Digital Proprietary Assets – Are Yours Safe?

We all have certain properties in our businesses that are intangible. Word files, video files, audio files, and even software can become our company’s most prized asset. But how sure are you that they’re 100% safe from infringement and illegal acquisition? Our job is to make sure that your assets are protected. Our lawyers here are specialized in digital technology and proprietary issues, so we’re able to provide you with coverage – from helping you trademark your software to helping you secure your assets from your employees via their contracts.

We also like to work with IPA or Intellectual Property Agreement wherein the products of your employees are now considered assets of the company and they can’t claim it for themselves. It’s kind of like a blow to their pride, but it’s something that protects the best interest of the company. this is done by a lot of companies that usually work with web development, content management, graphic design, 3D animation, mobile application development, and others. People who are under IPA may or may not claim that they designed or worked on the project, but they cannot claim that it’s theirs. This is one way of making sure that the company does not get sued over infringement issues.

 

How to File a Property Damage Claim

If you have been in a Massachusetts accident and need to file a property damage claim, it is important that you understand what can be recovered. Under the terms of auto insurance, property damage is considered to be any damage done to your automobile, whether it’s a car, SUV, or truck. Dependent on the type of coverage you have, repairs to vehicles that were damaged in an accident are usually paid for by an insurance company.

If your vehicle is considered a total loss-that is the repairs to fix it would cost more than the vehicle is worth-the insurance company will offer you a settlement based on the value of your vehicle.

LawIn this case, the amount you would receive for the vehicle would be dependent upon several factors, including:

• Type of vehicle
• Quality of vehicle
• Depreciation value
• Age of vehicle

Filing a Property Damage Claim

If you have been in a car accident in Massachusetts, it is important to file a claim with the other driver’s insurance carrier. When filing claims for damages, you will have to prove ownership of the property damaged, along with determining the amount of damage done to your property. Some of the ways to measure loss include:

• Cost to repair property
• Replacement value
• Market value
• Actual cash value, which is the cost of property minus depreciation

If you have “collision” coverage as part of your car insurance, your insurance should pay for your car repair, however you will need to make arrangements for:

• Towing
• Storage
• The actual repairs necessary
• Car rental should you need transportation while your repairs are being made

If you do not have “collision” coverage as part of your car insurance policy, you will have to contact the insurance company of the driver who caused your property damage. It’s important that you tell them the location and condition of your vehicle, but do not make any statements about your accident to the insurer or any insurance adjuster without seeking the advice of your personal injury attorney.

If you have attempted to claim benefits for your property damage but the insurer will not pay for it, you may need to seek legal advice from a Massachusetts attorney. A personal injury lawyer can help protect your rights and increase your odds when filing a property damage claim.

Private and Public Digital Evidence and Forensic Investigation

digital_evidenceThis article discusses the specific sub-field of digital forensics and the types of crimes that would need digital forensics for an investigation.

Digital Forensics

This sub-field of forensics examines data and information from computer storage media so that it may be used as evidence in a court of law or to answer a specific legal question as it may need.

For example in private investigations, digital forensics investigator may use digital forensics at the request of a private attorney for a defendant in a public case. And evidence may be gathered to prove that an employee is using company resources for personal private business use such as selling goods online or visiting the site that is against the company rules and regulation about Information technology. In this case, the employee may be subject to disciplinary action by the company, more personal liability, and perhaps criminal liability.

More so, evidence that proves an employee has violated an employment agreement. For example, evidence may be gathered that proves an employee accessed records or other information without authorization. It may also give that one employee has harassed another employee or perhaps stolen company information.

While public investigations require digital forensics only when a crime has been committed and computers can be used in crimes in one of the following ways, such as, Crimes associated with the prevalence of computers i.e. copyright violations, crimes in which computer is the instrument of the crime or crime in which computer are incidental to another crime such as using it to store illegal records and crimes in which the computer is the target such as crimes that involve stealing information from a computer or denial of service crimes.

Digital Evidence Collection

The collection of digital evidence may have several prominent roles in collection. These roles may include:

    • Physical Technology Collection: Investigators will collect the physical media. Physical media is any technology that stores data or information. E.g. hard disks, PDAs, flash and other electronic devices.

 

    • Physical Media Analysis: Investigators will analyze the physical evidence for finger prints or other evidence found on the surfaces of the physical technology. This role requires a deep understanding of the technology and may be able to aid the roles of digital evidence collection and digital evidence analysis even when the physical device is severely damaged.

 

    • Digital Evidence Collection: Investigators will collect the digital data from the physical device. Here, the evidence is the full set of files, folders, and bits stored on the physical media.

 

  • Digital Evidence Analysis: Investigators will analyze the data collected. Analysis of digital evidence may show hidden information.

Digital Evidence

Digital evidence is both the full set of bits, bytes, and blocks retrieved from the technology. It is also any subset of that full set such as e-mail, log files, text documents, spreadsheets, and other files.

Digital evidence has several unique challenges and questions that must be addressed. The highest challenge is found in modern computers which are implanted as multi-user systems with potentially hundreds of users. Since evidence must conclusively show facts in an investigation, it becomes critical to clear up ambiguities of who owns the data, how the data came to be on the system, and who or what originated the data.

Another concern is the legal issues surrounding the collection of evidence from privately owned devices such as cell phones in private investigations as well the expectation of privacy for employees using company provided resources. While no clear answers have emerged, many businesses specify the proper use of their assets and need employees to waive any such rights to privacy on company assets as part of their employment contract.

Furthermore, this issue has recently become more complicated with the onset of free publicly available encryption technologies. This specific question is whether or not a user retains an expectation of privacy by using encryption on company assets. Clearly, the company has the right to the encrypted version of the data; but does the company have the right to mandate the employee offer an unencrypted version? Subsequently, can a person be ordered by a court of law to give a password to law enforcement to decrypt the digital evidence?

One may be tempted to argue that no digital bit has ever been seen, so plain sight is not possible and not an issue. This issue of privacy raises the question of “plain sight” while collecting evidence from digital sources. Others may argue that a permit to collect any digital evidence stored on a disk or computer device is enough to collect any and all evidence from a computer for any crime.

The plain sight doctrine is best interpreted conservatively so that any seizure of evidence of one crime revealed during the search for evidence for another crime should be then justified by a permit.