SlideShare une entreprise Scribd logo
1  sur  17
Divorce in the Digital Era
What Every Divorce Lawyer Needs to Know About
Electronic Discovery, Internet Investigations, and
               Computer Forensics



                        Frederick S. Lane

   Vermont Family Law Conference
                         15 February 2013
www.FrederickLane.com                 www.ComputerForensicsDigest.com
General Background
                        • Attorney, Educational
                          Consultant & Lecturer
                        • Author of 6 Books
                        • Computer Forensics
                          Expert
                        • 10 Years -- Burlington
                          (VT) School Board
                        • Technology & Privacy
                          Specialist
                        • Student Safety Advocate
www.FrederickLane.com         www.ComputerForensicsDigest.com
Previous Books




www.FrederickLane.com   www.ComputerForensicsDigest.com
Computer Background
• Thirty years of personal computer
  experience
• More than twenty years lecturing on
  technology and the law
• Fourteen years of computer forensics
  experience in a variety of cases
• 40 hours of instruction in X-Ways Forensics
  and computer file systems
  www.FrederickLane.com     www.ComputerForensicsDigest.com
Seminar Outline
• The Pre-Divorce Digital Checklist
• Identifying and Finding Relevant
  Information
• Digital Investigation by Your Client
• Digital Investigation by You and Your
  Agents
• Electronic Discovery and Subpoenas
• Computer Forensics in Divorce Cases
• Issues of Digital Behavior During and
  Post-Divorce
www.FrederickLane.com     www.ComputerForensicsDigest.com
The Pre-Divorce Digital Checklist
 • Inventory of All Known Electronic
   Devices
 • List of All Known Electronic
   Accounts
 • Inventory of Shared Data (or Data
   That Should Be Shared)
 • Planning to Live a Separate Electronic
   Life
 • Those Who Live in Gorilla Glass
   Houses …
  www.FrederickLane.com   www.ComputerForensicsDigest.com
Identifying/Finding Relevant Info.

• Categories of Information
    – Emotional Betrayal and Infidelity
    – Hidden or Dissipated Assets
    – Addictions
    – Criminal Behavior
    – Harm or Risks to Children
• Leading Digital Sources
    – Social Media, Texts, Emails, Files, Web
www.FrederickLane.com          www.ComputerForensicsDigest.com
Identifying/Finding Relevant Info.

• Information in the Domicile
    – Desktops, Laptops, Gaming Consoles
    – External and Removable Storage
• Information on the Go
    – Smartphones, Tablets, eReaders
• Information in the Cloud
    – Social media, Web email, online financial
      accounts, online data storage, etc.
www.FrederickLane.com         www.ComputerForensicsDigest.com
Digital Investigation by Your Client

 • A Brief Overview of Privacy in
   Marriage
 • Factors to Consider Before
   Snooping:
     – Who Owns the Device?
     – Where Is the Device Located?
     – Shared Account?
     – Password-Protected?
 www.FrederickLane.com        www.ComputerForensicsDigest.com
Digital Investigation by Your Client

 • Legal Risks of Client Snooping:
     – Google Searches
     – Listening to or Taping Phone Calls
     – Reading Emails on a Computer
     – Intercepting Emails
     – Unauthorized Access to Devices or
       Accounts
     – Location-Tracking using Apps or GPS
       Devices

 www.FrederickLane.com        www.ComputerForensicsDigest.com
Digital Investigation by You
            and Your Agents
• Attorneys Are Not Witnesses
• The Perils of Digital Investigations
    – Rule 4.1 – Truthfulness in Statements to
      Others
    – Rule 4.2 – Communication with Person
      Represented by Counsel
    – Rule 5.3 – Responsibility Regarding Non-
      Lawyer Assistant
    – Rule 8.4 – Misconduct
• See Previous Slide (Similar Legal Risks)
www.FrederickLane.com           www.ComputerForensicsDigest.com
Electronic Discovery and Subpoenas

 • VRCP 16.2 – Scheduling orders may
   provide for e-discovery
 • VRCP 26(b)(1) – No duty to provide
   discovery if inaccessible because of
   undue burden or cost
 • VRCP 33(c) – it is sufficient to specify
   business records from which
   information can be derived
 • VRCP 34 – Covering production and
   form of electronic data
 www.FrederickLane.com     www.ComputerForensicsDigest.com
Electronic Discovery and Subpoenas

 • VRCP 37 – No sanction for
   destruction of data by “routine, good-
   faith” operation of device
 • VRCP 45 – Rules governing subpoena
   of electronic data
 • Compelling production of passwords
 • Obtaining electronic data from
   online service providers
 www.FrederickLane.com    www.ComputerForensicsDigest.com
Digital Forensics in Divorce Cases

