Smartphone Forensics: Tips From The E-Discovery Trenches

Law360, New York (June 19, 2014, 9:59 AM EDT) -- ​A real case study: The principal of a Chicago-area school had been accused of engaging in an inappropriate relationship with a student. The student produced a suggestive text message that she alleged had been sent to her by the principal, who denied sending it. Lawyers for the school district were granted a motion to perform a computer forensics analysis of the principal's iPhone, which was scheduled in his attorney's offices, with lawyers from both sides in attendance. Armed with the principal's iCloud log-in credentials (provided by the principal by court order), the computer forensics examiner began his analysis. Because he had secretly "wiped" his iPhone just days before, the principal was confident that the examination would reveal nothing. As predicted, no relevant electronically stored information could be found on the phone. Then, the unexpected happened....

Law360 is on it, so you are, too.

A Law360 subscription puts you at the center of fast-moving legal issues, trends and developments so you can act with speed and confidence. Over 200 articles are published daily across more than 60 topics, industries, practice areas and jurisdictions.


A Law360 subscription includes features such as

  • Daily newsletters
  • Expert analysis
  • Mobile app
  • Advanced search
  • Judge information
  • Real-time alerts
  • 450K+ searchable archived articles

And more!

Experience Law360 today with a free 7-day trial.

Start Free Trial

Already a subscriber? Click here to login

Hello! I'm Law360's automated support bot.

How can I help you today?

For example, you can type:
  • I forgot my password
  • I took a free trial but didn't get a verification email
  • How do I sign up for a newsletter?
Ask a question!