Digital Forensics, Computer Forensics examiner

Sean L Harrington


My practice is focused on cybersecurity consulting and digital forensics. With regard to the former, I provide risk assessments, consulting on information security and privacy policies and implementation of projects or programs to facilitate compliance with those policies.  I partner with others to conduct penetration testing, vulnerability assessments, and implementation of systems.  With regard to the latter, I conduct examinations of and expert testimony about computer and server hard drives, mobile devices (phones and tablets), cell data localization records, and Internet evidence (e.g., Facebook, Web postings, etc.).

My expertise includes corporate fraud, labor disputes, domestic relations, child pornography investigations, the Adam Walsh Act, the Electronic Communications Privacy Act, the Computer Fraud and Abuse Act, electronic discovery, the work product doctrine, and the attorney client privilege. My experience is derived from  legal, information technology, software engineering, regulatory compliance, risk management, and information security backgrounds.  I am qualified to serve as a digital forensics examiner, expert witness, and court-appointed third-party neutral, and have extensive experience in litigation support, including electronic discovery, the Rules of Evidence, the Rules of Civil Procedure, motions practice, pre-trial practice, and appellate practice.[1] 
I maintain professional credentials and certifications in the areas of digital forensics (CHFI No. ECC930566, CCFP No. 335034), information security (CISSP No. 335034), regulatory compliance (CSOXP No. 00185), and network engineering MCSE, MCP+i, No. 977426). I have been certified since 2006 on the LexisNexis CaseMap suite.

Sean's Curriculum Vitae






  • Closing the Gap: Information Security and Legal (Secure 360 2017 conference, May, 2017)

  • Protecting Your Client’s Data: Ethical Obligations and Practical Tips (Minnesota Paralegal Ass’n) (Minnesota Paralegal Association, Sept. 14th, 2016)

  • Electronic Spying and Tracking Spouses in Divorce Cases: What's Legal in the Digital World? (Strafford Pub. CLE, Sept. 7th 2016)

  • Closing the Gap: Information Security and Legal (Secure 360 2016 conference, May, 2016)

  • "Protecting Your Client’s Data: Ethical Obligations and Practical Tips" (Family Law Institute, March 24th, 2015) Saint Paul RiverCentre, Minnesota

  • “Hack Back or Active Defense part 1 and 2” (Secure360 conference, May 13th-14th, 2015). Saint Paul RiverCentre, Minnesota

  • "From Zero to 60: Advancing the Cybersecurity Workforce" (ISC)2 CyberSecureGov 2015. May 14th-15th, 2015 at Ronald Reagan Building and International Trade Center, Washington D.C.

  • “Hack Back or Active Defense?” (Secure360 conference, May 14, 2014). “Hack Back”: Legitimate Corporate Security or Risky Business? (U.S. Dep’t of Defense Cyber Crime Conference 2014)

  • (ISC)²® CFCPSM CBK® Training Preview (LegalTech New York, Feb. 6, 2014

  • “Hacking Back”: Legitimate Corporate Security or Risky Business? (Minnesota State Bar Ass’n Computer & Technology Law Section, Nov., 2013)

  • "You Love it, You Hate it. Now You Have to Live With it: E-Discovery" William Mitchell College of Law Auditorium. Friday, Oct. 4 | 9 am–4:30 pm

  • Minnesota e-Discovery Working Group presentation (June, 2013 Minnesota State Bar Ass’n Annual Convention, Duluth, MN)

  • "Trends in Employee-owned Devices in the workplace: Legal & Technological Risks"
    (Minnesota State Bar Ass’n Computer & Technology Law Section CLE, March, 2012; Ramsey County Bar Ass'n - June 28 & December 20, 2012)

  • “Corporate and Individual Liabilities of Releasing Vulnerable Code,” (Minnesota State Bar
    Ass’n Computer & Technology Law Section CLE, fall 2011)

  • The Legal and Financial Consequences of Releasing Vulnerable Software (Minneapolis Fortify User Group Conference, September, 2011)

  • Digital Forensics Goes Mobile: Evidence You Need to Win in 2011 (MinnCLE & CLE West, spring 2011)

  • "The 'End of Digital Forensics' or a Just a New Chapter?" (MSBA Computer & Technology Law Section CLE, spring 2011)

  • Computer Forensics Goes Mobile (Ramsey County Bar Association CLE, December, 2010)

  • Regulatory Compliance in the Software Development Lifecycle (Twin Cities Rational Users Group Conference, winter 2010)

  • Computer Forensics for the Litigator (Hamline Law School, spring 2010)

  • LexisNexis® CaseMap® Case Intake for Paralegals (Hamline Law School, spring 2010)

  • panelist, Consumer Perspectives on Alternative Legal Services, hosted by HALT (fall 2009)


[1] I am licensed to practice law in California and Wisconsin. For any other jurisdiction, all services I provide that are "legal" in character are available only to and under the direct supervision of attorneys licensed to practice in the jurisdiction where the work is to be performed.  Further, no attorney-client relationship for California or Wisconsin matters shall be formed without a Retainer Agreement expressly providing therefor.

Contact Information

Please send email inquiries to or call 508-361-2018, 651-760-3877.





In the News


try Simple Carver Suite

COMPUTER FORENSIC Minnesota, Twin cities, solo, law practice, computer forensics, digital forensics, mobile forensics, digital evidence specialists, litigation support, electronic discovery, hard drive recovery, mobile phones, tablets, disk recovery, data recovery service, litigation hold, legal hold, preservation memo, Motion to Image, discovery request, recover deleted files, crashed drive recovery, expert witness, Cellebrite, FTK, computer crime, forensic analysis, cybercrime, security audits, mobile devices, Sarbanes-Oxley, Graham-Leachy, computer crime response, WebTracer, SilentRunner, steganography, internal investigations, insider threat, due diligence, domestic relations, fraud investigations, corporate espionage, embezzlement, infrastructure protection, private investigations, electronic data preservation, electronic analysis, intellectual property, audit trail, cyber security, harassment, identity theft, deposition, infiltration, forensic examiner, accounting fraud, assurance, behavioral science, civil proceedings, computer crime consulting, computer forensic analysis, computer fraud, corporate investigations, cyber terrorism, Cyberspace, data analysis, data discovery, data extraction, data restoration, denial of service attack, digital discovery, Digital media law Discovery, electronic evidence, Electronic forensics, Electronic legal discovery, Electronic records fraud, E-mail crime, E-mail evidence, employee malfeasance, employment litigation, encryption, Evidence Collection, hidden files, high tech crime, homeland defense, homeland security, Internet law, lost data, measure, media recovery, misappropriation, proprietary information, Risk management, threat assessment, trade secret, website audit, wiretapping, metadata, EDD, eDiscovery, e-discovery, inadvertent disclosure, unintentional disclosure, attorney client privilege, work produce privilege, fraud exception, CFCE, MCSE, CSOXP, CHFI, C|HFI, GCFA, CISSP, EnCase, EnCE, CCE, legal technology, IP trace, imaging, restoration, PGP, hacker, electronic, database, business network consulting, IT solutions, outsourcing, Microsoft Certified, on-site, backup, archival, tech support, workstation, NT, Windows 2003, Windows 7, XP, UNIX, trial exhibit, charts, graphs, timelines, Trial Director, Sanction, Verdict, audio forensics, image manipulation, audio-visual, CM/ECF, CM-ECF, File & Serve