Practical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1

Size: px
Start display at page:

Download "Practical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1"

Transcription

1 Practical ESI Discovery Iowa Defense Counsel Phil A. Burian 6/10/14 1

2 Electronically Stored ESI Information Information created, manipulated, communicated, stored, converted to, or best utilized in digital form, requiring the use of computing hardware and software 2

3 Requests for Production F.R.Civ.P. 34 & I.R.Civ.P Must produce ESI directly or, if necessary, after translation by the responding party into a reasonably usable form Documents must be produced as they are kept in the usual course of business or organized/labeled to correspond to the categories of requests ESI must be produced in a form in which it is ordinarily maintained or in a reasonably usable form or forms unless specified otherwise A party need not produce the same ESI in more than one form May object to the form requested but must state the form intended for production 3

4 Subpoenas F.R.Civ.P 45. & I.R.Civ.P May specify the form or forms of ESI production ESI can be combined with traditional document requests If no form is specified, must be produced in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms Need not produce the same ESI in more than one form May object (within 14 days) because the ESI is not reasonably accessible because of undue burden or cost and the court will decide the issues based on protective orders factors 4

5 ESI Types Communications s Texts IM Voice mails Blogs Third-party platforms Loose Active Files Operating documents (MS Word, Excel, Power Point, etc.) Image documents (.pdf,.tif,.jpg, video, etc.) Other documents Legacy data Deleted data 5

6 ESI Locations Networks & Servers / voic / fax / personal or local directories Individual towers Laptops Portable storage External hard drives / Thumb drives CD s / SIM & camera cards Third-party systems Cloud / Web-based servers / social networks Hand-held ( BYOD ) Smart/cell phones / Tablets / GPS Legacy Systems Archives / Backup media Any other devise capable of storing data Proprietary Systems / Databases / BYOD s 6

7 Imbalance and Leverage 7

8 MYTHS $...,000, % 8

9 Metadata Matters! Stored in the but often not even viewable in the application (e.g., bcc, rec d date) - varies by system Document: Properties about the file rather than content - often not viewable in the application but in Properties view (e.g., author, and create / revision / print dates) Application: Created by the particular application, moved with the file when copied but can be altered by copying File System: Logs / other logistical information generated by an operating system to track the demographics (name, size, location, usage, etc.) of the ESI and, not embedded within, but stored externally Embedded: Usually hidden and not normally extracted by copies and s. May only be found in the original, native file. (e.g., track changes, comments and notes ) 9

10 Metadata Matters! More often our friend we need it as much as the other side wants it Data reduction: filtering Validating search logic More reliable than OCR Can be more reliable than humans 10

11 Ethical Duties Case Size Proprietary, Privacy & Privilege Risk Attorney Legal Fees Paralegal Vendor Costs Staff Motion Tactics & Defensibility Trial Tactics Settlement Tactics

12 DATA CAPTURE & REDUCTION Ethically Effectively & Verifiably Defensibly Economically 12

13 Hold, Capture & Collection Electronic Filtering Process & Cost Sources 13

14 Litigation Hold Internal Hold Trigger: reasonable anticipation of litigation Benchmark for work product protection No standard form Smart and defensible filter strategies Involved IT up front and have IT execute Think beyond client to those in client s control accountants, lawyers, contractors 14

15 Litigation Hold Internal Hold: ESI Filtering and Capture Scope ESI Filtering strategies Ongoing: later created data & reassessment Proportionality What you want v. what the other side wants Strong evidence of good faith: document decisions and create audit trials 15

16 Litigation Hold Internal Hold: ESI Preservation Method: Preserve in place? Collect? Image? Considerations: Proportionate expense Document retention policy / auto delete Risks of self collection and retention Mischief / bad actors / bias / mistakes Technical capabilities Potential for two phases Verification 16

17 Litigation Hold Internal Hold: Drafting Plain but specific language Less can be more Case specific Provide a point of contact Have IT and critical custodians review for effectiveness Require acknowledgement 17

