3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?
|
|
- Gervais Whitehead
- 5 years ago
- Views:
Transcription
1 Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What is Electronically Stored Information ( ESI )? All information on computers, servers, smartphones, in the cloud, etc. s Word documents Spreadsheets PowerPoint presentations Images Databases Archives Deleted files Data on servers & backup tapes Voic s Text messages Instant messages Facebook posts Tweets etc. What is Electronically Stored Information ( ESI )? Includes the content of the /document, as well as the metadata Metadata is information about the document that is not visible to the user (data about data). Typically describes the characteristics, origins, usage, and validity of the electronic file. E.g. filename, author, creation date, date last modified, custodian, page count, to/from/cc/bcc, subject, date sent/received, data about attachments 1
2 What is E-Discovery? The process by which litigants find and produce documents stored in electronic form in response to litigation, corporate investigations, or regulatory inquiries Why E-Discovery Matters Cases are won and lost because of failures in the collection and preservation of ESI GN Netcom, Inc. v. Plantronics, Inc., 2016 WL (D. Del. July 12, 2016): adverse inference, attorneys fees & costs, $3 million punitive sanction, and evidentiary sanctions against the company where senior executive deleted s even though company sent a legal hold InternMatch, Inc. v. Nxtbigthing, LLC, 2016 WL (N.D. Cal. Feb. 8, 2016): evidence preclusion, adverse inference, and attorneys fees awarded where company discarded computers containing relevant ESI Sell v. Country Life Ins. Co., 189 F. Supp. 3d 925 (D. Ariz. 2016): entering default judgment where inhouse counsel failed to perform reasonable search for ESI Mueller v. Swift, 2017 WL (D. Colo. Jul. 19, 2017): party questioned about spoliation before jury after being unjustifiably careless in his handling of evidence that he had a clear duty to preserve Klipsch Group, Inc. v. epro E-Commerce Ltd., 880 F.3d 620 (2nd Cir. 2018): adverse inference, $2.7 million sanction, and $5 million asset restraint because failure to send preservation notice resulted in spoliation Why E-Discovery Matters Attorneys increasingly are required to understand e-discovery ABA Model Rule 1.1 A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. California Opinion No If e-discovery will probably be sought, the duty of competence requires an attorney to assess his or her own e- discovery skills and resources.... If an attorney lacks such skills and/or resources, the attorney must try to acquire sufficient learning and skill, or associate or consult with someone with expertise to assist. W.D. Mo. Principles for the Discovery of Electronically Stored Information 3.01 The Court expects that counsel for the parties... will be familiar with the following in each litigation matter: The electronic discovery provisions of the Federal Rules of Civil Procedure. D. Kan. Guidelines for Cases Involving Electronically Stored Information 7 [C]ounsel should become knowledgeable about their client s information management systems and its operation, including how information is stored and retrieved. 2
3 Why E-Discovery Matters Costs can be huge, but a good plan for e-discovery will significantly mitigate costs A good e-discovery plan opens opportunities to be more aggressive with an opposing party The E-Discovery Life Cycle Information Governance The steps a company takes to control how electronic data is stored and destroyed e.g. data retention and deletion policies 3
4 Information Governance Prior version of Federal Rule of Civil Procedure 37 contained a safe harbor where records were destroyed pursuant to a defensible information governance policy 2015 amendments removed the language, while making it more difficult to impose the most severe discovery sanctions Still, a good information governance policy can insulate a company from allegations that it destroyed records with intent to deprive information from an opposing party Information Governance: Best Practices Develop a records management policy Maintain current and historical organizational charts Identify subject matter experts Consider creating a data map including by identifying what data is or is not reasonably accessible Information Governance: Best Practices Develop a legal hold policy and procedures Develop a preservation plan, including contingency plans to suspend auto-delete and recycling of backup tapes Take into account hardware/software upgrades and exit procedures for departing employees 4