• Defining Digital Forensics
    – Mobile, Computer, Network, Cloud
• The Great “Delete” Myth
• Relevant Data, Installed Programs
  and Internet History
• Discovery Issues
    – Ownership, Invasion of Privacy, Burden
• Time Is of the Essence
www.FrederickLane.com        www.ComputerForensicsDigest.com
Digital Behavior During
              and Post-Divorce
• Your Client’s Posts Can and Will
  Be Used in a Court of Law
• Electronic Contact with Minor
  Children
• Cyberstalking and
  Cyberharrassment
• Digital Child Custody and
  Electronic Co-Parenting
www.FrederickLane.com     www.ComputerForensicsDigest.com
Contact Information
• Please Visit My Web Sites:
  – www.ComputerForensicsDigest.com
  – www.FrederickLane.com
  – www.CybertrapsfortheYoung.com
• Send Me an Email:
  – FSLane3@gmail.com
• Call Me:
  – 802-318-4604
  www.FrederickLane.com        www.ComputerForensicsDigest.com
Divorce in the Digital Era
What Every Divorce Lawyer Needs to Know About
Electronic Discovery, Internet Investigations, and
               Computer Forensics



                        Frederick S. Lane

   Vermont Family Law Conference
                         15 February 2013
www.FrederickLane.com                 www.ComputerForensicsDigest.com

Contenu connexe

Tendances

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyersFrederick Lane
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anitafin
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceCase IQ
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 

Tendances (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Chapter2
Chapter2Chapter2
Chapter2
 

En vedette

2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child PornographyFrederick Lane
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
 
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested RightFrederick Lane
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes BadFrederick Lane
 
2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for EducatorsFrederick Lane
 
2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint2016-02-17 Your Digital Footprint
2016-02-17 Your Digital FootprintFrederick Lane
 
2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for EducatorsFrederick Lane
 
2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social MediaFrederick Lane
 
2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of BoundariesFrederick Lane
 
2010-07-20 American Privacy
2010-07-20 American Privacy2010-07-20 American Privacy
2010-07-20 American PrivacyFrederick Lane
 
2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do ItFrederick Lane
 
2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital NativesFrederick Lane
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for EducatorsFrederick Lane
 
2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired WorldFrederick Lane
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of PrivacyFrederick Lane
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"Frederick Lane
 
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesFrederick Lane
 

En vedette (20)

2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
 
2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad
 
2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators
 
2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint
 
2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators
 
2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media
 
2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries
 
2010-07-20 American Privacy
2010-07-20 American Privacy2010-07-20 American Privacy
2010-07-20 American Privacy
 
2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It
 
2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators
 
2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of Privacy
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"
 
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
 

Similaire à Divorce in the Digital Era

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the NetFrederick Lane
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingNeal Axton
 
2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the ElderlyFrederick Lane
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...Frederick Lane
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer TechniquesFrederick Lane
 
Due Diligence Online by Cynthia Hetherington
Due Diligence Online by Cynthia HetheringtonDue Diligence Online by Cynthia Hetherington
Due Diligence Online by Cynthia HetheringtonCase IQ
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for EducatorsFrederick Lane
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for EducatorsFrederick Lane
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy LawChuck Kunz
 
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationData Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationChuck Kunz
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...ImageSoft
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and DistrictsFrederick Lane
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counselamprivacy
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the YoungFrederick Lane
 

Similaire à Divorce in the Digital Era (20)

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer Techniques
 
Due Diligence Online by Cynthia Hetherington
Due Diligence Online by Cynthia HetheringtonDue Diligence Online by Cynthia Hetherington
Due Diligence Online by Cynthia Hetherington
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for Educators
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy Law
 
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware PresentationData Privacy - Updated Slides for Technology Forum of Delaware Presentation
Data Privacy - Updated Slides for Technology Forum of Delaware Presentation
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 

Plus de Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Plus de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Dernier