18 Litigation Hold Litigation Hold Letter to Adverse Party Specificity of Document types Custodians Sources Defensible Start the cooperation early 18

19 Social Networks and Internet Service Providers Stored Communications Act Prohibits knowingly divulging the content of communications stored by: 18 U.S.C. 2701, et seq. Electronic communication services: " any service which provides to users thereof the ability to send or receive wire or electronic communications Remote computing services: "the provision to the public of computer storage or processing services by means of an electronic communications system" 19

20 Social Networks and Internet Service Providers Stored Communications Act 18 U.S.C. 2701, et seq. Sender and recipient name, date, re: etc. may be interpreted to be content In re Zynga Privacy Litig., , 2014 WL (9th Cir. May 8, 2014) 20

21 Social Networks and Internet Service Providers Stored Communications Act 18 U.S.C. 2701, et seq. Exceptions: Proper Civil Subpoena? Civil Court Order? Exceptions Intended uses Protection of the rights or property of the service User s consent (probably request) Child abuse Public agents and law enforcement 21

22 Social Networks and Internet Service Providers Stored Communications Act 18 U.S.C. 2701, et seq. Immediate Litigation Hold Demand Prevent ordinary course updates Obtain signed consent (or adverse counsel agreement) Third-party provider dependent: Account holder name, birthdate, SSN User name, group name, passwords ISP and registration data for ISP Precise description of records sought Citation to SCA exception (18 USC 2703(b)(3)) Original signatures for each service provider 22

23 Filtering Starts with litigation hold Be thoughtful Inclusion v. Exclusion Relevance Privilege / work product Do it only once 23

24 Filtering Source Physical source / Hardware Project- specific files/directories Electronic Custodian Term List Most common Brings imbalances to a head Clumsy Targeted key words Date ranges Domains File and data types de-nist ing. Technology Assisted Review (predictive coding) 24

25 Filtering Considerations: Secondary linear review Search tool limitations Validation & defensibility Proprietary software Valid Mass-Designations 25

26 Hold, Capture & Collection Electronic Filtering Ingestion & Hosting Process & Cost Sources 26

27 Ingestion Deduping Near Deduping Threading Families Database rules and protocol 27

28 Support Data collection Filtering Production Evidentiary presentation Defensibility testimony Vendors Internal cost amount/control shifting Different Interfaces / Looks Search and management software (not always) be so different: Summation Clearwell Caselogistics iconectnxt Nextpoint LexBe... Relativity Concordance Edge ImageDepot MasterFile Eclispe Competitive: Different price structures Functions Soft numbers Oversells 28

29 Hold, Capture & Collection Electronic Filtering Process & Cost Sources Ingestion & Hosting Targeted / Hybrid Electronic Filtering Linear Review 29 Production and Use

30 Discuss with the client: Before Starting ESI sources & volume Client s and Adversary s Litigation holds How to find the balance Risks of inadvertent disclosure Privilege Proprietary Privacy Dispel the myths 30

31 Discuss with the client: Data Collection Before Starting Motion considerations Witnesses Credibility Defensibility Later costs Lost metadata Corrupted files Technical abilities Business interruption 31

32 Before Starting Learn the case with ESI in mind for filtering considerations Buzz terms Custodians Irrelevant areas to be caught up 32

33 Before Starting Engage the right people Client In-House IT (single point of direct contact) Will they be a witness? Are they equipped? Authorized Shepherds Outside Vendors Attorneys & Staff 33

34 Engage Adverse Counsel Early and Often Never to early to start... and document it. 34

35 Engage Adverse Counsel Early and Often Meet and confers (Fed. R. Civ. P. 26(f) or otherwise) Plan for data: 1) preservation; 2) collection; 3) filtering; and 4) production based on: What do you need What will they claim they need Who stands to benefit from details (or who stands to lose) Your technical capabilities/systems Creativity such as phasing discovery (what is really needed for negotiations?) Mutual cost savings such as using the same vendor Need for forensic collection (will protocol compliance and authenticity be an issue?) Obtain/Exchange beforehand: Sources, formats, estimated volumes etc. fully disclose. Estimated vendor and HR costs set up cost shifting early Involve IT / Vendors in real time: Dispel technological assumptions by attorneys they may be your own 35

