Forensic Update

Reflections on information management within the legal and regulatory arena

Archive for the ‘Fraud’ Category

What can we learn from the rash of revelations related to sizable hacks in 2012?

Posted by Johnny Lee on September 9, 2016

bitglass_wheres_your_data_thumbnail1Posit the research, which indicates that the average length of an un-detected compromise is in excess of 200 days. Couple that with research from security outfit Bitglass, and you’ve got some shocking correlations that put 2012 into a broader perspective.

That experiment employed data-tracking technology to track the traverse of sensitive data on the dark web post-compromise.
The upshot: In 12 days, these data were access 1,100 times within 22 countries, with two different cyber-crime syndicates sharing data with their peers…imagine how often compromised 2012 data changed hands over 4 years!

Bitglass Research

Advertisements

Posted in Computer Forensics, Data Governance, eDiscovery, Fraud, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

2013 in review

Posted by Johnny Lee on January 1, 2014

The WordPress.com stats team prepared a 2013 annual report for this blog.

Click here to see the complete report.

———-

Please see the disclaimer associated with content published on (and associated with) this site.

 

Posted in Announcement, Computer Forensics, Data Governance, ECM, eDiscovery, Fraud, Information Security, Investigations, Litigation Hold, Privacy, Records Retention, Social Networking | Leave a Comment »

Through the Google Glass Darkly…

Posted by Johnny Lee on December 10, 2013

BowtieLaw

It’s always a challenge to summarize the year for a subject matter as volatile and complicated as Electronic Discovery.  One could spend a few hours looking through the lens of a Google search engine, and days digesting the results, or you could simply peruse the superb summary penned by Joshua Gilliland, the blogger for Bow Tie Law, one of the two attorney bloggers for The Legal Geeks, and a Litigation World columnist.

It’s this last forum where we find the year-in-review that neatly summarizes the four most prominent “lessons learned” from the 2013 eDiscovery trenches.  I commend this to all in this space, as it captures the major themes and provides the most cogent excerpts from the key court opinions that shaped this very interesting year for our industry.

Gilliland readily focuses on the four lessons that “rise above all others: (1) the duty to preserve remains a hot button issue, (2) litigators still fight over the form of production, (3) proportionality is alive and well, and (4) taxation of costs is a sleeping giant we need to confront.”  Please do take the time to review this update…you won’t regret it.

———-

Please see the disclaimer associated with content published on (and associated with) this site.

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Fraud, Investigations, Litigation Hold, Privacy, Records Retention | Tagged: , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

2012 Perspectives from the Chief Audit Executive’s office…

Posted by Johnny Lee on April 2, 2012

Grant Thornton’s latest thought leadership in the audit and compliance arena focuses on the perspective of the chief audit executive (“CAE”).  The survey, entitled “Rising to new challenges: The view from the office of the CAE,” includes input from approximately three hundred CAEs from around the United States.

With “promising economic signs emerging, organizational demands are pulling internal audit in new directions.”  This survey captures how CAEs are striving to balance competing goals and initiatives.

This survey also builds up on Grant Thornton’s prior CAE survey from 2011 and “confirms that internal audit is receptive to assimilating newer and broader responsibilities for evaluating emerging risks, ensuring appropriate corporate governance and incorporating technology into internal audit processes.”  Click here to read the executive summary of this report.

Posted in Announcement, Data Governance, Fraud, Privacy | Tagged: , , , , , , , , , , , , , , , | Leave a Comment »

Forensic Update editor presenting at 7th Annual Fraud Summit…

Posted by Johnny Lee on March 20, 2012

The seventh-annual “Fraud Summit” will be held later this month at the University of Texas at Dallas.  This summit is a collaboration among the Dallas Chapter of the Institute of Internal Auditors, the North Texas Chapter of ISACA, and the Dallas Chapter of the Association for Certified Fraud Examiners.

This two-day conference will include “numerous sessions with dynamic presenters on current fraud topics,” including a variety of break-out sessions designed to improve the participants’ fraud-detecting skills and to apply what they have learned.  Several sessions will focus upon “advanced fraud techniques and case studies for those looking for more than just the basics.”

ForensicUpdate editor, Johnny Lee, will present on the topic of “Data Governance and eDiscovery.”  Click here for more details.

Posted in Announcement, Computer Forensics, Data Governance, eDiscovery, Fraud, Investigations | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Divorce Law ruling with potentially far-reaching eDiscovery implications…

Posted by Johnny Lee on November 10, 2011

Facebook-Divorce-Status-Update

A fascinating case from Connecticut may shake up the eDiscovery world.  About a month ago, Judge Kenneth Schluger ordered that soon-to-be-divorced couple Stephen and Courtney Gallion exchange the login information for their Facebook and dating websites.

Like many recent examples from the case law, the reasoning adopted by the court was that the content found within these accounts speaks directly to a matter before the bar.  Namely, Stephen Gallion is alleging that such content raises questions of parental fitness, something that speaks directly to the issue of custody in this divorce case, according to his divorce attorney Gary Traystman.

