How To Use Metadata As An Examination Tool
Metadata is more than simple electronic evidence. General electronic discovery typically considers easily accessible electronic files, such as those on an active network file server. Metadata< is more obscure and difficult to locate, and is found through an examination of often hidden and deleted files, or even left over file fragments that were supposed to be deleted. Specifically, metadata describes how, when and by whom particular set of data is collected and formatted. Metadata can often be thought of as the "DNA" of documents. It is hidden from view and often contains the most damaging information. Discovering the metadata behind a piece of data, such as a document or spreadsheet, can reveal the authors of the document, all comments and edits made and any other trait related to its creation. Mining for metadata is the newest tool in the ongoing battle between those seeking to conceal and those seeking to reveal electronic evidence.
The "hard" paper evidence obtained throughout the discovery process only reflects the most recent form of the document, and often does not reveal the most useful information. Direct or cross examination based strictly on the hard copy document restricts the examiner to questions regarding the information only contained on the printed page. It is therefore difficult to determine the document's authenticity, its author and any edits made while the copy was still a work in progress. Often times though, these documents were created in a word processing program such as Microsoft Word, which leaves a trail of information regarding the life of the document itself. The use of a skilled attorney or a forensic examiner can lead to the discovery of every detail regarding the document.
The metadata contained in documents will include 'tags' and information regarding when and by whom the document was created, what changes were ever made to the document, and even what else may have been on the creator's computer screen when making the document. For example, a forensic examination of a single fax cover letter can reveal not only the name and fax number but can also reveal every message sent by that user, using the same fax template. The metadata can reveal this information because when text is deleted using a word processor program, it is never truly removed from the document. In reality, when deleting the text the processor is simply instructed not to print or display the data. Knowledge of what the creator thought was deleted can be an extremely useful tool, for persuasive, substantive and impeachment purposes throughout the trial.
The hiring of an expert Data Forensics Expert may well be a justified expense when in the best interests of a client. The examiner will be able to help paint a picture by providing a story line with corroborating evidence including creation and edits dates, authorship, all communications regarding the document and potentially even the intent behind the acts. Such experts should be used in cases where substantial hidden digital evidence may exist. This is not restricted to intellectual property cases, but may involve every area of law, including family law, breach of contract, discrimination and sexual harassment.
The ability to spot the cases when metadata may be recovered is an important skill for any practitioner. The more important skill, however, is the ability to know how to use the electronic discovery means once identified. It is wise to use an attorney experienced in electronic discovery and metadata mining when faced with such a case. "Because of their ubiquitous nature, documents stored in electronic form…should be specifically targeted by counsel in developing their discovery plans. Failing to do so may not only prejudice their case, but may also constitute malpractice." CEB California Discovery Practice 3rd Ed Vol. 2, §8.24 p. 711 (1998). It is the duty of every advocate to have a sufficient level of knowledge regarding electronic discovery and metadata, or to at least associate with counsel who does. Failure to understand the importance and usefulness of metadata and electronic discovery in general may lead to undesirable consequences.
Related Tags: litigation, metadata, meta date, meta-date, cross exam, cross examination, cyberlawyer
This article was written by Nicholas J. Deleault, Pierce Law Center '07. Nicholas writes select legal articles for the Law Firm of Goldstien and Clegg, a Massachusetts cyberlaw firm.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Troubling New"spam" to Cell Phones Discovered
Troubling new"Spam" to Cell Phones Discovered In a day and age when spam is rampant on the interne - Sex Offenders - Keep Your Family Protected From Sex Offenders
As a parent, it is your responsibility to protect your family from any type of harm. Most especiall - Criminal Defense Attorney
 You've seen them on TV in their black coats; the formidable forces of law, the strong and intense - Critical Analysis of Cyber Law
Critical Analysis of Information Technology Act, 2000Â Till year 2000, India did not have any legis - Finding a Good Lawyer Referral
Perform An Online Attorney Search When You Need To lawyer referralHere is a common scenario: You ar - Usa Can Copy All You Have on Your Laptop
USA can copy all you have on your Laptop.American authorities has given airport security control mor - Best And Top New York Immigration Lawyer Of NY?
The term Immigration Lawyer is another very common term people are becoming aware of. But most of th - Domain Name Theft
Are you losing visitors to your domain? Are your search engine rankings still yours?Other people mi - Domain Name Dispute, What To Expect after You've Won
You file a UDRP complaint under ICANN and a panel has ordered a transfer of the stolen domain name. - Is Your Spouse Lying?
You may have noticed some unusual behavior from your significant other such as spending a lot of tim
Most viewed articles in this category:
- Malaysian Internet Marketer; The Constraints On Internet Transaction
The Problems;There is always an obstacle for everyone when dealing with internet transaction, Malays - A New Music Copyright Lawsuit Against YouTube
In the middle of November, Universal Music filed an extensive copyright lawsuit against YouTube, not - Protecting your Website's Content: Just Don't Bother
The internet is the best place if you want to steal content. It makes it really easy to copy any inf - Viacom Sues Google
Viacom, a media company, has recently sued Google for $1 billion, for the copyright infringement on - Defamation and Slander on the Internet
As social networking sites and internet blogs continue to increase in both popularity and use, the o - Internet Law in 2007
As we start off the 2007 year, many in the web community probably have questions about what developm - A Short Synopsis Of Cybercrime
To many involved in criminal dense, cyber crime is the bane of the 21st Century. It accounts for mi - Are We Able to Completely Stop Software Piracy
Software piracy is the illegal reproduction and distribution of software applications, whether for b - Anti-Cyber Squatting Consumer Protection Act Update
Our law firm receives a lot of calls from people and companies who are being threatened with an Anti - 2007 Issues In Communication - Internet Fraud And Freedom In The Balance
"Internet User Beware" should be a warning label that comes on each new computer sold. There are man