Verified | Latest 2024 Version
After your legal team requested from the opposing party 25 of its employees' e-mails sent or received
over the prior decade, the opponent objected to the request, stating it was overbroad, not proportional
and unduly burdensome.
Of the following, what is the strongest argument to defend your team's request?
A. Email is Electronically Stored Information and is discoverable
B. 25 people is a reasonable number of custodians
C. IT has tools to export email easily
D. Responding party failed to offer evidence in support of its position - ✔✔D
An employee is suspected of stealing corporate secrets by downloading files onto his employer's desktop
computer, copying the files to a thumb drive, and then taking the thumb drive home.
What is the most effective method to determine whether the employee is stealing?
A. Interview the employee.
B. Examine the corporate firewall logs.
c. Collection and examine the corporate desktop with forensics software.
D. Export the mailbox and review the employee's email. - ✔✔C
Your corporate client's IT department seeks to recover storage space from its computer servers including
a file share where the finance team stores weekly, monthly, quarterly reports.
Which of the following is the least important factor in determining whether the file share can be
deleted?
A. The file share can only be written to by the report writer for the Finance Department which never
adds new reports or changes the reports' formats
B. Finance reports are generated from a central system whose data are retained permanently