{"id":732,"date":"2023-03-05T15:01:36","date_gmt":"2023-03-05T15:01:36","guid":{"rendered":"https:\/\/asginvestigations.com\/attorney-services\/?page_id=732"},"modified":"2023-04-15T18:01:14","modified_gmt":"2023-04-15T18:01:14","slug":"spoliation-of-evidence","status":"publish","type":"page","link":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/","title":{"rendered":"Computer Forensics and Spoliation of Evidence"},"content":{"rendered":"<div class=\"gb-container gb-container-f0cf2d08\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-01555574\">\n<div class=\"gb-grid-column gb-grid-column-ae0aa6f8\"><div class=\"gb-container gb-container-ae0aa6f8\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-d7d6b328 gb-headline-text line-before\">Discretion Expertise Results<\/p>\n\n\n\n<h1 class=\"gb-headline gb-headline-bf57f736 gb-headline-text\">Computer Forensics and Spoliation of Evidence<\/h1>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-0d4b2eec\"><div class=\"gb-container gb-container-0d4b2eec\"><div class=\"gb-inside-container\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-89d3c5c7\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-d9ae0f7e gb-headline-text line-before second-line-indent\">Contact Us<\/h2>\n\n\n\n<!-- SharpSpring Form for Contact Us Sidebar - Spry Style (ASG New)  -->\n<script type=\"text\/javascript\">\n    var ss_form = {'account': 'MzawMDGzNDI3AgA', 'formID': 'MzG1ME8yNDHUNTVLTdM1MTM00LU0tDDTNTY1SDYwNTazMEqyAAA'};\n    ss_form.width = '100%';\n    ss_form.domain = 'app-3QNFC7F5DW.marketingautomation.services';\n    ss_form.hidden = {'_usePlaceholders': true};\n    \/\/ ss_form.hidden = {'field_id': 'value'}; \/\/ Modify this for sending hidden variables, or overriding values\n    \/\/ ss_form.target_id = 'target'; \/\/ Optional parameter: forms will be placed inside the element with the specified id\n    \/\/ ss_form.polling = true; \/\/ Optional parameter: set to true ONLY if your page loads dynamically and the id needs to be polled continually.\n<\/script>\n<script type=\"text\/javascript\" src=\"https:\/\/koi-3QNFC7F5DW.marketingautomation.services\/client\/form.js?ver=2.0.1\"><\/script>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-d79eeaf9\">\n<div class=\"gb-container gb-container-f0ab50c2\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-734aff11\">\n<div class=\"gb-grid-column gb-grid-column-21672ec2\"><div class=\"gb-container gb-container-21672ec2\">\n\n<figure class=\"gb-block-image gb-block-image-306236d4\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1200\" class=\"gb-image gb-image-306236d4\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg\" alt=\"Computer forensics and spoliation\" title=\"Computer Forensics\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg 1800w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics-300x200.jpg 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics-1024x683.jpg 1024w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics-768x512.jpg 768w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-55137b6e\"><div class=\"gb-container gb-container-55137b6e\">\n\n<h2 class=\"gb-headline gb-headline-411c7c29 gb-headline-text\">Spoliation Of Evidence<\/h2>\n\n\n\n<p>In law, spoliation of evidence is the intentional or negligent withholding, hiding, alteration or destruction of evidence relevant to a legal proceeding. It is a criminal act in the United States under Federal and most State law. Spoliation has two consequences: first the act is criminal by statute and may result in fines and incarceration for the parties who engaged in the spoliation, secondly case law has established that proceedings which might have been altered by the spoliation may be interpreted under a \u201cspoliation inference\u201d. The spoliation inference is a negative evidentiary inference that a judge can draw from a party&#8217;s destruction of a document or item that is relevant to an ongoing or reasonably foreseeable civil or criminal proceeding: The judge can review all evidence uncovered in as strong a light as possible against the spoliator and in favor of the opposing party.<\/p>\n\n\n\n<p>The theory of the spoliation inference is that when a party destroys evidence, it may be reasonable to infer that the party had &#8220;consciousness of guilt&#8221; or other motivation to avoid the evidence. Therefore, the fact finder may conclude that the evidence would have been unfavorable to the spoliator. Some jurisdictions have recognized a spoliation tort action, which allows the victim of destruction of evidence to file a separate tort action against a spoliator.