Foreword |
|
ix | |
Preface |
|
xi | |
Acknowledgments |
|
xiii | |
Author |
|
xv | |
|
Chapter 1 What Is Electronic Information, and Why Should You Care? |
|
|
1 | (62) |
|
|
1 | (1) |
|
1.2 Electronically Stored Information and the Federal Rules of Civil Procedure |
|
|
1 | (49) |
|
1.2.1 Changes to the Federal Rules of Civil Procedure |
|
|
3 | (1) |
|
1.2.1.1 Rule 1: Scope and Purpose |
|
|
3 | (1) |
|
1.2.1.2 Rule 16(b)(5) and (6): Pretrial Conferences; Scheduling Management |
|
|
3 | (1) |
|
|
4 | (7) |
|
1.2.1.4 Rule 37 Safe Harbor |
|
|
11 | (2) |
|
1.2.1.5 Rule 34(b) Producing Documents Procedures |
|
|
13 | (2) |
|
1.2.1.6 Rule 33(d) Interrogatories to Parties |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
1.2.2 Federal Rules of Evidence |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (2) |
|
1.2.3.1 Social Media Cases |
|
|
20 | (3) |
|
|
23 | (6) |
|
1.2.3.3 Rulings of Judge Scheindlin: Zubulake, Pension, and National Day Labor |
|
|
29 | (7) |
|
1.2.3.4 Reasonably Accessible Cases |
|
|
36 | (4) |
|
|
40 | (1) |
|
1.2.3.6 Claw-Back and Privilege Cases |
|
|
41 | (3) |
|
1.2.3.7 Preservation/Production Cases |
|
|
44 | (4) |
|
1.2.3.8 Attorney Competence Cases |
|
|
48 | (1) |
|
1.2.4 Other Federal Rules That Affect Electronic Data |
|
|
49 | (1) |
|
1.3 Problems with ESI as Discoverable Evidence |
|
|
50 | (5) |
|
1.4 Why and How This Affects the Practice of Law |
|
|
55 | (4) |
|
1.5 How This Affects Business Organizations |
|
|
59 | (1) |
|
1.6 Effects on Government Entities |
|
|
60 | (1) |
|
1.7 What This Might Mean to You as an Individual |
|
|
60 | (3) |
|
Chapter 2 Translating Geek: Information Technology versus Everyone Else |
|
|
63 | (16) |
|
|
63 | (1) |
|
|
63 | (9) |
|
2.3 Information Technologist's Perspective |
|
|
72 | (4) |
|
2.4 Information Technology as an Ally |
|
|
76 | (1) |
|
|
77 | (2) |
|
Chapter 3 Where Is Electronically Stored Information? It's Everywhere! |
|
|
79 | (80) |
|
|
79 | (1) |
|
|
80 | (7) |
|
|
87 | (4) |
|
|
91 | (3) |
|
3.5 File and Print Servers |
|
|
94 | (5) |
|
3.6 Instant Messaging Services |
|
|
99 | (2) |
|
|
101 | (4) |
|
3.8 Physical Access Records |
|
|
105 | (4) |
|
|
109 | (10) |
|
|
119 | (7) |
|
|
126 | (4) |
|
3.12 Internet or Online Data |
|
|
130 | (14) |
|
|
144 | (3) |
|
3.14 Internet of Things (IOT) or of Everything (IOE) |
|
|
147 | (1) |
|
3.15 Event and System Logs |
|
|
148 | (1) |
|
3.16 Desktop Computer Facts |
|
|
149 | (5) |
|
3.17 Metadata and Other Nonapparent Data |
|
|
154 | (3) |
|
|
157 | (2) |
|
Chapter 4 Who's in Charge Here? Allies, Owners, and Stakeholders |
|
|
159 | (18) |
|
|
159 | (1) |
|
4.2 The (Long) List of Stakeholders |
|
|
159 | (6) |
|
4.2.1 Information Technology Professionals |
|
|
159 | (3) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
4.2.6 Department Heads, Vice Presidents, and Executives |
|
|
164 | (1) |
|
4.2.7 Physical and Information Security Personnel |
|
|
165 | (1) |
|
|
165 | (5) |
|
4.4 Data Control Considerations |
|
|
170 | (3) |
|
4.5 Required Skill Sets and Tools |
|
|
173 | (4) |
|
Chapter 5 The Hunt: Recovery and Acquisition |
|
|
177 | (46) |
|
|
177 | (1) |
|
5.2 Where, Oh Where, Has My Data Gone? |
|
|
178 | (18) |
|
5.2.1 Applications as a Vital User Interface |
|
|
178 | (5) |
|
5.2.2 Hidden or Restricted Access Data |
|
|
183 | (5) |
|
|
188 | (2) |
|
5.2.4 Deleted or Corrupted Data |
|
|
190 | (1) |
|
5.2.5 Proprietary Data or Data Stored on Obsolete Media |
|
|
191 | (5) |
|
5.3 Privileged, Sensitive, and Inaccessible Data Management |
|
|
196 | (7) |
|
5.4 Proving Ownership and Integrity |
|
|
203 | (8) |
|
5.5 Marking Time: How Time Is Recorded and Ensuring Integrity |
|
|
211 | (4) |
|
5.6 Legal and Forensically Sound Acquisition |
|
|
215 | (8) |
|
Chapter 6 Keeping Your Treasures: Preservation and Management |
|
|
223 | (32) |
|
|
223 | (1) |
|
|
223 | (3) |
|
6.3 Access Control and Management |
|
|
226 | (6) |
|
6.4 Organization and File Management Techniques |
|
|
232 | (9) |
|
6.4.1 Day-to-Day Organization |
|
|
232 | (4) |
|
6.4.2 Management of Data over Time |
|
|
236 | (2) |
|
6.4.3 Response to Litigation or Audits |
|
|
238 | (3) |
|
6.5 Safe Storage Issues and Considerations |
|
|
241 | (5) |
|
|
246 | (2) |
|
6.7 Spoliation: The Loss of Relevant Data |
|
|
248 | (2) |
|
6.8 Automated Technical Solutions |
|
|
250 | (5) |
|
Chapter 7 Sharing Is Good: Dissemination and Reporting |
|
|
255 | (12) |
|
|
255 | (1) |
|
7.2 Format Issues: Original or Usable? |
|
|
255 | (4) |
|
|
259 | (2) |
|
7.4 Creating Readable Reports |
|
|
261 | (3) |
|
7.5 Tips for Depositions and Expert Witness |
|
|
264 | (2) |
|
|
266 | (1) |
Appendix I Links and References for More Information |
|
267 | (6) |
Appendix II Forms and Guides |
|
273 | (18) |
Appendix III Links to Technical Software Solutions |
|
291 | (2) |
Index |
|
293 | |