Computer Forensics 101

Date: March 31 2020 CLE Credits: 2 General

Step 1: Select Desired Format In Blue

Step 2:

Live Webcast/Rebroadcast - You watch the course online at the specified date and time shown below. You can ask questions and receive answers during the course.
On-Demand - You watch the course anytime and will have access to the course 24/7. Our On-Demand courses are available within 5-10 business days after the original recording and accessible for one year.

Live Webcast - March 31, 2020

  • 10:00-12:15pm PST / 11:00-1:15pm MST / 12:00-2:15pm CST / 1:00-3:15pm EST

Course Description

Computer forensics is a set of specialized techniques for collection, preservation, analysis, recovery, authentication and reporting of electronic data. A computer forensics specialist is most typically needed when an investigation or legal proceeding case involves one or more of the following issues: reconstruction of computer usage; examination of residual data; authentication of data by technical analysis; or explanation of technical features of computer usage or data.

The timing, scope or nature of deletions can yield key evidence in many contexts, such as intellectual property theft, hacking, bribery, fraud or sexual harassment. At times “smoking gun” evidence – perhaps in the form of supposedly “deleted” files or messages – can be found on computer hard drives, mobile devices, company networks or websites.



Next Previous


  • Robert D. Brownstone
    Robert D. Brownstone has been an attorney for over 30 years. He is also a long-term technologist, thought leader and law school adjunct professor. For almost 20 years, Robert has practiced at Silicon-Valley-based Fenwick & West LLP, where he been the Technology & eDiscovery Counsel and Electronic-Information-Management (EIM) Group Chair since 2011. Working out of the firm’s San Francisco, New York and Silicon Valley Center offices, Robert advises clients and colleagues on electronic-discovery, information-security, data-privacy (including GDPR), retention-destruction policies and social-media risks and rewards. Since 2002, he has been a nationwide advisor, conference-chair, speaker, writer and press resource on many electronic information topics. Over the past decade, Robert has taught more than ten Electronic Discovery Law & Process courses at four law schools around the country.

    Contact Robert D. Brownstone

      • 2 General Credits
      • ProLawCLE will seek approval of any CLE program where the registering attorney is primarily licensed with exceptions stated below. Application is made at the time an attorney registers for a course, therefore approval may not be received at the time of broadcasting.

        ProLawCLE does not seek approval in the state of Virginia.

        Each state has its own governing rules and regulations with regards to CLE courses and formats, therefore please contact your state MCLE regulatory entity for further details about your state's rules. Please visit our State Requirements page for information regarding your state's CLE requirements and/or contact information for your state bar.

        As stated in our Reciprocity Provision, ProLawCLE will grant credit in the following states through reciprocity, therefore direct application will not be made in these states:

        AK, AR, CO, FL, ME, MT, ND, NH, NJ, NY, and PR.

        ProLawCLE is dedicated to providing quality education from expert speakers and ensuring each attorney receives CLE credit for their participation. If for some reason a particular course does not receive approval in the attorney's primary state of licensure, ProLawCLE will give credit for a future approved course or give a full refund, if applicable.

      Each On-Demand course is available to you for 1 year from date of purchase. Additionally, CLE credit is only available within that year.
    1. Big Picture
    2. What is Computer Forensics?
    3. When to use Forensics
    4. Discoverability and Relevance in Litigation
    5. Key Terminology
    6. Basics of How a Disc Stores Data
    7. Hard Disc’s Structure
    8. Active vs. Inactive Data
    9. Where Can Data be Found?
    10. Why “Delete” Doesn’t Mean “Delete”
    11. Collection and Analysis Processes
    12. Various Additional Contexts
    13. Mobile Devices Forensics (smartphones, tablets, etc.)
    14. Network Forensics
    15. Internet Forensics
    16. Top Five (5) Forensics Tips in eDiscovery Process

Related Items