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-5908e4de\">\n<div class=\"gb-container gb-container-8fc80b44\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-2b02a22d\">\n<div class=\"gb-grid-column gb-grid-column-9ecfeed7\"><div class=\"gb-container gb-container-9ecfeed7\">\n\n<h2 class=\"gb-headline gb-headline-e00aa08b gb-headline-text\">Corporate America and Spoliation of Evidence<\/h2>\n\n\n\n<p>For corporate America, this poses some real problems. Most organizations are not involved in litigation on a frequent basis so when it occurs, discovery can be a strange process which leaves many managers doing their best to guess what information to secure and how to secure it. This is particularly true when it comes to electronic information. An order to preserve electronic evidence may arrive that is very broad, leaving everyone guessing exactly what to do to adhere to the order and still do your jobs. Lots of guessing occurs, some errors may come with it. In this type of environment, unintentional spoliation can easily occur and the results can be devastating to your company.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-dd78521b gb-headline-text\">Yes, unintentional acts and oversights by good, hard working employees can result in the loss of evidence, which can be interpreted as spoliation by a judge. Use the old adage that ignorance of the law does not excuse you from breaking it. This problem is not limited to small companies with low skill work forces, large businesses full of scientists and engineers fall victim to the same threats.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-8d6d7814\"><div class=\"gb-container gb-container-8d6d7814\">\n\n<figure class=\"gb-block-image gb-block-image-bd9bca6a\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1323\" class=\"gb-image gb-image-bd9bca6a\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Labor-and-Employment-Investigations.jpg\" alt=\"Labor and Employment Investigations\" title=\"Labor and Employment Investigations\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Labor-and-Employment-Investigations.jpg 1800w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Labor-and-Employment-Investigations-300x221.jpg 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Labor-and-Employment-Investigations-1024x753.jpg 1024w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Labor-and-Employment-Investigations-768x564.jpg 768w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Labor-and-Employment-Investigations-1536x1129.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-fbb7b2c0\">\n<div class=\"gb-container gb-container-66d28775\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-9e61b739\">\n<div class=\"gb-grid-column gb-grid-column-ad62bb1a\"><div class=\"gb-container gb-container-ad62bb1a\">\n\n<figure class=\"gb-block-image gb-block-image-d82f9281\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"546\" class=\"gb-image gb-image-d82f9281\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation.jpg\" alt=\"computer forensic experts\" title=\"computer forensic investigation\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation.jpg 800w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation-300x205.jpg 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation-768x524.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-be7dffcc\"><div class=\"gb-container gb-container-be7dffcc\">\n\n<h2 class=\"gb-headline gb-headline-de232700 gb-headline-text\">Utilizing Computer Forensics <\/h2>\n\n\n\n<p>In the digital &#8220;internet of things&#8221; era, the best way to protect your organization from the risks of spoliation is to have a computer forensic investigator assist in preserving your electronic data and letting your employees get back to work. This expert will literally make an exact duplicate copy of your data that can then be used in the court proceedings.<\/p>\n\n\n\n<p>Computer forensics can be performed in a very short amount of time, will have no impact on your computer systems and leaves nothing to chance in terms of spoliation. In most states, computer forensics must be performed by an internal employee trained in proper evidence collection practices and equipped with court recognized computer forensics software. If your organization does not have an internal department that provides this type of evidence collection, you will need to look outside the organization to a private investigator trained to perform the computer forensic evidence collection.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b437fa15\">\n<div class=\"gb-container gb-container-6d9b8758\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-ba89df08\">\n<div class=\"gb-grid-column gb-grid-column-4eb29dc2\"><div class=\"gb-container gb-container-4eb29dc2\">\n\n<h2 class=\"gb-headline gb-headline-1a03f17b gb-headline-text\">Choosing ASG for Computer Forensics to Avoid Spoliation of Evidence<\/h2>\n\n\n\n<p>This evidence collection activity is not where computer forensics stops. In some cases, the forensically sound copy of your data is examined deeply to look for documents and records that can help resolve the dispute.<\/p>\n\n\n\n<p>For more information on how to prepare your organization to react quickly and appropriately when litigation occurs, please call us and speak with our computer forensics director.