order (“CAO”) addressing...more
On December 23, 2020, the Securities and Exchange Commission (SEC or Commission) issued a statement (Statement) regarding the custody of digital assets that are “securities” under the federal securities laws. The Statement...more
TLS experts Jon Langton and Joseph Marra were pleased to be invited as guests on a podcast published by the International Legal Technology Association (ILTA). The episode, “Forensic Collections in a ‘WFH’ World,” features...more
Prosecutors offer Facebook posts to show that a gang leader “green lighted” the hatchet killing of a homeless man for “snitching” on him. A plaintiff in an Internet stalking case offers the hundreds of abusive emails she...more
Notwithstanding containment efforts, the coronavirus has spread worldwide. According to a recent McKinsey & Co. report, the U.S. economy could be in a state of recovery until as late as 2023. The hardest-hit sectors –...more
The left side of the EDRM (Identify, Preserve, and Collect) is the least expensive part of the eDiscovery process however, it can hold the biggest value because improper collections can result in having to repeat the entire...more
It was a year filled with tantalizing tidbits and many loose ends. 2019 marked the 10th year since blockchain technology was released into the wild by its still unknown inventor, Satoshi Nakamoto, who mined the first bitcoin...more
So far you have probably only heard of blockchain in connection with financial transactions and Bitcoins. Well, that should change soon. Blockchain is the catch-all term for technology that permanently records transactions...more
With 2018 now behind us, it is a great time to look back on last year’s most influential eDiscovery cases. The final blog of this four-part series covers cases pertaining to possession, custody, and control....more