Electronic Data Discovery: Integrating Due Process into Cyber Forensic Practice

نویسندگان

  • John W. Bagby
  • John C. Ruhnka
چکیده

Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as it becomes a predominant and potentially costly pre-trial activity pivotal to modern litigation. This article discusses these constraints while identifying opportunities for the interdisciplinary activities among litigators, forensic experts and information technology professionals.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development and Delivery of Coursework: Legal/Regulatory/Policy Environment of Cyber-Forensics

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evide...

متن کامل

Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evide...

متن کامل

Specializing CRISP-DM for Evidence Mining

The use of all forms of computer and communication devices is changing human interaction and thinking. Electronic traces of actions and activities are continually being left behind most often unknowingly so. This situation creates opportunities for criminal investigators to make use of these traces and marks to uncover evidence. In this evidentiary discovery process several problems are experie...

متن کامل

Cyber Forensics in Kerala

Computers and mobile devices have created a niche for themselves in the digital communication stratosphere. With the advance of technology, the power of these devices has increased leaps and bounds. Due to this growing popularity, computers and mobile devices have plunged into criminal activities also. Drug dealers, rapists and murderers across the State have been caught based on the electronic...

متن کامل

Scope of Practice of Forensic Midwifery: An Integrative Review

Background & aim: Forensic midwifery is a new major which has been established in response to the need of endangered women for forensic services and also the lack of service provision in this domain. However, there are ambiguities in the definition of this major and its scope of practice. The present study was conducted to investigate the scope of practice in forensic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDFSL

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2006