Contact Us
This form does not yet contain any fields.
    Featured Audio

    Techdirt Interview of Ira Rothken
    -Discussion of Ira Rothken's career handling internet copyright cases

    February 23, 2012 Radio New Zealand
    -US abuse of power in taking down Megaupload
    -No such thing as criminal secondary copyright infringement
    -The Prosecution is politically motivated 

    Ira Rothken presentation at e-discovery seminar (excerpt)
    - discussion of technical-legal factors to consider in determining whether e-discovery related data is "not reasonably accessible"
    - More information can be found here 
     

    Featured Videos


    Photos

    Search
    Twitter Alerts
    Investigation Tips
    This form does not yet contain any fields.
      News Index
      Notice

      The information supplied on this web site is general in nature and should not be relied upon to make legal decisions. Interacting with e-mail, forms, or online forums on this web site does not constitute the creation of an attorney/client relationship. This web site is an advertisement for legal services. The examples of client cases and results discussed on this web site are not a guarantee of your outcome if we represent you in a particular case. 

      Login
      « Megaupload Files Brief with Federal Court Requesting Data Preservation While Protecting User Rights Under the Stored Communications Act | Main | Artem Vaulin Files Reply in Support of Motion to Dismiss »
      Friday
      Mar172017

      When Lawyers Become Hackers: A look at how attorneys might find “ethical hacking” useful in the e-discovery process.

      The “hacker” is generally considered the perpetual enemy of law firms and corporate legal departments, posing a pervasive and ever-evolving threat to client and corporate data. In some cases, however, attorneys may need to become the hacker they so despise. California technology attorney Ira Rothken describes this as a process of “ethical hacking.”
      “Ethical hacking, by its nature, is data recovery and penetration testing with authorization,” Rothken explained. “Typically, this means clients have to give their permission, but can also include instances where individual account owners are unreachable or software has changed substantially.”

      Read more of this Article at the National Law Journal.

      PrintView Printer Friendly Version

      EmailEmail Article to Friend