Technology: To image, or not to image, that is the question
If Hamlet had also been legal counsel for the Kingdom of Denmark, what would he have said in contemplating whether to image or not to image the hard drives of the castles computers for a legal hold?
January 10, 2014 at 03:59 AM
11 minute read
The original version of this story was published on Law.com
If computers, hard drives and e-discovery had existed in 17th century England, and if Shakespeare's character Hamlet — the son of the Danish King in the eponymous play — had also been legal counsel for the Kingdom of Denmark, what would he have said in contemplating whether to image or not to image the hard drives of the castle's computers for a legal hold?
Perhaps some of the same things as in his “To be or not to be” soliloquy.
“Whether 'tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles, and by opposing end them?” Should I suffer the slings and arrows that opposing counsel and the court may cast my way if I don't extract and preserve an exact copy of every bit of information on a custodian's hard drive? Or will a targeted extraction and copying of particular files be sufficient?
“To die, to sleep, to sleep perchance to dream; aye, there's the rub, for in that sleep of death, what dreams may come, when we have shuffled off this mortal coil, must give us pause.” If I image the drives, will I only suffer other problems — and unnecessarily so if there was really no need to undertake the imaging — such as incurring the costs of making images and the potential impacts of over-preservation, including the costs of storing, processing, searching and reviewing the data?
To image, or not to image, that is the question.
Unlike Hamlet's decision, contemplating whether to make an image is rarely a matter of life and death. Nevertheless, it can be very important.
A “forensic,” “mirror” or “physical” image — all three terms are used — is an exact copy of a storage device, replicating all of its data bit for bit, including all active files and the remnants of “deleted” files. When a file is deleted, it is not actually erased, but the space that it occupied becomes “unallocated” space, i.e., space that can be overwritten with new data. Until unallocated space is overwritten with new data, it may contain deleted files or fragments that can be retrieved using forensic techniques. Similarly, “slack” space — the space between the end of a file and the end of the disk cluster in which it is stored—can hold fragments of “deleted” files.
Using the right tools and techniques, a technician or forensic analyst may restore and extract, either in whole or in part, deleted and older versions of files from traditional hard drives for lawyers' review. (This may be difficult or impossible to do from solid state drives, however, as the operating system may physically clear blocks of data no longer in use to ensure optimal performance in writing data.)
Additionally, a forensic analyst can conduct a forensic examination of the data that may reveal information such as Internet activity (e.g., websites visited, searches conducted, etc.); whether a thumb drive or external hard drive was connected and data copied to it; whether documents were altered or deleted; and whether the custodian used any applications to “wipe” data from the drive.
Forensic examinations have featured prominently in high-profile murder trials, revealing illicit affairs, searches for undetectable poisons and other methods of doing away with the victim. If Hamlet had the assistance of a forensic examiner, he might have been able to prove that his uncle Claudius had conducted a Google search for the poison he used to kill Hamlet's father, marry Hamlet's mother and usurp the throne. Instead, Hamlet had to rely upon a play to induce Claudius to reveal his treachery (“the play's the thing wherein I'll catch the conscience of the king”). Forensic examinations may also reveal the theft of trade secrets, efforts to forge or falsify documents, and efforts to destroy evidence and cover one's tracks.
When might you image a drive or other storage media instead of selectively copying files?
There are generally two sets of circumstances when imaging may be required or prudent: (1) When information relevant and important to the case can only be uncovered through some form of forensic recovery or examination; and (2) in high-stakes matters where a party wants to ensure the highest level of defensibility, particularly where the scope of the issues may evolve or change.
Cases involving thefts of intellectual property or trade secrets, criminal or regulatory enforcement actions, and cases where there is evidence that a custodian attempted to destroy relevant information can be good candidates for imaging at least some custodians' hard drives. It is also not uncommon in very high-stakes litigation for a party to make images of at least some key custodians' hard drives as part of an effort to minimize risks.
Nevertheless, as The Sedona Conference states in its Commentary on Legal Holds, obtaining a forensic image “is not, nor should it be, the default method of collection and preservation.” In most cases, there will simply be no need for data that can only be obtained through a forensic examination.
The costs of making images — usually several hundred dollars per hard drive—may not seem like much in small quantities. But they add up quickly. Some large cases involve hundreds of custodians. Large companies that are regularly involved in litigation can have many thousands of employees subject to legal holds at a given time. If you were to image all custodians' drives, it could mean costs in the six- to seven-figure range.
Consequently, Hamlet in all but exceptional circumstances may decide not to image the castle's drives. “And thus the native hue of resolution is sicklied o'er with the pale cast of thought, and enterprises of great pith and moment with this regard their currents turn awry, and lose the name of action.”
Hamlet's soliloquy ends with the approach of Ophelia. “Soft you now, the fair Ophelia! — Nymph, in thy orisons [prayers] be all my sins remembered.” Let's imagine Ophelia as an e-discovery technician. In her forensic images, may every file, and every keystroke, be remembered.
