Time
48 minutes
Difficulty
Advanced
CEU/CPE
1

Video Description

This lesson discusses spoliation in the field of cyber. Spoliation occurs when a person or company withholds, alters, hides or destroys evidence that is relevant to a criminal case. This can be intentional or via negligence. Examples of this include but are not limited to: 1. Deleting syslog files 2. Wiping smartphones 3. Re-imagining a desktop or server 4. Reconfiguring firewalls

Video Transcription

00:04
In the next life, we will be dissecting some of the key elements of both the target and the Office of Personnel Management Breach.
00:11
But before we do,
00:13
we do need to address one last legal topic.
00:16
Exfoliation. So what is Foley ation? In layman's terms, you've been notified of the case against you.
00:23
And before you attempt to destroy or a move in any manner, any harmful evidence,
00:28
you are ordered to essentially quote unquote freeze in time
00:34
all operations
00:36
under the guidance of your legal representation.
00:39
So what might some examples include? It isn't just protecting email trails any longer
00:44
when facing a potential claim of harm. Make no mistake,
00:48
lawyers are increasingly becoming more student at to what to look for
00:53
and how soon in the process.
00:57
This Foley ation order usually rides on the heels of a subpoena or notice to appear in a court of law,
01:03
something that I cannot stress enough if we would have the reason that you think that you are smarter than the average bear and you want to roll the dice
01:11
if in the course of the leading information or D leaving system logs
01:17
if it was able to be found by opposing counsel that you manipulated the data.
01:23
Not only can you be fired from your job, but you can also be held criminally liable for a destruction of evidence.

Up Next

Corporate Cybersecurity Management

Cyber risk, legal considerations and insurance are often overlooked by businesses and this sets them up for major financial devastation should an incident occur.

Instructed By

Instructor Profile Image
Carter Schoenberg
Executive VP of IPKeys Power Partners
Instructor