36 Engage Adverse Counsel Early and Often Sources of disputes, delay, and downstream expenses: Technological assumptions Uninformed / reactionary entrenching The term list what is on it and what it means Protocol gamesmanship Failure to identify all ESI sources... there is a new sheriff in town-not Gary Cooper, but me. The filing of fortypage discovery motions accompanied by thousands of pages of exhibits will cease and will now be replaced by a new regimen in which the parties, without surrendering any of their rights, must make genuine efforts to engage in the cooperative discovery regimen contemplated by the Sedona Conference Cooperation Proclamation. Tadayon v. Greyhound Lines, Inc., CIV ABJ/JMF, 2012 WL , * (D.D.C. June 6, 2012) (citing 36

37 Express Agreements Under Imbalances Wait for permission or seek forgiveness later? 37

38 Express Agreements Under Imbalances Wait for permission or seek forgiveness later? Preservation Collection and mass-filters: protocol, validation and logs Expectation of manual linear review after electronic searches ( the list ) 38

39 Express Agreements Under Imbalances Wait for permission or seek forgiveness later? Production Organization: Ordinary course Folders and subfolders Identified by request # Production format Hard copy Load files True v. Hybrid (TIFF) native format Images only (OCR Compatible) Proprietary software requirements Production Metadata s: Subject Author Recipient CC BCC Rec d date and time Sent date and time Threading and attachment Loose / Active File: Name & Extensions Author Create date/time Edit Version Access / edit history 39

40 Privilege protocol Express Agreements Under Imbalances Wait for permission or seek forgiveness later? Inadvertent production Rely on the rules? Log content and organization Audit procedures Deadline for challenging privilege designations 40

41 MOTIONS Stake out the high ground with early and ongoing good faith diligence, and document it. Move or defend (permission v. forgiveness)? Know the judge & jurisdiction: How much technical education does the bench need? How much myth-busting does the bench need? 41

42 MOTIONS Seeking ESI Why the source is relevant and necessary Why there is no alternative source Why the source is not duplicative or cumulative of other sources Protecting ESI Why irrelevant or relevance is outweighed by the cost Why it is cumulative Specifically why it is burdensome/expensive How the request is better framed/focused Evidence: samples, hit report, informed affidavits Cost shifting: informed statements of expense 42

43 Forensic Investigators Investigator Data Source Third Party Referee Requesting Counsel Protocol Custodian / Counsel 43

44 Client Considerations Control ESI: Sources TM s Personal accounts BYOD s outside of server Cloud Central operating directories: To C:/ or not to C:/.... Central backup / imaging capabilities Central custodians 44

45 Client Considerations Control ESI: Sources Use Personal s Everyone should know everything is saved. Internal and external professionalism 45

46 Client Considerations Control ESI: Sources Use Volume Unsubscribe v. spam filtering Document retention Policy Saving as new 46

47 Client Considerations Control ESI: Sources Use Volume Organization Standardize file nomenclature & organization Project specific directories Server drive allocation Identifying privileged communications 47

48 Client Considerations Plan for ESI: Litigation Hold General guidelines v. case specific requirements Identifying triggering events Will the plan be followed... 48

49 Client Considerations Plan for ESI: Litigation Hold Personnel Routine points of contract Urgent points of contact Counsel Critical personnel departure Personnel to execute a litigation hold Business interruption mitigation 49

50 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Preserve in place Collection for preservation Image for preservation 50

51 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Preserve in place Collection for preservation Image for preservation Real time redundancy 51

52 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Legacy data preservation Archive Organization Vendor recommendations 52

