Deck 1: Introduction to E-Discovery and Digital Evidence

Full screen (f)
exit full mode
Question
Metadata is a legal term that refers to the actual information being retrieved.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is NOT a service model defined by NIST?

A) SaaS
B) PaaS
C) IaaS
D) NaaS
Question
Cloud computing is a model in which computing resources are hosted remotely.
Question
Which of the following is an example of metadata?

A) a paragraph in a printed document
B) words in an electronic document
C) GPS data for a photo
D) DNA extracted from blood
Question
Where should you look if you want to find what camera was used to take a photograph?

A) on the back of the photo file
B) in the EXIF header
C) on a hardcopy of the photo
D) in the jpg pixels
Question
Which of the following is NOT true about digital evidence?

A) it can pertain to a civil or criminal complaint
B) it is only found on desktop computers
C) it must be acquired by following specific procedures
D) e-mail is an example
Question
E-discovery is the use of advanced electronic surveillance to catch criminals in the act.
Question
In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?

A) WAN network
B) Internetwork model
C) Cloud computing
D) Mainframe processing
Question
The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.
Question
What must be followed to ensure that evidence has not been tampered with or altered?

A) search warrants
B) chain of custody
C) subpoenas
D) requests for production
Question
Which cloud deployment method is considered the most secure?

A) public
B) hybrid
C) internal
D) private
Question
Which of the following is true about digital forensics?

A) device forensics focuses on network intrusion
B) a MAC time tells a digital forensics expert the hardware address of a computer
C) network forensics experts consider e-discovery a part of their job
D) e-discovery can be considered a subset of digital forensics
Question
Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
Question
Which of the following is true about E-discovery?

A) it can be thought of as data mining
B) it consists of hard copies of court documents
C) it does not include data found on cellular phones
D) it is valid in civil cases, but not in criminal cases
Question
With which service model do customers select an OS and install their own applications?

A) SaaS
B) PaaS
C) NaaS
D) IaaS
Question
Why might you want to use the AccessData Forensic Toolkit?

A) to view document metadata
B) to examine blood evidence
C) to listen in on cell phone transmissions
D) to capture network data
Question
When examining digital evidence on a device, what is used to prevent data from being copied back to the evidence item inadvertently?

A) write blocker
B) live acquisitions
C) deduplication
D) forensic imaging
Question
The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?

A) network forensics expert
B) e-discovery expert
C) ESI administrator
D) device forensics expert
Question
Which of the following is NOT a cloud deployment method defined by NIST?

A) internal
B) private
C) hybrid
D) public
Question
In general, states' rules regarding ESI can be more lenient than federal rules.
Question
Dropbox is an example of the ___________ cloud service model.
Question
Match between columns
the application of traditional forensics procedures to acquiring computer evidence
digital evidence
the application of traditional forensics procedures to acquiring computer evidence
OCR
the application of traditional forensics procedures to acquiring computer evidence
FRCrP
the application of traditional forensics procedures to acquiring computer evidence
chain of custody
the application of traditional forensics procedures to acquiring computer evidence
e-discovery
the application of traditional forensics procedures to acquiring computer evidence
MAC times
the application of traditional forensics procedures to acquiring computer evidence
data mining
the application of traditional forensics procedures to acquiring computer evidence
native file
the application of traditional forensics procedures to acquiring computer evidence
ESI
the application of traditional forensics procedures to acquiring computer evidence
digital forensics
Question
In the context of e-discovery, ____________ evidence is called ESI.
Question
Which set of rules applies to all evidence presented in court for both civil and criminal cases?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
Question
Match between columns
any information stored electronically or in a digital format
digital evidence
any information stored electronically or in a digital format
OCR
any information stored electronically or in a digital format
FRCrP
any information stored electronically or in a digital format
chain of custody
any information stored electronically or in a digital format
e-discovery
any information stored electronically or in a digital format
MAC times
any information stored electronically or in a digital format
data mining
any information stored electronically or in a digital format
native file
any information stored electronically or in a digital format
ESI
any information stored electronically or in a digital format
digital forensics
Question
Match between columns
a file in the originating application's format
digital evidence
a file in the originating application's format
OCR
a file in the originating application's format
FRCrP
a file in the originating application's format
chain of custody
a file in the originating application's format
e-discovery
a file in the originating application's format
MAC times
a file in the originating application's format
data mining
a file in the originating application's format
native file
a file in the originating application's format
ESI
a file in the originating application's format
digital forensics
Question
What type of software can be used to index the text contained in scanned pictures of documents?