The reason this was elevated to the judge is that a prior agreement between the parties to share these account credentials broke down after evidence arose (according to Traystman) that Courtney Gallion had texted a friend, requesting that the recipient log into her accounts, delete some messages, and change some passwords.  The judge issued an injunction against such misbehavior, and he then ordered the parties’ attorneys to exchange passwords for such accounts held by both spouses as a furtherance to the discovery process.

Interestingly, this judicial order violates Facebook’s terms of service.  This raises questions of conflicting guidance, among others, though the parties are undoubtedly going to err on the side of listening to a judge.  As traditional notions of privacy continue to morph within the legal landscape, we will undoubtedly see more of these cases…so be careful what you put into your digital archiveno matter how private you believe it to be, it is both permanent and potentially discoverable.

Posted in Computer Forensics, eDiscovery, Fraud, Information Security, Investigations, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »

Excellent Session with the IT GRC experts at annual ISACA Conference…

Posted by Johnny Lee on October 26, 2011

ISACA_ITGRC-LogoLast week, I had the pleasure of presenting to a lively audience at the world’s leading conference for IT governance, risk and compliance professionals. The event, hosted at the Ritz-Carlton Hotel in Orlando by the good folks at ISACA, brought together a panoply of experts in the auditing, compliance, privacy, and information security space.

I presented on the subject of Data Governance and Electronic Discovery, and how these concepts represent “flip sides of the same coin.” What was particularly rewarding for me was the level of interest and participation during our interactive case study. Thanks to all who attended and participated last week…I enjoyed myself immensely, and I hope that you found it a rewarding discussion.

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Fraud, Information Security, Investigations, Litigation Hold, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Radio Show Appearance: Guest Expert on Business Fraud Awareness

Posted by Johnny Lee on September 6, 2011

ForensicUpdate editor, Johnny Lee, hit the airwaves again with colleague Philip Ratliff.  This time our host was Alan Butler, host of Atlanta’s Premier Business Talk Show “Butler on Business.”  Alan and co-host Jason Riddle facilitated a lively discussion covering a areas of concern to business owners and managers alike.

Listen as Philip Ratliff and Johnny Lee of Grant Thornton LLP’s Atlanta Forensics & Litigation practice comment on a broad variety of fraud issues facing organizations—especially in a down economy.  Segment one of the program can be found here; segment two can be found here. Please note that the views and opinions expressed are personal views and are not necessarily those of Grant Thornton; click here for more on this.

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Forensic Accounting, Fraud, Information Security, Investigations, Litigation Hold, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Trick or Tweet? Radio show appearance discussing recent issues on social media…

Posted by Johnny Lee on July 27, 2011

“Social media follows you around. Unlike Vegas, what happens online stays online forever with participants, leaving behind a wake of electronic information. As millions of smart-phone, Twitter, and Facebook users take to the Internet to send messages and post updates, they may place themselves and their businesses at risk.”

ForensicUpdate editor recently hit the airwaves with colleague Philip Ratliff on San Diego’s popular legal talk radio show with Jeff Isaac, host of “The Lawyer in Blue Jeans” program, to illuminate the concerns and issues related to the risks of social media use by individuals and businesses alike.

Listen as Philip Ratliff and Johnny Lee of Grant Thornton LLP’s Atlanta Forensic & Litigation practice discuss social media risks that can become serious issues if not dealt with carefully. Please note that the views and opinions expressed are personal views and are not necessarily those of Grant Thornton; click here for more on this.

Posted in Announcement, Computer Forensics, Data Governance, ECM, eDiscovery, Fraud, Investigations, Privacy, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

U.K. Bribery Act — Implications for U.S. Companies…

Posted by Johnny Lee on April 21, 2011

From Grant Thornton: GT_UK-Bribery-Act-Logo“The UK has released the long-awaited guidance regarding the Bribery Act 2010, which will come into force on July 1, 2011.  This important legislation introduces more aggressive and far-reaching penalties for noncompliance than its U.S. counterpart ─ the Foreign Corrupt Practices Act.  This alert discusses six key principles of adequacy on which companies will be evaluated, as well as additional provisions that U.S. companies should consider in preparation for the legislation’s enactment.”

Read more in Decision time:  The UK Bribery Act and what it means for U.S. companies.  This timely thought leadership comes from Grant Thornton’s Focus on Forensics series, a newsletter providing valuable forensic insights into some of the most complex and critical challenges facing businesses and legal counsel today.

Click here for prior online editions of this newsletter or to subscribe to upcoming editions, and click here for more information about a Grant Thornton Forensic & Litigation Services professional near you.

Posted in Announcement, Computer Forensics, Data Governance, Fraud, Investigations | Tagged: , , , , , , , , , , , , , , , , , , | Leave a Comment »

 
%d bloggers like this: