Why 3rd Party Evidence Handling is Important

Let’s talk about why you should be using the services of Liticode, or someone like us, but preferably us. No equivocation, we’ll get right to the foundations of it.

  1. Transfer of liability. There, we said it. The basest of all motives, money. If, luck forbid, there is an issue with the evidence preservation, and internal people did the preservation, the court is likely to take a dim view of the situation and hold the company accountable. Whereas, if it’s OUR fault, the court is going to yell at us and we may be sued by various parties for it (which has never happened, because we’re good at what we do), but YOU are not going to get hit with an intentional destruction of evidence direction from the court. Isn’t that convenient? Like a little slice of insurance you didn’t have to pay a premium on.
  2. We provide an unbiased, objective methodology for the analysis and collection of the electronic evidence. Our personnel are trained in this, experienced in the specific tasks, and not subject to any internal bias regarding what is evidence and what isn’t. We follow the risk averse mantra of “preserve broadly, present narrowly”, and we’ve never missed an objective. Whereas your personnel are subject to a variety of internal factors and pressures which may or may not increase the risk of an improper preservation effort. Which brings us back to the first argument for using Liticode, move that risk off your plate and onto ours.
  3. Using Liticode reduces the chance of an internal leak. There are several points in the process that can be a bit leaky, and you may not want the information contained in the evidence collection available internally. Analysis personnel talk. Collection personnel talk. Preservation personnel talk, misplace data, and accidentally destroy materials. There are chain of command leaks; line employees talk to their managers about the task and results. (Which, by the way, can increase the risk of insider trading!) Preserved data wanders as employees change positions in the company, as well. Some litigation runs for years, so a single point of risk like Liticode is preferable to a complex risk component such as in internal effort. Using internal resources complicates oversight procedures and accounting, as well. Use of a dedicated internal resource helps, but now you’re tasking an FTE and still not eliminating the majority of the risks outlined above. Our process is designed so that your information can’t be exposed or lost, and we compartmentalize and archive everything in dedicated facilities.

In short, Liticode is the best choice for your evidence processing needs. We do a better job and lower your risks because we have the experience to handle your internal evidence assets even better than you can yourselves.

But run this past your lawyer, because we’re not lawyers, we’ve just been doing this for more than 25 years. And then call us, because we’re the best. You can reach us at 610-810-1727 or fill out the form here.

Unauthorized Data Transmission by Hospital Applications

As reported in Network World and from our own observations, there is a bit of trouble with unauthorized outbound information transmission from a variety of systems and software on business networks, including healthcare. Healthcare Providers are particularly susceptible to this, because they have more systems per installation than any other form of business.  Most of the problems are covered in the article link above, so we’ll focus on the two that aren’t, and then talk about what we can do to help.

As discussed in the article :

  • Security devices and systems transmitting configuration data and other information without consent or notice.
  • OT devices like MRI machines and other systems, misconfigured or with their own security problems.
  • Desktop operating systems like Windows 10, which is obnoxiously chatty with high risk components being transmitted.
  • Rogue devices brought in by employees with good intentions, which unfortunately are not secure and transmit all sorts of good data.

Then there’s these:

  • Applications, misconfigured or configured with malignant intentions in an unauthorized fashion by companies with poor practices or ethics.
  • Good intentioned or bad intentioned users, transmitting all sorts of company data.

Email leaks are bad enough, but when systems and authorized users are transmitting data without our knowledge, it’s a serious blind spot. YOu can implement some form of data loss prevention, which should catch the leaks over common channels, but what about the systems and applications that are authorized and more difficult to find?

For these unauthorized data transmissions by personnel, you need manual review and monitoring. To catch data theft by systems personnel, you need to capture their activities and then validate them during or after the fact for bad activities.  We’ve observed major players in the electronic medical records business transmitting large amounts of patient data back to their company systems without authorization.  That needs to be squashed when it happens, so implement a process to make sure it doesn’t happen to your company.

For unauthorized transmissions by systems, you also need monitoring, but because it’s part of the overall activities, you can’t just watch when it’s happening, because you don’t know when it’s happening.  For this, you need to capture and analyze traffic and build up a knowledge of what is normal so you can spot anomalies.  It’s usually easy to profile an application and then locate any strange activity.

If you want some reassurance that your processes are catching everything, or you don’t have the resources to manage the verification process improvement on your own, please call us.  Finding needles in haystacks is kind of our thing.  We’ll be glad to help you figure out your needs and then map out business process improvements to cover them.

We’re the best at finding evidence of bad actors on your network.  Call now 610-810-1727 or email us at sales@ .