5 Identification of ESI When the company has a reasonable anticipation of litigation, it must send out a legal hold to all people who may have relevant data Good information governance allows the company to readily identify where the data resides Frequently requires witness interviews to identify custodians and their ESI practices Preservation & Collection Ensure potentially relevant ESI is preserved and copy/image data to avoid alteration (including alteration of metadata) Trigger Events Duty to preserve arises when a company should reasonably anticipate litigation can be months or years before a complaint is filed Commonly arises because of demand letter, complaint, subpoena, etc. Also arises when the company threatens litigation. See, e.g., Matthew Enter. v. Chrysler Group LLC, 2016 WL (N.D. Cal. May 23, 2016). Highly fact specific and uncertain 5
6 Legal Holds Send immediately when duty to preserve arises, to all custodians who may possess relevant ESI, including people who had some involvement or knowledge about underlying events, and people responsible for managing the company s ESI and information systems Legal Holds Communicate preservation obligation clearly and in plain language: Identity of the parties to the litigation Brief description of the legal claims and the scope of the legal hold Likely sources of potentially relevant ESI A description of what documents are relevant. Saying preserve all relevant information generally is not sufficient. Explanation of how preservation is to be undertaken Legal Holds Legal holds should be in writing See Pension Comm. of the Univ. of Montreal Pension Plan v. Banc of Am. Securities, LLC, 685 F. Supp. 2d 456 (S.D.N.Y. 2010): lack of written notice is negligence per se and raises inference that information was lost or destroyed Enact audit procedures to ensure receipt and compliance Send periodic reminders Distribute legal holds to subsequently discovered custodians 6
7 Affirmative Preservation Measures Suspend auto-delete and purging functions Snapshot or image data that may be altered or destroyed during ordinary use (shared drives, collaborative workspaces, dynamic databases) Suspend recycling of backup tapes Consider making forensic images of key custodians hard drives, smartphones, and/or Rule 37(e) Text Messages 2015 survey by RingCentral found that 80% of respondents used text messaging for business purposes. For 15% of respondents, over half their text messages were for work. The informality of text messaging is cause for concern, and collecting text messages can be expensive Includes not only SMS, but also apps with messaging functions imessage, WeChat, WhatsApp, Snapchat, Google Hangout 7
8 Text Messages Producing text messages implicates employee privacy and the scope of an employer s duty to collect is still being litigated Text messages increasingly are the subject of discovery sanctions, especially when they involve senior executives Some solutions: Educate employees about text etiquette and that work messages may be discoverable BYOD policies regarding retention and collection Consider company-owned messaging application with backup and archiving Methods for Collecting ESI Employee Self-Collection Usually not recommended IT-Assisted Collection In-House IT staff collects ESI using specialized software that does not alter metadata Outside Assistance Outside vendor or certified forensic examiner collects ESI, onsite or remotely A Hybrid Approach Combination of IT-assisted collection, with assistance from e-discovery vendor or consultant Document everything Data Processing After preserving and collecting ESI, the next step is to determine what is relevant (or responsive) versus what is privileged, irrelevant, or nonresponsive Generally requires using a review tool for efficiency and to avoid altering metadata Processing is necessary to index and format data so it can be culled, searched, and loaded into a review tool Processing includes de-duplicating ESI, de- NISTing, excluding certain file types Processing can be expensive. Know what you are processing and why. 8
9 Review & Analysis Attorneys review ESI for relevance, responsiveness, and privilege Important documents are prioritized and identified quickly for case evaluation and strategy It is important to cull data, so attorneys are reviewing as few irrelevant documents as possible Review & Analysis: Strategies for Cost Mitigation Keyword search terms and date limiters Sampling to ensure search terms are optimally precise Comprehensive coding so documents are reviewed once Hiring contract attorneys where appropriate Advanced analytics: threading, clustering Predictive coding Review & Analysis: Cooperation with Opposing Parties See Rule 26(f)(3)(C): parties must discuss any issues about disclosure, discovery, or preservation of electronically stored information prior to first scheduling conference The Court expects cooperation on issues relating to the preservation, collection, search, review, and production of ESI Principles for the Discovery of Electronically Stored Information (W.D. Mo.) The failure of counsel or the parties in litigation to cooperate in facilitating and reasonably limiting discovery requests and responses increases litigation costs and contributes to the risk of sanctions. 2 Guidelines for Cases Involving Electronically Stored Information (D. Kan.) Among the items about which the court expects counsel to reach practical agreement without the court having to micro-manage e-discovery are search terms, date ranges, key players and the like. Pyle v. Selective Ins. Co. of Am., 2016 WL (W.D. Pa. Sept. 30, 2016). Disclosing search protocols can reduce expense and assist motion practice 9
