Brett Burney is Principal of Burney Consultants LLC, and focuses the bulk of his time on bridging the chasm...
Sharon D. Nelson, Esq. is president of the digital forensics, managed information technology and cybersecurity firm Sensei Enterprises. Ms....
John W. Simek is vice president of the digital forensics, managed information technology and cybersecurity firm Sensei Enterprises. He...
The collection of critical web-based evidence could make or break a case, but many lawyers aren’t quite sure how to go about it. Digital Detectives‘ Sharon Nelson and John Simek get expert advice from Brett Burney on best practices for collection and authentication of online evidence. They discuss several real-world examples of major collection mistakes lawyers have made and offer suggestions for tools that can preserve and produce evidence properly.
Brett Burney is Principal of Burney Consultants LLC, and focuses the bulk of his time on bridging the chasm between the legal and technology frontiers of electronic discovery. He is also the author of the free download eDiscovery Buyers Guide at www.ediscoverybuyersguide.com.
Special thanks to our sponsor, PInow.
Notify me when there’s a new episode!
Published: | September 30, 2019 |
Podcast: | Digital Detectives |
Category: | Best Legal Practices , e-Discovery |
![]() |
Digital Detectives |
Sharon D. Nelson and John W. Simek invite experts to discuss computer forensics as well as information security issues.
Clio COO George Psiharis talks through this year’s trends and the sweeping transformative effect COVID-19 has had on the legal profession.
Attorney and cybersecurity expert Ted Kobus addresses the rapid increase in ransomware incidents in 2020 and explains what law firms should do in the...
Doug Austin and Brett Burney give best practice tips for audio and video discovery.
Judy Selby gives a comprehensive overview of the many uses and risks associated with biometric information.
Cybersecurity expert Mike Maschke explains how penetration tests help lawyers protect themselves by identifying weak points in their security systems.
Maura Grossman discusses how TAR is used by medical researchers to support their efforts to understand and treat COVID-19.