Jannica Houben and Katarzyna Golonka on Complex Investigations
With how much of our collective lives are experienced online, a trial that doesn’t include digital evidence may soon be the rare exception. Between the massive collection of data across commercial operations and the...more
Editor’s Note: Deepfake technology forces us to confront an uncomfortable truth: our eyes and ears can no longer be trusted in the digital realm. HaystackID’s recent webcast explored how synthetic media has evolved from a...more
In the world of eDiscovery, timing and precision are everything—but what happens when the first domino falls? One overlooked data repository. One unclear retention policy. One missed privacy obligation. Suddenly, your legal...more
Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more
Government plans to supercharge the digital assets industry, with crypto dealing and custody regimes the icing on the cake for a holistic regulatory framework....more
“Chain of custody” is a familiar concept for anyone working in law enforcement, legal practice, or investigations. It’s a foundational part of proving that evidence presented in court is authentic, unaltered, and admissible....more
Regardless of the specific cause of property damage—whether it be vehicle impact, structural collapse, construction defects, equipment failures, fire or explosion, hail, lightning, storms, animal activity, or water...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of November 3-9. Here’s what’s...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
U.S. Eleventh Circuit Court of Appeals - Parrott v. Neway - bankruptcy, appeal, timeliness - Muscogee (Creek) Nation v. Rolin - tribal immunity - Hornady v. Outekumpu Stainless - default judgment sanction - USA...more
One will be forgiven for not closely following the myriad crypto developments in recent years. Mixed signals from regulators have complicated matters: some cryptocurrencies may be securities, some are commodities, some...more
1. THE ATTORNEY-CLIENT PRIVILEGE - Historically, the attorney-client privilege developed upon two assumptions: (1) good legal assistance requires full disclosure of a client’s legal problems; and (2) a client will only...more
If you’re an attorney, a paralegal, an investigator, a law enforcement officer, or even if you just watch a lot of legal dramas on television, you’re likely familiar with the term “chain of custody”....more
This course will cover: - Different types of engineering analyses - Steps in root cause failure analysis - The importance of the chain of custody - How a failure analysis lab can contribute to Subrogation matters...more
Conducting ediscovery in Outlook may be tempting – but although it’s a free and familiar tool, it carries risks and limitations for document review. Email continues to be the primary source of electronic evidence in...more
New technologies, regulatory shifts, and an evolving economic landscape are transforming the M&A process (again). According to the FTC, HSR filings in 2021 more than doubled from the previous year, reaching a total of 3,644. ...more
Whether a property damage loss involves vehicle impact, structural collapse, construction defect, equipment failure, fire or explosion, hail, lightning, storm, animal activity, or water, at some point the expert may need to...more
Editor’s Note: On May 18, 2022, HaystackID shared an educational webcast developed to highlight the foundational basics of blockchain, cryptocurrencies, and NFTs and to present practical considerations for the investigational...more
You’re about to begin a complex investigation. What should you be thinking about? What should your first steps be? And what tricks of the trade are there? To find out we spoke with Tech Data’s Jannica Houben, Vice President...more
The Arkansas Department of Energy and Environment – Division of Environmental Quality (“DEQ”) and the City of Magazine, Arkansas, (“Magazine”) entered into a February 10th Consent Administrative Order (“CAO”) addressing...more
On December 23, 2020, the Securities and Exchange Commission (SEC or Commission) issued a statement (Statement) regarding the custody of digital assets that are “securities” under the federal securities laws. The Statement...more
TLS experts Jon Langton and Joseph Marra were pleased to be invited as guests on a podcast published by the International Legal Technology Association (ILTA). The episode, “Forensic Collections in a ‘WFH’ World,” features...more
Prosecutors offer Facebook posts to show that a gang leader “green lighted” the hatchet killing of a homeless man for “snitching” on him. A plaintiff in an Internet stalking case offers the hundreds of abusive emails she...more