A) TIFF
B) PDF
C) OCR
D) ESI
Question
Match between columns
a method used to gather information about customers or vendors by culling ESI
digital evidence
a method used to gather information about customers or vendors by culling ESI
OCR
a method used to gather information about customers or vendors by culling ESI
FRCrP
a method used to gather information about customers or vendors by culling ESI
chain of custody
a method used to gather information about customers or vendors by culling ESI
e-discovery
a method used to gather information about customers or vendors by culling ESI
MAC times
a method used to gather information about customers or vendors by culling ESI
data mining
a method used to gather information about customers or vendors by culling ESI
native file
a method used to gather information about customers or vendors by culling ESI
ESI
a method used to gather information about customers or vendors by culling ESI
digital forensics
Question
Match between columns
metadata that specifies dates and times that a file was modified, accessed, and created
digital evidence
metadata that specifies dates and times that a file was modified, accessed, and created
OCR
metadata that specifies dates and times that a file was modified, accessed, and created
FRCrP
metadata that specifies dates and times that a file was modified, accessed, and created
chain of custody
metadata that specifies dates and times that a file was modified, accessed, and created
e-discovery
metadata that specifies dates and times that a file was modified, accessed, and created
MAC times
metadata that specifies dates and times that a file was modified, accessed, and created
data mining
metadata that specifies dates and times that a file was modified, accessed, and created
native file
metadata that specifies dates and times that a file was modified, accessed, and created
ESI
metadata that specifies dates and times that a file was modified, accessed, and created
digital forensics
Question
Match between columns
gathering ESI for use in litigation
digital evidence
gathering ESI for use in litigation
OCR
gathering ESI for use in litigation
FRCrP
gathering ESI for use in litigation
chain of custody
gathering ESI for use in litigation
e-discovery
gathering ESI for use in litigation
MAC times
gathering ESI for use in litigation
data mining
gathering ESI for use in litigation
native file
gathering ESI for use in litigation
ESI
gathering ESI for use in litigation
digital forensics
Question
Which of the following was developed as the result of burgeoning e-commerce in the 1990s, focused on civil procedures, and has been a basis for e-discovery worldwide?

A) UN Model Law
B) European Corporate Laws
C) Canadian Rules of Civil Procedure
D) Sedona Canada Principles
Question
Replacing paper documents with electronic documents in PDF or TIFF format is an example of good ___________ management.
Question
E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.
Question
With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.
Question
Match between columns
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital evidence
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
OCR
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
FRCrP
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
chain of custody
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
e-discovery
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
MAC times
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
data mining
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
native file
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
ESI
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital forensics
Question
Match between columns
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital evidence
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
OCR
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
FRCrP
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
chain of custody
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
e-discovery
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
MAC times
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
data mining
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
native file
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
ESI
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital forensics
Question
Which of the following were created by a group of lawyers and other professionals as guidelines for handling electronic documents?

A) Federal Rules of Evidence
B) Sedona Principles
C) Advisory Committee on Civil Rules
D) UN Model Law
Question
Match between columns
a software method of scanning a picture and converting the characters to text
digital evidence
a software method of scanning a picture and converting the characters to text
OCR
a software method of scanning a picture and converting the characters to text
FRCrP
a software method of scanning a picture and converting the characters to text
chain of custody
a software method of scanning a picture and converting the characters to text
e-discovery
a software method of scanning a picture and converting the characters to text
MAC times
a software method of scanning a picture and converting the characters to text
data mining
a software method of scanning a picture and converting the characters to text
native file
a software method of scanning a picture and converting the characters to text
ESI
a software method of scanning a picture and converting the characters to text
digital forensics
Question
Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?

A) Limited Admissibility
B) Relevancy and Its Limits
C) Hearsay
D) Opinions and Expert Testimony
Question
Match between columns
any evidence that's stored or transmitted electronically or in a digital format
digital evidence
any evidence that's stored or transmitted electronically or in a digital format
OCR
any evidence that's stored or transmitted electronically or in a digital format
FRCrP
any evidence that's stored or transmitted electronically or in a digital format
chain of custody
any evidence that's stored or transmitted electronically or in a digital format
e-discovery
any evidence that's stored or transmitted electronically or in a digital format
MAC times
any evidence that's stored or transmitted electronically or in a digital format
data mining
any evidence that's stored or transmitted electronically or in a digital format
native file
any evidence that's stored or transmitted electronically or in a digital format
ESI
any evidence that's stored or transmitted electronically or in a digital format
digital forensics
Question
Discuss the difference between data and metadata providing examples.
Question
Describe e-discovery in terms of data mining.
Question
Describe software as a service (SaaS). Provide an example.
Question
How has the introduction of digital evidence changed the FRE, if at all?
Question
What are the two specialties of digital forensics?
Question
Describe digital evidence. What are some sources of digital evidence?
Question
How does the volume of information involved in a case affect the e-discovery process? How can the impact be reduced?
Question
What is a difference between e-discovery and digital forensics?
Question
How does the cloud affect e-discovery?
Question
What is the importance of chain of custody?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to E-Discovery and Digital Evidence
1
Metadata is a legal term that refers to the actual information being retrieved.
False
2
Which of the following is NOT a service model defined by NIST?