53 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Prime issue for costly disputes 53

54 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Employee Education Limit surprises to them Limit surprises to you 54

55 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Employee Education Culture of compliance Top -down 55

56 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Employee Education Culture of compliance Plans made before the client knows who stands to benefit, if followed, may help defensibility 56

57 Process & Cost Sources Collection Electronic Filtering Ingestion & Hosting Targeted / Hybrid Electronic Filtering Linear Review 57 Production and Use

58 Presenter: Phil A. Burian Contact: (319)

59 This presentation is designed and intended for general information purposes only and is not intended, nor should it be construed or relied on, as legal advice. Please consult your attorney if specific legal information is desired. 59

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )? Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators 25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of

More information

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing

More information

The Trail of Electrons

The Trail of Electrons E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

Snap Inc. Law Enforcement Guide

Snap Inc. Law Enforcement Guide Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street

More information

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,

More information

SAMPLE LITIGATION HOLD NOTICES

SAMPLE LITIGATION HOLD NOTICES Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

Top 10 Mistakes to Avoid When Creating Productions

Top 10 Mistakes to Avoid When Creating Productions Top 10 Mistakes to Avoid When Creating Productions Steer Clear of Common Pitfalls and Flawlessly Execute Productions October 30, 2014 Gene Albert Principal, Lexbe LC ediscovery Webinar Series Info Takes

More information

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive

More information

Victor Stanley and the Changing Face

Victor Stanley and the Changing Face Victor Stanley and the Changing Face of E-Discovery What You Need to Know page : 1 Victor Stanley and the Changing Face of E-Discovery What You Need to Know A Clearwell White Paper Victor Stanley and the

More information

Building Information Modeling and Digital Data Exhibit

Building Information Modeling and Digital Data Exhibit Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following

More information

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response

More information

Southington Public Schools

Southington Public Schools 3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction

More information

Discovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family.

Discovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family. Discovery Attender Version 2.2 White Paper Discovery Attender is a member of the Attender Utilities family Table of Contents Introduction...3 Benefits...4 Product Overview...5 FAQ...8 Product History...12

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26

More information

8/28/2017. What Is a Federal Record? What is Records Management?

8/28/2017. What Is a Federal Record? What is Records Management? Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical

More information

Shielding the Organization from Data Risk & E- Discovery Failures

Shielding the Organization from Data Risk & E- Discovery Failures Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

E-Discovery in the US: Overview

E-Discovery in the US: Overview Resource ID: 1-503-3009 E-Discovery in the US: Overview ANA TAGVORYAN, BLANK ROME LLP, JOSHUA BRIONES, MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND POPEO, P.C., AND BROWNING E. MAREAN (DECEASED), DLA PIPER

More information

ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP

ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP 713-752-4200 Fun Facts to Know and Tell GHOST/MIRROR: Complete bit by bit copy of a drive. (Not just

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification

More information

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US

More information

Pinpoint Labs ESI Collection Tools

Pinpoint Labs ESI Collection Tools Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

Avoiding the Pitfalls of Bring Your Own Device Policies

Avoiding the Pitfalls of Bring Your Own Device Policies Pitfalls of Bring Device Policies BYOD/T Represents a Constant Battle Between Compliance Objectives and Employee Usability Presenters: Constantinos Dino G. Panagopoulos, Labor and Employment Group Philip

More information

Management: A Guide For Harvard Administrators

Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Supersedes Policy previously approved by TBM

Supersedes  Policy previously approved by TBM Document Title: Email Policy Pages Document Type: Policy 6 No. Of Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 27 Treasury Board Approval ( # ) TBM2009-298 Supersedes

More information

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing

More information

The Legal Health Record and E-Discovery: Where You Need to Be

The Legal Health Record and E-Discovery: Where You Need to Be The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.

More information

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018 Compass Consulting Group Terms of Use & Privacy Policy Last Updated: 10/1/2018 1. Introduction. At Compass Consulting Group LLC ( Compass, we, us, or our ), we recognize that your privacy is important.