10 Review and Analysis: Cooperation with Opposing Parties Review and Analysis: Cooperation with Opposing Parties Review & Analysis: Proportionality (Amended Rule 26) The proportionality standard set forth in Fed. R. Civ. P. 26(b)(1) should be applied to the discovery plan and its elements, including the preservation, collection, search, review, and production of ESI Principles for the Discovery of Electronically Stored Information (W.D. Mo.) Parties should consider proportionality, now an express component of the scope of discoverable evidence. 1 Guidelines for Cases Involving Electronically Stored Information (D. Kan.) 10
11 Production of ESI Determine production format in consultation with opposing party Ability to claw back privileged material or attorney work product pursuant to Rule 26(b)(5)(B) Presentation of ESI Presentation means using the ESI at trial or in motions. Authenticating ESI can be challenging. ESI is easily altered; can be spoofed ; texts can be sent by anyone with access to a witness s phone or tablet It is important to maintain a chain of custody for ESI Authentication can require expert testimony Thank You Spencer Fane has the expertise and experience to manage large-scale e-discovery projects and to counsel clients about information governance and data retention 11
12 12
Managing Your Record Retention Policy Safely
Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients
More informationElectronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson
Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationCircling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.
Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationPolicy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents
Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM
More informationSAMPLE LITIGATION HOLD NOTICES
Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope
More informationProposed Spoliation Rules Would Impact Apple-Samsung Trial
Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung
More informationJustice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information
Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationShielding the Organization from Data Risk & E- Discovery Failures
Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,
More informationPractical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1
Practical ESI Discovery Iowa Defense Counsel Phil A. Burian 6/10/14 1 Electronically Stored ESI Information Information created, manipulated, communicated, stored, converted to, or best utilized in digital
More informationThird-party ediscovery Providers = Insulation Against Cold, Harsh Sanctions?
A SCARAB CONSULTING WHITEPAPER January, 2012 Third-party ediscovery Providers = Insulation Against Cold, Harsh Sanctions? Synopsis The risk of sanctions resulting from 1) corporations doing self-collections
More informationCARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose
CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationArchive Legislation: archiving in the United Kingdom. The key laws that affect your business
Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private
More informationThe Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration
The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of
More informationIllinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.
E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will
More informationInformation Security Data Classification Procedure
Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationE-Discovery in the US: Overview
Resource ID: 1-503-3009 E-Discovery in the US: Overview ANA TAGVORYAN, BLANK ROME LLP, JOSHUA BRIONES, MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND POPEO, P.C., AND BROWNING E. MAREAN (DECEASED), DLA PIPER
More informationADVANCED ARBITRATION ACADEMY E Discovery Segment
August 8 12, 2016 ADVANCED ARBITRATION ACADEMY E Discovery Segment Judge Judith O. Hollinger Program in Alternative Dispute Resolution USC Gould School of Law Dealing with E-Discovery Issues in Arbitration
More informationJanuary 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel
January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel Current Sources for Collection & Forensics Laptops, Desktops, Tablets Virtual Machines Cell Phones Network Shares CDs/DVD,
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More information25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators
25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.
