Page 9 - TIPJar Summer 2017
P. 9

number, birth date, home  forensic preservation   depends on the type of   to have written policies
               address).  There may    that ensures no         device that is subject to   upfront that address
               also be metadata that is   data is altered along   discovery.  For desktops   how business documents
               part of your system that   with proper chain of   or laptops, a forensic   or communication
               consists of blood type,   custody procedures    preservation would      on personal devices
               DNA, blood pressure     and processing          need to take place, so   or cloud accounts
               or cholesterol level.    documentation.         metadata is not altered.    may be treated for
               Documents follow a very   Many employers and    In the processing phase,   investigations, Public
               similar pattern, where   employees are tempted   relevant metadata is   Record Act requests,
               there may be metadata   to cut corners and do   extracted so it can be   litigation or other
               stored externally and   such things as forward   displayed alongside the   purposes. 
               embedded.  Rather than   relevant emails to their   actual document view.
               getting caught up with   attorneys.  However,   For devices such as     Darren C. Kameya is a
               the word “metadata,” it’s   this does not properly   smartphones, the device   Partner in Lozano Smith’s
               important to preserve   preserve the email for   is forensically preserved,   Los Angeles office.
               what you can and ensure   evidentiary purposes.   reports are typically
               that the requesting party                       parsed out from SQLite   Penelope R. Glover is Senior
               defines what they are   Q: If a public agency   databases and then      Counsel in Lozano Smith’s
               seeking when metadata   is legally obligated    filtering is performed for   Walnut Creek office,
               is requested, as each   to produce metadata     relevant information.    and chair of the firm’s
               system can vary in what   that is located in an   For cloud-based       Technology & Innovation
               metadata is maintained.   employee’s personal   accounts, we obtain the   Practice Group.
                                       electronic device or    user’s authorization to
               Q: Does an employer or   account, how would it   access personal accounts  Julie Lewis is Founder and
               employee need to take   go about doing so?      prior to preserving.    CEO of Digital Mountain,
               any steps to preserve                           Metadata varies across   a leading global provider
               metadata?               A: It depends.  At      different cloud-based   of electronic discovery,
                                       Digital Mountain, we    applications.  It’s     computer forensics,
               A: For discovery        have a separate form    important to know what   cyber security and next-
               purposes in litigation, it’s   that custodians sign   metadata is relevant and   generation Web-based
               critical that metadata is   providing authorization   what’s considered noise.    solutions.
               preserved based on how   to collect their digital   Bring your own device
               documents are held in   evidence.  For metadata   policies have created a
               the ordinary course of   extraction, what       lot of complexity in our
               business.  This involves   information is processed   industry.  It’s always best


               TIPJar - Summer 2017    9
   4   5   6   7   8   9   10   11   12   13   14