Home / Computer and Technology / Computer and Technology Forensics Expert: Managing the Risky

Computer and Technology Forensics Expert: Managing the Risky

Computer and Technology Forensics Expert: Managing the Risky

As an employer, human resources director, or risk management supervisor, ask yourself this question: “Are our

employees thinking about the legal risk of sending communications over the Internet?” If you’re like most

companies, your answer would be, “It’s very amazing”. It is a very common problem in the workplace that an

employee believes that his electronic communications are transient, temporary, and, once deleted, that they cannot

be traced and are therefore harmless. The fact is that emails, faxes, and even cell phones are leaving a mark. Just one

email that your employee sends to an employee of another company goes through an average of four different

Computer and Technology Forensics Expert: Managing the Risky

computer systems. This creates a clue that makes the email real, traceable and lasting. As a leader in the computer

forensics and technology industry for the past 20 or more years, during electronic systems testing, we documented

employees who often say/save things in an email or save on a computer, things they would not say anywhere else. The

fact that an employee deletes potentially harmful or flammable email, or even an employee who deletes email

himself, does not protect anyone. It could end up hurting everyone involved. If the complaint or inappropriate

behavior of the employee has risen to the level where you as the owner/supervisor need to contact a computer and

technology forensics expert, one of the first areas checked is deleting documents and/or emails. These items cause

Computer and Technology Forensics Expert: Managing the Risky

red flags during equipment inspection, and original items may and most likely be found and/or reconstructed. It is

very important to understand that intentionally destroying evidence is a crime, and if proven, it could be put in

jail. An example of a computer message in a court case dates back to the infamous trial of some Los Angeles police

officers who were tried during the 1991 beating of Rodney King. One of the officers made a computer message saying,

“… I haven’t beaten anyone so badly in a long time.” This has become acceptable in court. A more recent

example is the example in which we as a company are engaged in a defamation case. The liberator used the internet

to post messages on a public bulletin board that was defamatory and defamatory against a competitor in the same

Computer and Technology Forensics Expert: Managing the Risky

field. This person felt that using “anonymous” emails and posts would increase their position in the same

professional community. What the slanderer did not count on was the traceability of the email to their home, mobile

phones, and computer systems of the company. We were able to locate the electronic trace and with this information

obtain, on behalf of the client, a court order to confiscate the equipment to create image copies of the

electronic systems. As a result, to keep this issue private, the slanderer agreed to a significant out-of-court

settlement. As an owner/supervisor, it is up to you to think and take care of educating your employees about what

In addition, it is up to you to inform your employees about how the written word is

transmitted when reading First, most employees do not consider the legal risk of electronic communications.

Second, as an owner/supervisor of why it is crucial, you understand the potential legal consequences. The rest of these

small companies should have a company policy. These policies traditionally cover areas from dress codes to vacation

Computer and Technology Forensics Expert: Managing the Risky

drives and/or servers for suspected company misuse of the system, we also discuss the company’s IT policy with the

appropriate supervisor or IT manager. In many cases, we have found that most policies do not adequately cover what companies should have a very clear email policy

and use of technology.  of the employer, is the email retention policy.

reflect these guidelines. The policy should be as specific as possible in terms of the types of communications that take

place and for how long. Explain that there are business and legal reasons why a company keeps such data.

harassment, discrimination, antitrust, retaliation, Disability Americans Act, insider

About admin

Check Also

Chasing the Clouds – Distributed Computing and Small Business

Chasing the Clouds – Distributed Computing and Small Business As a kid, I always wondered …

x