If computers, hard drives and e-discovery had existed in 17th century England, and if Shakespeare's character Hamlet — the son of the Danish King in the eponymous play — had also been legal counsel for the Kingdom of Denmark, what would he have said in contemplating whether to image or not to image the hard drives of the castle's computers for a legal hold?
Perhaps some of the same things as in his “To be or not to be” soliloquy.
“Whether 'tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles, and by opposing end them?” Should I suffer the slings and arrows that opposing counsel and the court may cast my way if I don't extract and preserve an exact copy of every bit of information on a custodian's hard drive? Or will a targeted extraction and copying of particular files be sufficient?
“To die, to sleep, to sleep perchance to dream; aye, there's the rub, for in that sleep of death, what dreams may come, when we have shuffled off this mortal coil, must give us pause.” If I image the drives, will I only suffer other problems — and unnecessarily so if there was really no need to undertake the imaging — such as incurring the costs of making images and the potential impacts of over-preservation, including the costs of storing, processing, searching and reviewing the data?
To image, or not to image, that is the question.
Unlike Hamlet's decision, contemplating whether to make an image is rarely a matter of life and death. Nevertheless, it can be very important.
A “forensic,” “mirror” or “physical” image — all three terms are used — is an exact copy of a storage device, replicating all of its data bit for bit, including all active files and the remnants of “deleted” files. When a file is deleted, it is not actually erased, but the space that it occupied becomes “unallocated” space, i.e., space that can be overwritten with new data. Until unallocated space is overwritten with new data, it may contain deleted files or fragments that can be retrieved using forensic techniques. Similarly, “slack” space — the space between the end of a file and the end of the disk cluster in which it is stored—can hold fragments of “deleted” files.
Using the right tools and techniques, a technician or forensic analyst may restore and extract, either in whole or in part, deleted and older versions of files from traditional hard drives for lawyers' review. (This may be difficult or impossible to do from solid state drives, however, as the operating system may physically clear blocks of data no longer in use to ensure optimal performance in writing data.)
Additionally, a forensic analyst can conduct a forensic examination of the data that may reveal information such as Internet activity (e.g., websites visited, searches conducted, etc.); whether a thumb drive or external hard drive was connected and data copied to it; whether documents were altered or deleted; and whether the custodian used any applications to “wipe” data from the drive.
Forensic examinations have featured prominently in high-profile murder trials, revealing illicit affairs, searches for undetectable poisons and other methods of doing away with the victim. If Hamlet had the assistance of a forensic examiner, he might have been able to prove that his uncle Claudius had conducted a
When might you image a drive or other storage media instead of selectively copying files?
There are generally two sets of circumstances when imaging may be required or prudent: (1) When information relevant and important to the case can only be uncovered through some form of forensic recovery or examination; and (2) in high-stakes matters where a party wants to ensure the highest level of defensibility, particularly where the scope of the issues may evolve or change.
Cases involving thefts of intellectual property or trade secrets, criminal or regulatory enforcement actions, and cases where there is evidence that a custodian attempted to destroy relevant information can be good candidates for imaging at least some custodians' hard drives. It is also not uncommon in very high-stakes litigation for a party to make images of at least some key custodians' hard drives as part of an effort to minimize risks.
Nevertheless, as The Sedona Conference states in its Commentary on Legal Holds, obtaining a forensic image “is not, nor should it be, the default method of collection and preservation.” In most cases, there will simply be no need for data that can only be obtained through a forensic examination.
The costs of making images — usually several hundred dollars per hard drive—may not seem like much in small quantities. But they add up quickly. Some large cases involve hundreds of custodians. Large companies that are regularly involved in litigation can have many thousands of employees subject to legal holds at a given time. If you were to image all custodians' drives, it could mean costs in the six- to seven-figure range.
Consequently, Hamlet in all but exceptional circumstances may decide not to image the castle's drives. “And thus the native hue of resolution is sicklied o'er with the pale cast of thought, and enterprises of great pith and moment with this regard their currents turn awry, and lose the name of action.”
Hamlet's soliloquy ends with the approach of Ophelia. “Soft you now, the fair Ophelia! — Nymph, in thy orisons [prayers] be all my sins remembered.” Let's imagine Ophelia as an e-discovery technician. In her forensic images, may every file, and every keystroke, be remembered.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllUS Reviewer of Foreign Transactions Sees More Political, Policy Influence, Say Observers
Pre-Internet High Court Ruling Hobbling Efforts to Keep Tech Giants from Using Below-Cost Pricing to Bury Rivals
6 minute readPreparing for 2025: Anticipated Policy Changes Affecting U.S. Businesses Under the Trump Administration
Senate Panel Postpones Vote on Reconfirmation of Democrat Crenshaw to SEC
Trending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250