Introduction
Introduction
a b c
Section 1: Introduction
Introduction
Information technology has come a long way such that virtually everything
we do, whether at work or leisure, is connected one way or another to a
digital device or platform. This is even more evident in modern corporate
working environments where virtually everyone has a digital workstation –
whether PC, laptop, tablet, smartphone, etc. Use of electronic and digital
devices leave traces, digital footprints, these digital footprints can be called
upon in legal proceedings when trying to prove or disprove a claim.
When digital devices (like PCs, smartphones, tablets) or platforms (like local
area networks, the Internet, social media) are used they generate data
which are stored there, this is the digital footprint, digital evidence. These
digital footprints are referred to as electronically stored information (ESI).
ESI can be of immense benefit when carrying out investigations, not just as
relates to an IT issue like a digital breach or attack, but also normal day-to-
day civil or criminal issues. However, there are legal guidelines pertaining
to how such digital evidence is to be handled and presented for it to be
accepted legally – this is where digital forensics and eDiscovery come in.
This course introduces eDiscovery.
There have been cases, of things like murder and kidnapping, that were
solved based on digital evidence. Digital evidence, like the location of a
suspect during the crime based on mobile phone data, history on search
engine on suspects’ systems on ways to kill and dispose of body or
drug/hypnotize a person and so on, could be used to prove a suspect to be
guilty or could be used to establish innocence. There was a disturbing case
that occurred in Canada where a couple of teen boys raped and murdered a
teen girl. The culprits were apprehended based on digital evidence which
included GPS data of mobile phone at the time of the murder,
communication on messaging applications – notably a confession made on
online gaming platform World of Warcraft’s chat – to mention a few
(Kushner, 2011). Similarly in the case of Dr. Conrad Murray, digital
evidence in the form of iPhone call records was used by the prosecution
against the doctor. The call was played in the court which had a discussion
between the doctor and Michael Jackson prior to his death (Crimesider
Staff, 2011). In the case of Zubulake v. UBS Warbug LLC, digital evidence
was used to prove employer’s maltreatment of employee.
Digital Forensics
Normally digital evidence is meant to be presented in a court of law. As a
result, the evidence has to be collected and handled in a manner the court
finds acceptable for the evidence to be admissible. Digital forensics was
defined as the controlled extraction and analysis of legally admissible
evidence from digital devices by Defiance College (2017). The definition
alludes to the fact that the collection, processing and analysis of digital
evidence has to be done in a controlled manner so that the evidence does
not get contaminated; due care has to be taken when carrying out these
processes to ensure the evidence is not altered or damaged, which could
affect the outcome of a case and all the processes should be recorded to
give weight to the value of the evidence (using a chain of custody). The
definition also refers to the evidence being legally acceptable. Legal
admissibility of digital evidence depends on its being extracted, processed
and analyzed in a way that is acceptable by the law of the land – the tools
used have to be recognized and accepted by the law, those engaged in the
processes of digital forensics also need to be authorized by the law. Digital
evidence that meets these requirements making it legally acceptable in
court is said to be forensically sound.
As was mentioned under digital evidence, the law of the land has to
recognize and accept the digital evidence as evidence, and also the way and
manner the evidence was extracted, analyzed and presented, otherwise the
whole investigation would be an exercise in futility. To start with, the
collection of evidence has to be approved usually with warrants or any legal
authorization to collect, tools and techniques used to acquire, extract and
analyze, preserve and store also have to be approved by the law. In fact, the
person doing the acquisition, analysis and all handling of the digital
evidence also has to have some form of legal approval. The format in which
the digital evidence is presented also has to be in line with what the law of
the land accepts. These ensure forensic soundness.
Based on the foregoing, we can see digital forensics as the law and
computer technology collaborating – it has to be in tune with the law and
requires knowledge and use of information technology. Hence, digital
forensics can be said to be the application of IT knowledge and techniques
as well as legal knowledge to extract, store, process and analyze, interpret,
and present digital evidence in a legally acceptable manner.
eDiscovery
eDiscovery is short for electronic discovery, which can also be stated as e-
discovery or e discovery. In the event of litigation, there is a need for
parties (plaintiff and defendant) involved to gather, preserve, analyze and
present evidence that is relevant to the case at hand; both parties can
review what evidence is in the opposing party’s possession to get a feel of
the strength which can determine whether or not they would go ahead with
a, b, c, d … eDiscovery: eDiscovery for the Novice
a b c
Digital forensics and eDiscovery may be similar, but they are not the same.
eDiscovery may use digital forensics tools and techniques, but not to the
extent of a full blown digital forensics investigation.
a, b, c, d … eDiscovery: eDiscovery for the Novice
a b c
Civil case: civil cases are legal cases that usually involve disputes of
private nature between individuals or organizations (Reuters, 2018). The
dispute could be between two individuals, between organizations or
between individual and organization (the state can be considered as an
organization). The issues involved are usually not expected to have harmful
effects on the society as a whole. This includes things like copyright
infringements, divorce cases, employment disputes and so on.
Criminal case: criminal cases are legal cases that involve harm that can
have adverse effects on the society as a whole and are usually between the
defendant and the state. Issues like murder, kidnapping, rape, illicit drugs,
child sexual exploitation material are harmful to the society not just the
victims, hence the case would be by the state as criminal cases.
at hand; both parties can review what evidence is in the opposing party’s
possession to get a feel of the strength which can determine whether or not
they would go ahead with court proceedings or settle out of court. The
process is carried out before court full proceedings.
Plaintiff: the plaintiff is the aggrieved party in a legal dispute who initiates
the lawsuit. The plaintiff tries to get his/her claim against the other party
(the defendant) settled in a court of law.
References
Brecher, A. and Childress, S. (2009) eDiscovery Plain & Simple. Indiana:
AuthorHouse, pp. xxi.
a, b, c, d … eDiscovery: eDiscovery for the Novice
a b c