More informationSouthington Public Schools
3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction
More informationCommunity Unit School District No. 1. School Board
Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationUnderstanding Computer Forensics
Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells
More informationMinimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering
From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,
More informationMinnesota Government Data Practices Act and Litigation Holds In An Electronic Environment
Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment MACA-MCHRMA Fall Conference Ruttger s Bay Lake Lodge September 10, 2015 1 PRESENTED BY: Karen Clayton Ebert MCIT
More informationHire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers
Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,
More informationDIGITAL EVIDENCE TOOL BOX
DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationCyber Security and Data Management
Cyber Security and Data Management THE EVOLVING LAW AND PRACTICE ON DELETING LARGE VOLUMES OF OLD DATA TO REDUCE CYBER RISK Presented by Avi Gesser, Davis Polk Litigation Partner Gabriel Rosenberg, Davis
More informationHIPAA For Assisted Living WALA iii
Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...
More informationR E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu
R E F E R E N C E L I B R A R I A N Jane Larrington Faculty Services & Reference Librarian jlarrington@ sandiego.edu 619.260.4766 Dangers of metadata for the uninitiated attorney Professional responsibilities
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationData Breach Preparation and Response. April 21, 2017
Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis
More informationFrequently Asked Questions Related to The Arkansas General Records Retention Schedule
Frequently Asked Questions Related to The Arkansas General Records Retention Schedule Updated 05/16/16 Question: Does the proposed records retention schedule list all the records my must hold and, if not,
More informationTHINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte
Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW
More informationLaw Prac ce Management MCLE Mee ng ARC May 27, 2014
Law Prac ce Management MCLE Mee ng ARC May 27, 2014 11:45 AM Noon Sign In/Lunch 11:55 AM Noon Welcome/Introductions Michael Calabrese, Chair Charles Wentworth, Co-Chair Noon 1:00 PM Program Discovering
More informationPreservation of Electronic Records for Litigation University Operations - Administrative
Preservation of Electronic Records for Litigation University Operations - Administrative EWU Policy 201-02 Effective: December 2, 2008 Authority: Board of Trustees Proponent: University President Summary:
More informationCumberland Employment Law Update 2014
Cumberland Employment Law Update 2014 Agenda Requesting and Resisting Disclosure of Electronic Information What the defense lawyer should ask for The plaintiff s guide to preventing overreaching Discovery
More information8/28/2017. What Is a Federal Record? What is Records Management?
Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical
More informationCase 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA
Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationCloud Computing: New Discovery Challenges Await By Andrew M. Hinkes and Gavin C. Gaukroger
Cloud Computing: New Discovery Challenges Await By Andrew M. Hinkes and Gavin C. Gaukroger Cloud computing has begun to revolutionize business practices by allowing users of cloud services to off-load
More informationAAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO
AAPA Legal Issues and Record Retention May 15, 2013 SML, Inc. Steve M. Lewis, President and CEO 813.205.2850 stevemlewis@msn.com www.smlinfo.net TABLE OF CONTENTS Page CORPORATE OR PUBLIC RECORDS 3 Copy
More informationcosts maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com
Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response
More informationLCU Privacy Breach Response Plan
LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard
More informationEnterprise Vault & e-discovery
Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing
More informationTo Document or Not to Document: That is the Question DPLE 182
To Document or Not to Document: That is the Question DPLE 182 RLI Design Professionals is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on
More informationFive Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification
July 2016 Follow @Paul_Hastings Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification By Paul Hastings Global Privacy and Cybersecurity
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive
More informationCanadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist
Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Database Checklist Use this Checklist as a guide to assessing existing databases for compliance with Canada s Anti-Spam
More informationPrivacy Breach Policy
1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure
More informationCLEANING OUT THE DATA CLOSET
2 Moderator Hon. Andrew Jennifer Aaron Brett Peck Feldman Laliberte Tarr DLA Piper DLA Piper Zapproved Caesars 3 What is defensible deletion? What does the law say? How do we get started? What if something
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationArms Around the Tempest: E-Discovery, Cost Control and Legal Project Management
Arms Around the Tempest: E-Discovery, Cost Control and Legal Project Management Kim J. Myrdahl Peter H. Walsh Shari L. J. Aberle Caroline B. Sweeney Thomas P. Swigert SUPERVALU INC. Vice President, Litigation,
More informationFinding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics
Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationAdobe Sign and 21 CFR Part 11
Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted
More informationLegal Developments in ediscovery: Implications for Security Management
Legal Developments in ediscovery: Implications for Security Management Abstract Richard S. Swart Utah State University This paper defines ediscovery and reviews recent court cases and amendment to Federal
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationThe Legal Health Record and E-Discovery: Where You Need to Be
The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.
