Technology in Practice: The Blog

Go to conference website technologyinpractice.ca.

Five Articles to Provide Some Insight on Apple's Discovery Battle with the FBI.

Posted by Jennifer Brookman

Feb 23, 2016 2:17:40 PM

Earlier this month, a US Federal Judge ordered Apple to help the FBI unlock the iPhone used by one of the shooters who carried out the Dec. 2 terrorist attacks in San Bernardino, California. Within hours, Apple's Chief Executive, Tim Cook, declared that he would fight the government’s “unprecedented” demands.

FULL ARTICLE>>

Topics: Identification and Collection


Where in the World is Custodian X?!?

Posted by Richard Wessel

Feb 2, 2016 4:46:22 PM

Do you remember the kid’s game “Where in the World is Carmen Sandiego?” The goal of the game was to track Carmen's villains around the world, arrest them and then ultimately arrest Carmen herself. The player begins the game by first going to the country where the crime took place and then obtaining hints from various sources on where the thief went next, leading to a chase around the world to find the thief before time runs out. (Source: Wikipedia.org)

Understanding where your custodians are (or were) located can be a similar exercise to this 80’s game because in order to understand your case, you need to understand the custodians involved:

  1. Who are the custodians involved in the case?
  2. What are their job title(s)?
  3. Where are they located?
  4. When were they employed?
  5. Who did they each report to?
  6. How often did they each move around the organization (i.e. between departments or offices)?

With the help of your Human Resources department, your goal will be to get all of this information gathered and laid out in a format that will allow you to verify that you have everything you need for "Custodian X".

Unfortunately, it’s not as easy as simply gathering the custodian’s email, or network file shares. In a totally Centralized IT Environment, this information may be easily accessed and collected, your job done in a matter of hours. However, in a Decentralized IT Environment, this could take days… and depending on the Custodians employment history, it could turn into weeks.

So, before you start panicking that you’ll have to provide every scrap of data from wherever the custodian was located, let me clarify; the date range of the matter will play a significant role in helping to scale down the data when you actually start Identification and Collection.

FULL ARTICLE>>

Topics: Richard Wessel, Identification and Collection


TiP_2016_logo_CMYK_undated.png

Don't Miss a Thing! Subscribe for Email Updates.

About the Blog

Technology in Practice is an annual litigation technology conference that provides educational and practical content for Canadian legal professionals. It is hosted by Commonwealth Legal and supported by our technology partners and fellow industry experts. And now, we're bringing that unique perspective to you in the form of a blog.