By Craig Reinmuth Two founders started TransPerfect Global (TPG) from a dorm room they shared in 1992. It turned into a billion business but ended, however, over the day-to-day management issues between its co-founders, Elizabeth Elting and Philip Shawe (Shawe v. Elting, 2016 BL 232452, Del. Ch., No. 10449-CB, 7/20/2016. During the heat of their management quarrels, Philip "undertook a campaign to spy on Elting (Elizabeth)." He monitored her phone calls and emails, went into her office numerous times at night (e.g. late on New Year's Eve), took her computer and had the hard drive imaged by one of TPG's employees. He...
ReadMajor Cellular Service Provider Retention Periods Regardless of the nature of the litigation you are involved in, it is common that relevant information isl likely to be on a cellphone of a party on the other side of the litigation. And it may be the only place the data is stored. Depending on the service provider, the period for which the data may be available through them varies greatly. Below is a brief overview *: Verizon ...
ReadThe NFL did not reverse the 4-game suspension associated with accusations surrounding Tom Brady and his potential involvement with deflating of footballs during last season's playoff games. Once announced Brady posted a response on his Facebook page indicating he "replaced his broken Samsung phone with a new iPhone 6 after my attorneys made it clear to the NFL that my actual phone device would not be subjected to investigation under any circumstances." He goes on to state "we turned over detailed pages (paper) of cell phone records and all of the email records and all of the email that Mr. Wells requested"...
ReadBoston Marathon Acquaintance Sentenced to 2 ½ years for Deleting Computer Records
Aug 5, 2015 at 09:33amShortly after the bombing, a friend of the Boston Marathon bomber deleted his browser history and other electronic evidence when he was being pursued by the feds. Under the Sarbanes-Oxley Act, he was sentenced to 2 ½ years in prison for "destroying, altering and falsifying records, documents, and tangible objects in a federal investigation, specifically information on his computer." Accordingly, be careful when advising someone who is, or is helping someone, engaged in felony behavior. They must be warned that destroying of any evidence, including digital, can be extremely detrimental.
ReadIf you've ever been in a courtroom in Phoenix, you've probably been witness to the kind of talented digital forensics Arizona lawyers bring to the table. Digital forensics -- or computer forensics -- is a term used when forensic examiners use their expertise to obtain legal evidence from any digital medium, whether it's a hard drive, a cell phone, or an Email retrieved from an Internet server. Phoenix lawyers rely on forensics firms that offer litigation support services that know what they are doing. Here are some of the most basic rules of digital forensic investigations: The original evidence must not be altered in any...
ReadAs the Copper State moves boldly into the Information Age, putting wrongdoers on notice with the development of strong legal support like mobile forensics, Arizona becomes a harder and harder place to do the wrong thing and get away with it. It doesn't matter if you're a white collar criminal using your cellphone to take pictures of sensitive company documents and send them to a competitor, or just an everyday spouse who happens to have a secret lover you're trying to keep secret -- cell phone forensics can and will find evidence of your wrongdoing. It's devastating to learn that an employee is stealing proprietary...
ReadBecause of high-tech advances in a new field called cell phone forensics, Phoenix corporations or residents can find themselves unexpectedly relieved of several perplexing predicaments. Here are just a few key examples: If you're in a civil suit and you need to recover a series of old text messages to prove the context of a particular situation or event; If you're concerned about an employee remotely accessing proprietary files and transferring them to an unauthorized location; If you need to recover a text message or a picture that you accidentally deleted; If you suspect your significant other is cheating on you and...
ReadWhen you have a digital mystery that needs solving, there's a computer forensics expert in Phoenix that can help. Computer forensics is a relatively new field of study that deals with legal evidence found on computers and other forms of digital media. Computer forensics is a job that is in demand, and it's a small wonder -- traditional law enforcement is hard-pressed to stem the tide of computer crime these days! When it comes to computer forensics, Arizona is leading the nation, with top-notch litigation support teams offering forensic expertise to lawyers on either side of the case. These technology experts deal with any type of...
ReadIf you happen to be a computer forensic specialist, Nevada and Arizona aren't bad places to land. In today's digital age, computers are the building blocks of almost every aspect of our lives. Nearly every transaction -- and many interactions -- we engage in are recorded electronically. But with the new digital age has come new digital crime, and with new digital crime has come the new digital investigators. Computer forensics consists of preservation, data collection, analysis, reporting and testimony. Make sure you engage an expert that knows how to help you in each of these stages; one who is proactive rather than reactive. A...
Read