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 

Dernier (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 

Divorce in the Digital Era

  • 1. Divorce in the Digital Era What Every Divorce Lawyer Needs to Know About Electronic Discovery, Internet Investigations, and Computer Forensics Frederick S. Lane Vermont Family Law Conference 15 February 2013 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 2. General Background • Attorney, Educational Consultant & Lecturer • Author of 6 Books • Computer Forensics Expert • 10 Years -- Burlington (VT) School Board • Technology & Privacy Specialist • Student Safety Advocate www.FrederickLane.com www.ComputerForensicsDigest.com
  • 3. Previous Books www.FrederickLane.com www.ComputerForensicsDigest.com
  • 4. Computer Background • Thirty years of personal computer experience • More than twenty years lecturing on technology and the law • Fourteen years of computer forensics experience in a variety of cases • 40 hours of instruction in X-Ways Forensics and computer file systems www.FrederickLane.com www.ComputerForensicsDigest.com
  • 5. Seminar Outline • The Pre-Divorce Digital Checklist • Identifying and Finding Relevant Information • Digital Investigation by Your Client • Digital Investigation by You and Your Agents • Electronic Discovery and Subpoenas • Computer Forensics in Divorce Cases • Issues of Digital Behavior During and Post-Divorce www.FrederickLane.com www.ComputerForensicsDigest.com
  • 6. The Pre-Divorce Digital Checklist • Inventory of All Known Electronic Devices • List of All Known Electronic Accounts • Inventory of Shared Data (or Data That Should Be Shared) • Planning to Live a Separate Electronic Life • Those Who Live in Gorilla Glass Houses … www.FrederickLane.com www.ComputerForensicsDigest.com
  • 7. Identifying/Finding Relevant Info. • Categories of Information – Emotional Betrayal and Infidelity – Hidden or Dissipated Assets – Addictions – Criminal Behavior – Harm or Risks to Children • Leading Digital Sources – Social Media, Texts, Emails, Files, Web www.FrederickLane.com www.ComputerForensicsDigest.com
  • 8. Identifying/Finding Relevant Info. • Information in the Domicile – Desktops, Laptops, Gaming Consoles – External and Removable Storage • Information on the Go – Smartphones, Tablets, eReaders • Information in the Cloud – Social media, Web email, online financial accounts, online data storage, etc. www.FrederickLane.com www.ComputerForensicsDigest.com
  • 9. Digital Investigation by Your Client • A Brief Overview of Privacy in Marriage • Factors to Consider Before Snooping: – Who Owns the Device? – Where Is the Device Located? – Shared Account? – Password-Protected? www.FrederickLane.com www.ComputerForensicsDigest.com
  • 10. Digital Investigation by Your Client • Legal Risks of Client Snooping: – Google Searches – Listening to or Taping Phone Calls – Reading Emails on a Computer – Intercepting Emails – Unauthorized Access to Devices or Accounts – Location-Tracking using Apps or GPS Devices www.FrederickLane.com www.ComputerForensicsDigest.com
  • 11. Digital Investigation by You and Your Agents • Attorneys Are Not Witnesses • The Perils of Digital Investigations – Rule 4.1 – Truthfulness in Statements to Others – Rule 4.2 – Communication with Person Represented by Counsel – Rule 5.3 – Responsibility Regarding Non- Lawyer Assistant – Rule 8.4 – Misconduct • See Previous Slide (Similar Legal Risks) www.FrederickLane.com www.ComputerForensicsDigest.com
  • 12. Electronic Discovery and Subpoenas • VRCP 16.2 – Scheduling orders may provide for e-discovery • VRCP 26(b)(1) – No duty to provide discovery if inaccessible because of undue burden or cost • VRCP 33(c) – it is sufficient to specify business records from which information can be derived • VRCP 34 – Covering production and form of electronic data www.FrederickLane.com www.ComputerForensicsDigest.com
  • 13. Electronic Discovery and Subpoenas • VRCP 37 – No sanction for destruction of data by “routine, good- faith” operation of device • VRCP 45 – Rules governing subpoena of electronic data • Compelling production of passwords • Obtaining electronic data from online service providers www.FrederickLane.com www.ComputerForensicsDigest.com
  • 14. Digital Forensics in Divorce Cases • Defining Digital Forensics – Mobile, Computer, Network, Cloud • The Great “Delete” Myth • Relevant Data, Installed Programs and Internet History • Discovery Issues – Ownership, Invasion of Privacy, Burden • Time Is of the Essence www.FrederickLane.com www.ComputerForensicsDigest.com
  • 15. Digital Behavior During and Post-Divorce • Your Client’s Posts Can and Will Be Used in a Court of Law • Electronic Contact with Minor Children • Cyberstalking and Cyberharrassment • Digital Child Custody and Electronic Co-Parenting www.FrederickLane.com www.ComputerForensicsDigest.com
  • 16. Contact Information • Please Visit My Web Sites: – www.ComputerForensicsDigest.com – www.FrederickLane.com – www.CybertrapsfortheYoung.com • Send Me an Email: – FSLane3@gmail.com • Call Me: – 802-318-4604 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 17. Divorce in the Digital Era What Every Divorce Lawyer Needs to Know About Electronic Discovery, Internet Investigations, and Computer Forensics Frederick S. Lane Vermont Family Law Conference 15 February 2013 www.FrederickLane.com www.ComputerForensicsDigest.com