Computer Forensics 101



Live Webcast/Rebroadcast – You watch the course online at the specified date and time shown below. You can ask questions and receive answers during the course.

On-Demand – You watch the course anytime and will have access to the course 24/7. Our On-Demand courses are available within 5-10 business days after the original recording and accessible for one year.

Course Description

This program was recorded on March 31, 2020

Computer forensics is a set of specialized techniques for collection, preservation, analysis, recovery, authentication and reporting of electronic data. A computer forensics specialist is most typically needed when an investigation or legal proceeding case involves one or more of the following issues: reconstruction of computer usage; examination of residual data; authentication of data by technical analysis; or explanation of technical features of computer usage or data.

The timing, scope or nature of deletions can yield key evidence in many contexts, such as intellectual property theft, hacking, bribery, fraud or sexual harassment. At times “smoking gun” evidence – perhaps in the form of supposedly “deleted” files or messages – can be found on computer hard drives, mobile devices, company networks or websites.

Attorney Robert BrownstoneRobert D. Brownstone
Robert D. Brownstone has been an attorney for over 30 years. He is also a long-term technologist, thought leader and law school adjunct professor. For almost 20 years, Robert has practiced at Silicon-Valley-based Fenwick & West LLP, where he been the Technology & eDiscovery Counsel and Electronic-Information-Management (EIM) Group Chair since 2011. Working out of the firm’s San Francisco, New York and Silicon Valley Center offices, Robert advises clients and colleagues on electronic-discovery, information-security, data-privacy (including GDPR), retention-destruction policies and social-media risks and rewards. Since 2002, he has been a nationwide advisor, conference-chair, speaker, writer and press resource on many electronic information topics. Over the past decade, Robert has taught more than ten Electronic Discovery Law & Process courses at four law schools around the country.

Contact Robert D. Brownstone

2 General Credits

ProLawCLE will seek approval of any CLE program where the registering attorney is primarily licensed with exceptions stated below. Application is made at the time an attorney registers for a course, therefore approval may not be received at the time of broadcasting.

ProLawCLE does not seek approval in the state of Virginia.

Each state has its own governing rules and regulations with regards to CLE courses and formats, therefore please contact your state MCLE regulatory entity for further details about your state's rules. Please visit our State Requirements page for information regarding your state's CLE requirements and/or contact information for your state bar.

As stated in our Reciprocity Provision, ProLawCLE will grant credit in the following states through reciprocity, therefore direct application will not be made in these states:


The following states are self apply. The attorney can apply for credit at no cost. We will provide documentation for them to apply:


OH Attorneys please note: OH Supreme Court will not approve any course that was aired more than 12 months prior.

SC Attorneys please note: Registration must occur no later than 5 business days from the event date or course accreditation is not guaranteed.

ProLawCLE is dedicated to providing quality education from expert speakers and ensuring each attorney receives CLE credit for their participation. If for some reason a particular course does not receive approval in the attorney's primary state of licensure, ProLawCLE will give credit for a future approved course or give a full refund, if applicable.

Each On-Demand course is available to you for 1 year from date of purchase. Additionally, CLE credit is only available within that year.

Read our full Reciprocity Provision here


  1. Big Picture
  2. What is Computer Forensics?
  3. When to use Forensics
  4. Discoverability and Relevance in Litigation
  5. Key Terminology
  6. Basics of How a Disc Stores Data
  7. Hard Disc’s Structure
  8. Active vs. Inactive Data
  9. Where Can Data be Found?
  10. Why “Delete” Doesn’t Mean “Delete”
  11. Collection and Analysis Processes
  12. Various Additional Contexts
  13. Mobile Devices Forensics (smartphones, tablets, etc.)
  14. Network Forensics
  15. Internet Forensics
  16. Top Five (5) Forensics Tips in eDiscovery Process