Forensic, General & Medical
Expert Witnesses

Email Forensics Expert: Managing the Risky Business of Company E-mail


     By Evidence Solutions, Inc. Computer Technology and Digital Forensic Firm

PhoneCall Scott Greene at (866) 795-7166


As an employer, Human Resources Director, or Risk Management Supervisor, ask yourself this question: “Do our employees think about the legal risk of sending communications over the internet?”
If you are like the majority of companies, your answer would be, “It is highly improbable”. It is a very common problem amid the work place, for an employee to believe their electronic communications are transient, temporary and, once deleted, untraceable and therefore, harmless.

The fact is e-mail, faxes and even cellular phones leave a trace. Just one e-mail sent from your employee to the employee of a different company passes through an average of four different computer systems. This creates a trail making e-mail real, traceable, and permanent.

As an industry leader in Computer and Technology Forensics for the past 20 plus years, we have documented, during the examination of electronic systems, employees who frequently say/save things into e-mails or store on a computer, things they would never say anywhere else. Either having an employee delete a potentially damaging or inflammatory e-mail or even an employee deleting an e-mail on their own, does not protect anyone. In fact, it could in the end harm everyone involved.

If a complaint or inappropriate conduct of an employee has risen to the level where you as an owner/supervisor, need to consult a Computer and Technology Forensics expert, one of the first areas checked is for deleted documents and/or e-mails. These items cause red flags during an examination of equipment, and the original items can and most likely will be found and/or reconstructed. It is very important to understand that the intentional destruction of evidence is a felony, and if proven, could land one in jail.

An example of computer message in a court case dates back to the infamous trial of some of the Los Angeles Police being tried in the 1991 beating of Rodney King. One of the officers created a computer message stating, “…….I haven’t beaten anyone that bad in a long time.” This obviously became admissible in court.

A more recent example, is one in which we as a company were hired in a libel case. The libeler was using the internet to post messages on a public bulletin board that were both slanderous and libelous against a competitor in the same field. This person felt that by using “anonymous” e-mails and postings, this would increase their own standing within the same professional community. What the libeler didn’t count on was the traceability of the e-mails to their home, cell phone and company computer systems. We were able to locate the electronic trail, and with this information obtain, on behalf of the client, a court order to confiscate the equipment in order to create image copies of the electronic systems. As a result, in order to keep the issue private, the libeler agreed to a significant out of court settlement.

Author’s note: The suggestions listed in this article are not meant to be all-inclusive and are not legal advice. It is based upon our 30 plus years of experience in the industry as professional Computer and Technology Forensics experts, and how you, as an owner/supervisor, can potentially avoid legal pitfalls.

ABOUT THE AUTHOR: Scott Greene
Scott Greene over 35 years experience in Computer, Technology and Digital Forensics. He is a Senior Computer Forensics Examiner and the founder and CEO of Evidence Solutions, Inc. which has been an industry leader in Computer Consulting and Technology Forensics since 1982.

Scott’s extensive knowledge draws clients to him from all over the world for consulting and expert witness services in Technology, Computer & Digital Forensics.

Scott and Evidence Solutions have been involved in Civil & Criminal Cases, for Plaintiff, Defense and Special Master in Justice, Superior & District Courts as well as Internationally.

He is a sought-after speaker and educator and travels throughout the country presenting to local, regional, national and International organizations.

Copyright Evidence Solutions, Inc.

More information about Evidence Solutions, Inc.


While every effort has been made to ensure the accuracy of this publication, it is not intended to provide legal advice as individual situations will differ and should be discussed with an expert and/or lawyer.
For specific technical or legal advice on the information provided and related topics, please contact the author.

Find an Expert Witness