By Craig Reinmuth Two founders started TransPerfect Global (TPG) from a dorm room they shared in 1992. It turned into a billion business but ended, however, over the day-to-day management issues between its co-founders, Elizabeth Elting and Philip Shawe (Shawe v. Elting, 2016 BL 232452, Del. Ch., No. 10449-CB, 7/20/2016. During the heat of their management quarrels, Philip "undertook a campaign to spy on Elting (Elizabeth)." He monitored her phone calls and emails, went into her office numerous times at night (e.g. late on New Year's Eve), took her computer and had the hard drive imaged by one of TPG's employees. He...
ReadThere are several areas of litigation support services Phoenix law firms utilize to get the results they need -- but by far the most effective is obtaining electronic evidence. With nearly all modern business -- both corporate and personal -- being performed over various forms of digital media, the use of the various digital forensics Arizona firms is becoming a must for litigators in Arizona and other states' courts. Why turn to Electronic Discovery in Litigation Support? If you have a hard drive, flash drive, compact disc, DVD, digital camera, cell phone, flip camera, floppy disk, personal data assistant, SD card, or iPad that might...
ReadThose of you who have worked on alter ego cases are aware of the strong burden of proof establishing alter ego and piercing the corporate veil. If successful however, it can open doors of available assets and income that a person is trying to shield from creditors, or their spouse. I was involved with a recent decision in Arizona where the court permitted the corporate veil to be pierced and allowed the assets to be entered into the community estate for division between the parties. This case involved a person who set up a company, back in 1999, to shield and protect his assets from creditors. He funneled his personal income and...
ReadA record number of married couples over age 50 are filing for divorce. Along with this comes unique financial considerations. This article will briefly discuss financial planning considerations and related recommendations. Retirement planning was done assuming they couple would enjoy retirement as a married couple. Now their primary earning years are behind them and less time exists to exists to build the divided retirement funds back up. Both spouses may have to work, and/or work longer. A financial projection should be done estimating the funds that will be available from wages, retirement savings and investments and comparing this to...
ReadMajor Cellular Service Provider Retention Periods Regardless of the nature of the litigation you are involved in, it is common that relevant information isl likely to be on a cellphone of a party on the other side of the litigation. And it may be the only place the data is stored. Depending on the service provider, the period for which the data may be available through them varies greatly. Below is a brief overview *: Verizon ...
ReadThe NFL did not reverse the 4-game suspension associated with accusations surrounding Tom Brady and his potential involvement with deflating of footballs during last season's playoff games. Once announced Brady posted a response on his Facebook page indicating he "replaced his broken Samsung phone with a new iPhone 6 after my attorneys made it clear to the NFL that my actual phone device would not be subjected to investigation under any circumstances." He goes on to state "we turned over detailed pages (paper) of cell phone records and all of the email records and all of the email that Mr. Wells requested"...
ReadIf you happen to be a computer forensic specialist, Nevada and Arizona aren't bad places to land. In today's digital age, computers are the building blocks of almost every aspect of our lives. Nearly every transaction -- and many interactions -- we engage in are recorded electronically. But with the new digital age has come new digital crime, and with new digital crime has come the new digital investigators. Computer forensics consists of preservation, data collection, analysis, reporting and testimony. Make sure you engage an expert that knows how to help you in each of these stages; one who is proactive rather than reactive. A...
ReadPrevent and Detect Fraud - What do fraudster's look like? - Hunting down fraud Financial fraud can be devastating, both monetarily and the time that has to be invested. Steps can be taken to prevent fraud and, in the unfortunate situation where it has occurred, it can be tracked down. What do fraudster's look like? You may be surprised! They are commonly well-respected top-executives who have been with an organization at least six years. They typically work well with others. Most fraud occurs within the last 15-30 days of employment....
ReadIf you've ever been in a courtroom in Phoenix, you've probably been witness to the kind of talented digital forensics Arizona lawyers bring to the table. Digital forensics -- or computer forensics -- is a term used when forensic examiners use their expertise to obtain legal evidence from any digital medium, whether it's a hard drive, a cell phone, or an Email retrieved from an Internet server. Phoenix lawyers rely on forensics firms that offer litigation support services that know what they are doing. Here are some of the most basic rules of digital forensic investigations: The original evidence must not be altered in any...
ReadBecause of high-tech advances in a new field called cell phone forensics, Phoenix corporations or residents can find themselves unexpectedly relieved of several perplexing predicaments. Here are just a few key examples: If you're in a civil suit and you need to recover a series of old text messages to prove the context of a particular situation or event; If you're concerned about an employee remotely accessing proprietary files and transferring them to an unauthorized location; If you need to recover a text message or a picture that you accidentally deleted; If you suspect your significant other is cheating on you and...
Read