A) SaaS
B) PaaS
C) IaaS
D) NaaS
D
3
Cloud computing is a model in which computing resources are hosted remotely.
True
4
Which of the following is an example of metadata?

A) a paragraph in a printed document
B) words in an electronic document
C) GPS data for a photo
D) DNA extracted from blood
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Where should you look if you want to find what camera was used to take a photograph?

A) on the back of the photo file
B) in the EXIF header
C) on a hardcopy of the photo
D) in the jpg pixels
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT true about digital evidence?

A) it can pertain to a civil or criminal complaint
B) it is only found on desktop computers
C) it must be acquired by following specific procedures
D) e-mail is an example
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
E-discovery is the use of advanced electronic surveillance to catch criminals in the act.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?

A) WAN network
B) Internetwork model
C) Cloud computing
D) Mainframe processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What must be followed to ensure that evidence has not been tampered with or altered?

A) search warrants
B) chain of custody
C) subpoenas
D) requests for production
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which cloud deployment method is considered the most secure?

A) public
B) hybrid
C) internal
D) private
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is true about digital forensics?

A) device forensics focuses on network intrusion
B) a MAC time tells a digital forensics expert the hardware address of a computer
C) network forensics experts consider e-discovery a part of their job
D) e-discovery can be considered a subset of digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about E-discovery?

A) it can be thought of as data mining
B) it consists of hard copies of court documents
C) it does not include data found on cellular phones
D) it is valid in civil cases, but not in criminal cases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
With which service model do customers select an OS and install their own applications?

A) SaaS
B) PaaS
C) NaaS
D) IaaS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Why might you want to use the AccessData Forensic Toolkit?

A) to view document metadata
B) to examine blood evidence
C) to listen in on cell phone transmissions
D) to capture network data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When examining digital evidence on a device, what is used to prevent data from being copied back to the evidence item inadvertently?

A) write blocker
B) live acquisitions
C) deduplication
D) forensic imaging
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?

A) network forensics expert
B) e-discovery expert
C) ESI administrator
D) device forensics expert
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT a cloud deployment method defined by NIST?

A) internal
B) private
C) hybrid
D) public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
In general, states' rules regarding ESI can be more lenient than federal rules.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Dropbox is an example of the ___________ cloud service model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
the application of traditional forensics procedures to acquiring computer evidence
digital evidence
the application of traditional forensics procedures to acquiring computer evidence
OCR
the application of traditional forensics procedures to acquiring computer evidence
FRCrP
the application of traditional forensics procedures to acquiring computer evidence
chain of custody
the application of traditional forensics procedures to acquiring computer evidence
e-discovery
the application of traditional forensics procedures to acquiring computer evidence
MAC times
the application of traditional forensics procedures to acquiring computer evidence
data mining
the application of traditional forensics procedures to acquiring computer evidence
native file
the application of traditional forensics procedures to acquiring computer evidence
ESI
the application of traditional forensics procedures to acquiring computer evidence
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
In the context of e-discovery, ____________ evidence is called ESI.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which set of rules applies to all evidence presented in court for both civil and criminal cases?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
any information stored electronically or in a digital format
digital evidence
any information stored electronically or in a digital format
OCR
any information stored electronically or in a digital format
FRCrP
any information stored electronically or in a digital format
chain of custody
any information stored electronically or in a digital format
e-discovery
any information stored electronically or in a digital format
MAC times
any information stored electronically or in a digital format
data mining
any information stored electronically or in a digital format
native file
any information stored electronically or in a digital format
ESI
any information stored electronically or in a digital format
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match between columns
a file in the originating application's format
digital evidence
a file in the originating application's format
OCR
a file in the originating application's format
FRCrP
a file in the originating application's format
chain of custody
a file in the originating application's format
e-discovery
a file in the originating application's format
MAC times
a file in the originating application's format
data mining
a file in the originating application's format
native file
a file in the originating application's format
ESI
a file in the originating application's format
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What type of software can be used to index the text contained in scanned pictures of documents?

