February 19, 2010 | Corporate Counsel
Does Discarding Unallocated Space Deserve Contempt?In a recent decision a Delaware court found a defendant in contempt of court for wiping the unallocated space of the hard drive of his work computer. Attorney Leonard Deutchman argues the order is suspect and places a dubious value on the computer equivalent of a wastepaper basket.
By Leonard Deutchman
12 minute read
June 12, 2012 | The Legal Intelligencer
Thinking Ahead in E-Discovery: Taking the Lead to Control CostsEvery day I talk with attorneys who must produce e-discovery. Sometimes the conversations are global in scope, other times narrowly focused, but they are all about answering the same question:
By Leonard Deutchman
10 minute read
February 12, 2013 | The Legal Intelligencer
Structuring the Computer Search Warrant and SearchingIn In re Application for Search Warrant, No. 2010-479 (December 14, 2012), the Vermont Supreme Court upheld the issuance of a search warrant for a residence that contained numerous "ex ante or prospective conditions" structuring how law enforcement was to conduct the search of computers found therein.
By Leonard Deutchman
9 minute read
May 01, 2012 | The Legal Intelligencer
Ninth Circuit CFAA Case May Draw High Court ReviewIn United States v. Nosal, No. 10-10038, 2012 U.S. App. LEXIS 7151(9th Cir. Apr. 10, 2012), the U.S. Court of Appeals for the Ninth Circuit, en banc, held that the prohibition against "exceed[ing] authorized access" to a computer under the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. §1030, which provides both criminal and civil penalties for such action, does not apply when an employee has been granted access to the company computer infrastructure but uses that access, against company policy and the obvious interests of the company, to copy valuable, confidential information in order to take business from the company.
By Leonard Deutchman
8 minute read
July 19, 2011 | The Legal Intelligencer
E-Discovery Cooperation - Catching More Flies With Honey, Part IIIn last week's column, we discussed why cooperation in producing e-discovery is in the enlightened self-interest of discovery requestors and producers both.
By Leonard Deutchman
9 minute read
June 12, 2006 | The Legal Intelligencer
When Computer Usage Policies Create Waivers of PrivacyBanners, policy handbooks and other places where businesses set forth the terms by which employees can use business computers and networks are as much a fact of business life today as the computers we use. Typically, business policies preclude employees f
By Leonard Deutchman
6 minute read
October 02, 2012 | The Legal Intelligencer
Personal Devices in the Workplace Provide Legal, Technical ChallengesBring Your Own Device, or "BYOD," is the phrase and acronym frequently used now to describe the ascension into the workplace of personal devices.
By Leonard Deutchman
12 minute read
April 19, 2011 | The Legal Intelligencer
Producing Metadata in E-Discovery: When Does De Facto Become De Jure?In National Day Laborer Organizing Network v. U.S. Immigration and Customs Enforcement Agency, U.S. District Judge for the Southern District of New York Shira A. Scheindlin, author of the highly-influential Zubulake and Pension Committees opinions and one of the most respected jurists writing about e-discovery matters, held that not only must metadata be produced when e-files are being produced in discovery, but that such data must be produced in a "load file" to make accessing the produced data easier for the requesting side.
By Leonard Deutchman
14 minute read
August 14, 2006 | The Legal Intelligencer
Uncivil ProcedureIt should surprise no one that Internet service providers such as AOL, EarthLink, Comcast, Verizon, Yahoo or Gmail are, increasingly, rich sources of information in complex criminal and civil matters.
By Leonard Deutchman
7 minute read
February 19, 2013 | The Legal Intelligencer
Structuring the Computer Search Warrant and Searching, Part IIIn Part I of the analysis of computer search warrants, we discussed how the restrictive conditions imposed by the Vermont Supreme Court upon the search of a PC and an iPad in In re Application for Search Warrant, No. 2010-479 (December 14, 2012), might be constitutionally permissible. In Parts II and III, we will review those conditions.
By Leonard Deutchman
13 minute read
Trending Stories