Blog

Can You Browse the Internet in Secrecy?

By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...

Cyberbullying Law and Intervention

Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term "bullying," or "cyberbullying" to electronic harassment or bullying...

Federal Rules of Civil Procedure and ESI

The evolution of e-discovery and computer forensics, Part 3: The 2006 ESI Amendments to the FRCP The field of electronic discovery and digital forensics is rapidly evolving. In the early years of this millennium, discovery rules dealt primarily with paper, but with...

The Supreme Court and Your Smartphone

Suppose you're pulled over because your left taillight is out, because your license plate tag is a bit out of date, or because one of your passengers just threw a cigarette butt out the window. And suppose the officer notices that you have a cell phone in your pocket....

Pin It on Pinterest

Share This