Digital Forensics, Computer Forensics examiner

Sean L Harrington

J.D., CISSP, CHFI, MCSE, CSOXP, CCFP

I am an experienced digital forensics examiner with expertise in corporate fraud, labor disputes, domestic relations, child pornography, the Adam Walsh Act, The Electronic Communications Privacy Act, the Computer Fraud and Abuse Act, electronic discovery, the work product doctrine, and the attorney client privilege. My experience is derived from the following disciplines: law, information technology, software engineering, regulatory compliance, risk management, and information security.  I am qualified to serve as a digital forensics examiner, expert witness, and court-appointed third-party neutral.  I have extensive experience in litigation support, including electronic discovery, the Rules of Evidence, the Rules of Civil Procedure, motions practice, pre-trial practice, and appellate practice.[1]  In addition, Attorney Client Privilege, LLC provides information security consulting for law firms and attorneys, including incident response, data breach prevention, network intrusion penetration testing, and security audits.
 
I maintain professional credentials and certifications in the areas of digital forensics (CHFI No. ECC930566, CCFP No. 335034), information security (CISSP No. 335034), regulatory compliance (CSOXP No. 00185), and network engineering MCSE, MCP+i, No. 977426). I have been certified since 2006 on the LexisNexis CaseMap suite.

Sean's Curriculum Vitae

testimonials

Presentations

  • (ISC)²® CFCPSM CBK® Training Preview (LegalTech New York, Feb. 6, 2014

  • “Hacking Back”: Legitimate Corporate Security or Risky Business? (Minnesota State Bar Ass’n Computer & Technology Law Section, Nov., 2013)

  • "You Love it, You Hate it. Now You Have to Live With it: E-Discovery" William Mitchell College of Law Auditorium. Friday, Oct. 4 | 9 am–4:30 pm

  • Minnesota e-Discovery Working Group presentation (June, 2013 Minnesota State Bar Ass’n Annual Convention, Duluth, MN)

  • "Trends in Employee-owned Devices in the workplace: Legal & Technological Risks"
    (Minnesota State Bar Ass’n Computer & Technology Law Section CLE, March, 2012; Ramsey County Bar Ass'n - June 28 & December 20, 2012)

  • “Corporate and Individual Liabilities of Releasing Vulnerable Code,” (Minnesota State Bar
    Ass’n Computer & Technology Law Section CLE, fall 2011)

  • The Legal and Financial Consequences of Releasing Vulnerable Software (Minneapolis Fortify User Group Conference, September, 2011)

  • Digital Forensics Goes Mobile: Evidence You Need to Win in 2011 (MinnCLE & CLE West, spring 2011)

  • "The 'End of Digital Forensics' or a Just a New Chapter?" (MSBA Computer & Technology Law Section CLE, spring 2011)

  • Computer Forensics Goes Mobile (Ramsey County Bar Association CLE, December, 2010)

  • Regulatory Compliance in the Software Development Lifecycle (Twin Cities Rational Users Group Conference, winter 2010)

  • Computer Forensics for the Litigator (Hamline Law School, spring 2010)

  • LexisNexis® CaseMap® Case Intake for Paralegals (Hamline Law School, spring 2010)

  • panelist, Consumer Perspectives on Alternative Legal Services, hosted by HALT (fall 2009)

Articles/Commentary


[1] I am not licensed to practice law. Therefore, all services provided that are "legal" in character are available only to and under the direct supervision of attorneys licensed to practice in the jurisdiction where the work is to be performed.

Contact Information

Please send email inquiries to sHarrington@attyClientPriv.com or call 508-361-2018, 651-760-3877.

 

 

  UPCOMING PRESENTATIONS

·“Hack Back or Active Defense?” (Secure360 conference, May 14, 2014)

·“Hack Back”: Legitimate Corporate Security or Risky Business? (U.S. Dep’t of Defense Cyber Crime Conference 2014)

   
   
 
 
 

try Simple Carver Suite

COMPUTER FORENSIC Minnesota, Twin cities, solo, law practice, computer forensics, digital forensics, mobile forensics, digital evidence specialists, litigation support, electronic discovery, hard drive recovery, disk recovery, data recovery service, litigation hold, legal hold, preservation memo, Motion to Image, discovery request, recover deleted files, crashed drive recovery, expert witness, FTK, computer crime, forensic analysis, cybercrime, security audits, Sarbanes-Oxley, Graham-Leachy, computer crime response, WebTracer, SilentRunner, steganography, internal investigations, insider threat, due diligence, domestic relations, fraud investigations, corporate espionage, embezzlement, infrastructure protection, private investigations, electronic data preservation, electronic analysis, intellectual property, audit trail, cyber security, harassment, identity theft, deposition, infiltration, forensic examiner, accounting fraud, assurance, behavioral science, civil proceedings, computer crime consulting, computer forensic analysis, computer fraud, corporate investigations, cyber terrorism, Cyberspace, data analysis, data discovery, data extraction, data restoration, denial of service attack, digital discovery, Digital media law Discovery, electronic evidence, Electronic forensics, Electronic legal discovery, Electronic records fraud, E-mail crime, E-mail evidence, employee malfeasance, employment litigation, encryption, Evidence Collection, hidden files, high tech crime, homeland defense, homeland security, Internet law, lost data, measure, media recovery, misappropriation, proprietary information, Risk management, threat assessment, trade secret, website audit, wiretapping, metadata, EDD, eDiscovery, e-discovery, inadvertent disclosure, unintentional disclosure, attorney client privilege, work produce privilege, fraud exception, CFCE, MCSE, CSOXP, CHFI, C|HFI, GCFA, CISSP, EnCase, EnCE, CCE, legal technology, IP trace, imaging, restoration, PGP, hacker, electronic, database, business network consulting, IT solutions, outsourcing, Microsoft Certified, on-site, backup, archival, tech support, workstation, NT, Windows 2003, Windows 7, XP, UNIX, trial exhibit, charts, graphs, timelines, Trial Director, Sanction, Verdict, audio forensics, image manipulation, audio-visual, CM/ECF, CM-ECF, File & Serve