Sign up, and you'll be able to customize your font size and more! Sign up
Jul 28, 2015
10:23:04pm
And I would present CLE's on the topic. The most common factor during those CLE
was the fact that neither litigators nor IP litigators had much (if any) understanding of what tools were available to them, and almost none of them understood the mechanisms by which those tools were implemented.

The most frustrating part was when they'd give something to their IT department, who would promptly violate both the chain of custody (thus, bringing on spoliation), and data validity. Or they'd try to extract the information themselves, not understanding that the very act of powering up the device would alter the data of hundreds of files, once again killing any chance of succeeding in court. Their preservation letters were woefully inadequate for cyber security or data breaches, especially when rogue employees were suspected.
This message has been modified
Originally posted on Jul 28, 2015 at 10:23:04pm
Message modified by BluePete on Jul 28, 2015 at 10:23:52pm
Message modified by BluePete on Jul 28, 2015 at 10:25:29pm
Message modified by BluePete on Jul 28, 2015 at 10:31:38pm
Message modified by BluePete on Jul 28, 2015 at 10:32:28pm
Message modified by BluePete on Jul 28, 2015 at 10:44:54pm
Message modified by BluePete on Jul 28, 2015 at 10:46:41pm
BluePete
New username
MMM
Bio page
BluePete
Joined
Jul 20, 2002
Last login
Aug 2, 2015
Total posts
0 (0 FO)
Messages
Author
Time

Posting on CougarBoard

In order to post, you will need to either sign up or log in.