More informationVIACOM INC. PRIVACY SHIELD PRIVACY POLICY
VIACOM INC. PRIVACY SHIELD PRIVACY POLICY Last Modified and Effective as of October 23, 2017 Viacom respects individuals privacy, and strives to collect, use and disclose personal information in a manner
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationACC Managing the Risks and Spend of E-Discovery
ACC Managing the Risks and Spend of E-Discovery Paul Meyer Lead ediscovery Counsel Associate General Counsel, Corporate Litigation & ediscovery Willis Towers Watson John Rosenthal Winston & Strawn LLP
More informationHow Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.
How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationE-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS
E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing
More informationMeasuring Your. E-Discovery Program. Against Industry, 2015
Measuring Your E-Discovery Program Against Industry, 2015 Advice from Counsel is sponsored by: Introduction Over seven years and nine reports, the Advice from Counsel study has shared the opinions and
More informationRegulatory Notice 13-08
Regulatory Notice 13-08 Reporting Requirements FINRA Amends Rule 4530 to Eliminate Duplicative Reporting and Provide the Option to File Required Documents Online Using a New Form Implementation Dates:
More informationVFS GLOBAL PVT LTD PRIVACY DISCLAIMER
VFS GLOBAL PVT LTD PRIVACY DISCLAIMER Version 1.0 Privacy Disclaimer Scope VFS GLOBAL (hereinafter referred to as VFS GLOBAL ) is an outsourced partner of Diplomatic Missions across globe, and is authorized
More informationRecords Retention Training
Records Retention Training Purpose LSUHSC-NO must comply with state and federal records retention requirements in order to provide appropriate access to state information to the public and to limit the
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationData Security: Public Contracts and the Cloud
Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?
More informationDecember 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION
December 6, 2017 VIA E-MAIL Senate President Joe Negron Office of the Florida Senate 404 S. Monroe Street Tallahassee, Florida 32399-1100 Negron.joe@flsenate.gov RE: Rachel Perrin Rogers NOTICE OF DEMAND
More informationAutofill and Other Disasters: The Ethics of Inadvertent Disclosures
Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationTesting and Certification Regulations For an SA8000 Applicant Status Certification
TSSA_CCU_43 a 1 of 5 Testing and Regulations 1. General Terms and Conditions 1.1. These Testing and Regulations apply to auditing and certification by TÜV SÜD South Asia Pvt. Ltd. (hereinafter referred
More information5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.
Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,
More informationDEFINITIONS AND REFERENCES
DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationThe HIPAA Omnibus Rule
The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed
More informationBaseline Information Security and Privacy Requirements for Suppliers
Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.
More informationA Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016
A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US
More informationIRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]
IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The
More informationScientific Working Group on Digital Evidence
Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or
More informationWhite Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers
White Paper Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers By Brian Babineau Analyst Intelligent Information Management March, 2007 Copyright 2007. The, Inc. All
More informationApplications for Preservation and Production in our Digital World
Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background
More informationDevelopment of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit
Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,
More information