Asia (Other)

Screenshot 2020-01-31 at 2.57.56 PMEarly engagement of a Forensic investigator will ensure that all potential data sources relating to the claim are identified and considered for preservation and collection.


When digital evidence is required at the start of a matter, it’s easy to get swept up in the moment and start rushing to gather the evidence but this is a key time to step back, take a moment and reflect on the ultimate aim.

Self-collection is your firm’s greatest value proposition. The Client can gather the digital evidence, send it through and then it can be reviewed so it is possible to start piecing together what has occurred. However, this can result in potentially more work, missing key evidence or receiving a biased version of evidence and, of greater concern, having key evidence inadmissible in Court.

Here are some common scenarios to illustrate. The Client states that all the evidence relating to the claim is located on a particular folder on their Desktop, in text messages on their phone and within a folder in their email inbox. The Client will then copy the files from their Desktop on to a USB drive and forward emails that are located in their specific folder in their inbox.

The process of copying files onto a USB has the potential to change metadata. This could mean that the file creation data, modification date or accessed times could change, which could create doubt in terms of the authenticity of the documents. This process is also focused on what the Client believes to be relevant to the claim from a document perspective. There could be other data located on their computer that relates to the claim that they would not be able to access. This could include deleted data which could be recovered utilising forensic techniques, internet history, system artefacts, evidence of distribution of the key data or inculpatory evidence that needs to be considered.

Screenshot 2020-01-31 at 3.01.40 PM

In relation to emails, similar to copying files, the process of copying emails to a USB or forwarding the email to yourself may result in modification of the metadata. The folder may contain all received emails relating to the matter however may not include all sent items. If your Client has performed searches across their email to identify keywords that would relate to the matter, non-text searchable documents will be missed such as PDF attachments.

For mobile phones, self-collection is difficult and, in most instances, Clients will take screenshots or photos of their screen with the relevant text messages. Similar to documents and emails, this is a biased view of the conversations that have occurred and may not consider alternate communications that have occurred using other chat providers. Screenshots and photos will not have the associated metadata so the messages themselves cannot be verified in terms of when and if they have occurred.

Early engagement of a Forensic investigator will ensure that all potential data sources relating to the claim are identified and considered for preservation and collection. They will utilise methods that will ensure the evidence identified is admissible, impartial, repeatable and defensible in Court. They will ensure integrity of data and maintain full Chain of Custody from identification through to finalisation and, where required, they will prepare and present expert testimonial evidence in Court.




Established in 1999, Law In Order is the leading supplier of end to end document and digital solutions to the legal industry providing expert litigation and arbitration support through our cost-effective document production, expert discovery management and specialist eArbitration services.



By David Kerstjens



Screen Shot 2019-04-12 at 3.34.17 PM

3 Phillip Street, #17-01, Royal Group Building, Singapore 048693
T: (65) 6714 6655

Unit 901, 9/F, Beautiful Group Tower, 74-77 Connaught Road Central, Sheung Wan, Hong Kong
T: (852) 5803 0000

Related Articles by Firm
Data collection and early case assessment for investigations
Data collection and analysis for investigations is very different to collection for discovery or review. This article discusses the differences; how Early Case Assessment (ECA) can assist and the benefits of using review technology ...
Spotlight on eDiscovery
Many people are still confused about what electronic discovery encompasses ...
Will we see the end of Keywords in eDiscovery?
With the advances in Technology Assisted Review (TAR), it raises questions as to whether keywords still have a place in eDiscovery ...
How to Make Data Collection More ‘Effective’
Data can be collected efficiently, but if relevant data is not collected then the case will not come together.
Information Governance: Preserving Data and Being Prepared for Investigation
Organisations need to ensure their rules around information governance are being enforced. Many US organisations have an information governance officer in their IT, legal ...
How to speak IT
Ideally, everyone should have a basic understanding of the company’s IT infrastructure, not least because as more companies digitise, the risk of cyber threats increases. A cyberattack can come from anywhere ...
Computer Forensics and the Rise of the Drone
With more people being confined to their homes in different parts of the globe, hobbyists will be finding new uses for their drones ...
Redactions? How to Ensure There are no Nasty Surprises
With recent headlines highlighting the damage and embarrassment that can be caused by poorly redacted documents, it is no wonder many firms and corporates are turning to legal document management specialists to secure their redactions ...
What Happens After the Dawn Raid?
The dawn raid has led to the forensic collection of 100,000 documents, now safely secured on a hard drive. What is the process from here? It’s important to plan your strategy in advance to minimise downtime, extract relevant documents and ...
Bringing eDiscovery In-House? Four Tips to Get You Started
With an increase in litigation and in costs for document review, more and more companies are considering bringing parts, if not all, of the eDiscovery process in house ...
A Lawyer’s Future is Looking Sharp with Electronic Hearings
The benefits of running an efficient collection and forensic process extends all the way to the hearings room ...
Forensic investigations, the role of corporate counsel and the rise of information governance
Head of Forensics – Erick Gunawan, discusses the Role of Corporate Counsel in the context of litigation or investigation and the increasing importance of information governance ...
Forensic investigations and cross-border matters
What are the current trends in forensic investigations for cross-border matters? Head of Forensics - Erick Gunawan, looks at the constant evolution in data types and volumes, and the ever-tightening data privacy laws and regulatory intervention ...
Adopting eDiscovery for internal investigations
In-house counsel are often called on to manage an internal investigation. How can you effectively plan for and manage these investigations? We explore how electronic discovery (eDiscovery) tools help you mitigate risk and achieve your fact-finding mission.
The evidence collector that’s always with you
It is an integral part of our life these days and an item that is rarely further than arm’s reach ...
Related Articles
Related Articles by Jurisdiction
Investigating procurement fraud in South and Southeast Asia
Markets in Asia can pose unexpected challenges for companies that rely on fraud mitigation and investigation practices applicable to developed markets. Quite simply, these practices do not work in Asia ...
Global economic weather – 11th May 2016
Asia: The economic news from Asia is currently conforming pretty much to trend, with occasional unexpected strengths, such as Japan’s industrial production last week or Australia’s exports this week ...
MALAYSIA: Managing risks along China’s belt and road initiative
China’s belt and road initiative (BRI) involves Chinese companies investing in or with companies in the belt-and-road countries ...
Latest Articles