A) TIFF
B) PDF
C) OCR
D) ESI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
a method used to gather information about customers or vendors by culling ESI
digital evidence
a method used to gather information about customers or vendors by culling ESI
OCR
a method used to gather information about customers or vendors by culling ESI
FRCrP
a method used to gather information about customers or vendors by culling ESI
chain of custody
a method used to gather information about customers or vendors by culling ESI
e-discovery
a method used to gather information about customers or vendors by culling ESI
MAC times
a method used to gather information about customers or vendors by culling ESI
data mining
a method used to gather information about customers or vendors by culling ESI
native file
a method used to gather information about customers or vendors by culling ESI
ESI
a method used to gather information about customers or vendors by culling ESI
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match between columns
metadata that specifies dates and times that a file was modified, accessed, and created
digital evidence
metadata that specifies dates and times that a file was modified, accessed, and created
OCR
metadata that specifies dates and times that a file was modified, accessed, and created
FRCrP
metadata that specifies dates and times that a file was modified, accessed, and created
chain of custody
metadata that specifies dates and times that a file was modified, accessed, and created
e-discovery
metadata that specifies dates and times that a file was modified, accessed, and created
MAC times
metadata that specifies dates and times that a file was modified, accessed, and created
data mining
metadata that specifies dates and times that a file was modified, accessed, and created
native file
metadata that specifies dates and times that a file was modified, accessed, and created
ESI
metadata that specifies dates and times that a file was modified, accessed, and created
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match between columns
gathering ESI for use in litigation
digital evidence
gathering ESI for use in litigation
OCR
gathering ESI for use in litigation
FRCrP
gathering ESI for use in litigation
chain of custody
gathering ESI for use in litigation
e-discovery
gathering ESI for use in litigation
MAC times
gathering ESI for use in litigation
data mining
gathering ESI for use in litigation
native file
gathering ESI for use in litigation
ESI
gathering ESI for use in litigation
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following was developed as the result of burgeoning e-commerce in the 1990s, focused on civil procedures, and has been a basis for e-discovery worldwide?

A) UN Model Law
B) European Corporate Laws
C) Canadian Rules of Civil Procedure
D) Sedona Canada Principles
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Replacing paper documents with electronic documents in PDF or TIFF format is an example of good ___________ management.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match between columns
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital evidence
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
OCR
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
FRCrP
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
chain of custody
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
e-discovery
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
MAC times
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
data mining
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
native file
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
ESI
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match between columns
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital evidence
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
OCR
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
FRCrP
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
chain of custody
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
e-discovery
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
MAC times
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
data mining
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
native file
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
ESI
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following were created by a group of lawyers and other professionals as guidelines for handling electronic documents?

A) Federal Rules of Evidence
B) Sedona Principles
C) Advisory Committee on Civil Rules
D) UN Model Law
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match between columns
a software method of scanning a picture and converting the characters to text
digital evidence
a software method of scanning a picture and converting the characters to text
OCR
a software method of scanning a picture and converting the characters to text
FRCrP
a software method of scanning a picture and converting the characters to text
chain of custody
a software method of scanning a picture and converting the characters to text
e-discovery
a software method of scanning a picture and converting the characters to text
MAC times
a software method of scanning a picture and converting the characters to text
data mining
a software method of scanning a picture and converting the characters to text
native file
a software method of scanning a picture and converting the characters to text
ESI
a software method of scanning a picture and converting the characters to text
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?

A) Limited Admissibility
B) Relevancy and Its Limits
C) Hearsay
D) Opinions and Expert Testimony
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
any evidence that's stored or transmitted electronically or in a digital format
digital evidence
any evidence that's stored or transmitted electronically or in a digital format
OCR
any evidence that's stored or transmitted electronically or in a digital format
FRCrP
any evidence that's stored or transmitted electronically or in a digital format
chain of custody
any evidence that's stored or transmitted electronically or in a digital format
e-discovery
any evidence that's stored or transmitted electronically or in a digital format
MAC times
any evidence that's stored or transmitted electronically or in a digital format
data mining
any evidence that's stored or transmitted electronically or in a digital format
native file
any evidence that's stored or transmitted electronically or in a digital format
ESI
any evidence that's stored or transmitted electronically or in a digital format
digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the difference between data and metadata providing examples.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe e-discovery in terms of data mining.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe software as a service (SaaS). Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How has the introduction of digital evidence changed the FRE, if at all?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are the two specialties of digital forensics?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe digital evidence. What are some sources of digital evidence?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does the volume of information involved in a case affect the e-discovery process? How can the impact be reduced?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is a difference between e-discovery and digital forensics?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does the cloud affect e-discovery?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is the importance of chain of custody?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.