Author: David Michael Bigeleisen
It’s twenty after nine in the morning. Traffic was heavy and you are bit late getting into the office. You’ve taken off your coat, and your secretary has just brought you a fresh cup of coffee with milk, just as you like it. You’re settling in for a full day of work.
The intercom buzzes. “It’s Mr. Pauli, the president of Neutrinos, Inc.” your secretary says. “He sounds really upset and he needs to talk to you right away.”
“I just spoke to him last night, I said I’d be ready to review the new lease with him right after lunch; can’t I have just a little bit of peace in this world?” you reply.
“It’s not about the lease,” your secretary replies, with just a bit of an edge in her voice. “There are eight special agents in his reception area. He says that they have a warrant to search his company’s computer.”
You pick up the line and tell Pauli, “I’ll be right down.”
This article will orient you on how to respond when the authorities attempting to search your client’s desktop, laptop or mainframe computer, smartphone, or email information. The law is changing very rapidly in these areas.
Full article available after purchase.
Certificate available after completion of 20 question true/false test.