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-72d8a2d3\"><div class=\"gb-container gb-container-72d8a2d3\">\n\n<figure class=\"gb-block-image gb-block-image-c32ecd4a\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" class=\"gb-image gb-image-c32ecd4a\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1.png\" alt=\"ASG Investigations - leading private investigation agency\" title=\"asg-transparent-logo-1\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1.png 500w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1-300x300.png 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Contact Us<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-732","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Forensics and Spoliation of Evidence<\/title>\n<meta name=\"description\" content=\"Computer forensics conducted by private investigators can help avoid the risk of spoliation of evidence during your case.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Forensics and Spoliation of Evidence\" \/>\n<meta property=\"og:description\" content=\"Computer forensics conducted by private investigators can help avoid the risk of spoliation of evidence during your case.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/\" \/>\n<meta property=\"og:site_name\" content=\"Attorney Services\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-15T18:01:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/\",\"url\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/\",\"name\":\"Computer Forensics and Spoliation of Evidence\",\"isPartOf\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg\",\"datePublished\":\"2023-03-05T15:01:36+00:00\",\"dateModified\":\"2023-04-15T18:01:14+00:00\",\"description\":\"Computer forensics conducted by private investigators can help avoid the risk of spoliation of evidence during your case.\",\"breadcrumb\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#primaryimage\",\"url\":\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg\",\"contentUrl\":\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg\",\"width\":1800,\"height\":1200,\"caption\":\"Computer forensics and spoliation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/asginvestigations.com\/attorney-services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Forensics and Spoliation of Evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/#website\",\"url\":\"https:\/\/asginvestigations.com\/attorney-services\/\",\"name\":\"Attorney Services\",\"description\":\"Expert Private Investigators for surveillance &amp; background checks\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/asginvestigations.com\/attorney-services\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Forensics and Spoliation of Evidence","description":"Computer forensics conducted by private investigators can help avoid the risk of spoliation of evidence during your case.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/","og_locale":"en_US","og_type":"article","og_title":"Computer Forensics and Spoliation of Evidence","og_description":"Computer forensics conducted by private investigators can help avoid the risk of spoliation of evidence during your case.","og_url":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/","og_site_name":"Attorney Services","article_modified_time":"2023-04-15T18:01:14+00:00","og_image":[{"url":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/","url":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/","name":"Computer Forensics and Spoliation of Evidence","isPartOf":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/#website"},"primaryImageOfPage":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#primaryimage"},"image":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg","datePublished":"2023-03-05T15:01:36+00:00","dateModified":"2023-04-15T18:01:14+00:00","description":"Computer forensics conducted by private investigators can help avoid the risk of spoliation of evidence during your case.","breadcrumb":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#primaryimage","url":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg","contentUrl":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Computer-Forensics.jpg","width":1800,"height":1200,"caption":"Computer forensics and spoliation"},{"@type":"BreadcrumbList","@id":"https:\/\/asginvestigations.com\/attorney-services\/spoliation-of-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/asginvestigations.com\/attorney-services\/"},{"@type":"ListItem","position":2,"name":"Computer Forensics and Spoliation of Evidence"}]},{"@type":"WebSite","@id":"https:\/\/asginvestigations.com\/attorney-services\/#website","url":"https:\/\/asginvestigations.com\/attorney-services\/","name":"Attorney Services","description":"Expert Private Investigators for surveillance &amp; background checks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/asginvestigations.com\/attorney-services\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages\/732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/comments?post=732"}],"version-history":[{"count":2,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages\/732\/revisions"}],"predecessor-version":[{"id":1048,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages\/732\/revisions\/1048"}],"wp:attachment":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/media?parent=732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}