Smartphone Forensics: Tips From The E-Discovery Trenches
Law360, New York ( June 19, 2014, 9:59 AM EDT) -- A real case study: The principal of a Chicago-area school had been accused of engaging in an inappropriate relationship with a student. The student produced a suggestive text message that she alleged had been sent to her by the principal, who denied sending it. Lawyers for the school district were granted a motion to perform a computer forensics analysis of the principal's iPhone, which was scheduled in his attorney's offices, with lawyers from both sides in attendance. Armed with the principal's iCloud log-in credentials (provided by the principal by court order), the computer forensics examiner began his analysis. Because he had secretly "wiped" his iPhone just days before, the principal was confident that the examination would reveal nothing. As predicted, no relevant electronically stored information could be found on the phone. Then, the unexpected happened....
Law360 is on it, so you are, too.
A Law360 subscription puts you at the center of fast-moving legal issues, trends and developments so you can act with speed and confidence. Over 200 articles are published daily across more than 60 topics, industries, practice areas and jurisdictions.