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR Judith Germano, Esq. Member, New Jersey Supreme Court s Working Group on Ethical Issues Involving Metadata in Electronic Documents Germano

More information

ASSOCIATION OF DEFENSE TRIAL COUNSEL WEB SITE AND SERVICE

ASSOCIATION OF DEFENSE TRIAL COUNSEL WEB SITE AND  SERVICE ASSOCIATION OF DEFENSE TRIAL COUNSEL WEB SITE AND EMAIL SERVICE Dear ADTC Member: The Board of the ADTC is developing a web site (adtc.org) that will contain information of interest to its members and

More information

Illinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.

Illinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4. E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will

More information

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when

More information

Three Common Techniques for E-Discovery Preservation

Three Common Techniques for E-Discovery Preservation www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...

More information

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization. Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,

More information

Records Retention Policy

Records Retention Policy June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable

More information

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Community Unit School District No. 1. School Board

Community Unit School District No. 1. School Board Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

GUESTBOOK REWARDS, INC. Privacy Policy

GUESTBOOK REWARDS, INC. Privacy Policy GUESTBOOK REWARDS, INC. Privacy Policy Welcome to The Guestbook and Gopher, the online and mobile services of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,

More information

Enterprise Vault & e-discovery

Enterprise Vault & e-discovery Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing

More information

Handling Large Data Sets

Handling Large Data Sets Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies Today s Talk Forensics and E-Discovery Modern

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

Safeguarding Attorney-Client Privilege in a Wireless World

Safeguarding Attorney-Client Privilege in a Wireless World Safeguarding Attorney-Client Privilege in a Wireless World What to consider when communicating with your clients Marc S. Martin, Partner 202-778-9859 mmartin@klng.com www.klng.com Attorney Treatment of

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

Information Security Procedures and Privacy Protection

Information Security Procedures and Privacy Protection Information Security Procedures and Privacy Protection Michele Dow, Associate Marketing Consultant Eli Lilly & Company Monday, February 25, 2008 Email Environment Today CAN SPAM Increased Privacy Needs

More information

Cumberland Employment Law Update 2014

Cumberland Employment Law Update 2014 Cumberland Employment Law Update 2014 Agenda Requesting and Resisting Disclosure of Electronic Information What the defense lawyer should ask for The plaintiff s guide to preventing overreaching Discovery

More information

PRIVACY POLICY Last Updated May, 2018

PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise

More information

Information Resources, Inc. ( IRI ) Global Privacy Policy Part I. May 25, 2018 Version 0.1 Chief Privacy Officer / Data Protection Steering Committee

Information Resources, Inc. ( IRI ) Global Privacy Policy Part I. May 25, 2018 Version 0.1 Chief Privacy Officer / Data Protection Steering Committee Information Resources, Inc. ( IRI ) Global Privacy Policy Part I May 25, 2018 Version 0.1 Chief Privacy Officer / Data Protection Steering Committee 1 Table of contents 1. Purpose... 3 2. Message from

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,

More information

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION December 6, 2017 VIA E-MAIL Senate President Joe Negron Office of the Florida Senate 404 S. Monroe Street Tallahassee, Florida 32399-1100 Negron.joe@flsenate.gov RE: Rachel Perrin Rogers NOTICE OF DEMAND

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and

More information

U.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009)

U.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009) 636 F.Supp.2d 769 UNITED STATES of America, Plaintiff, v. Justin D. WEAVER, Defendant. No. 09-30036. United States District Court, C.D. Illinois, Springfield Division. July 15, 2009. Elham M. Peirson,

More information

Synchronoss Website Privacy Statement

Synchronoss Website Privacy Statement Synchronoss Website Privacy Statement This website privacy statement ("Privacy Statement") explains how Synchronoss Technologies, Inc. ( Synchronoss, we, us and our ) may collect, use, store and disseminate

More information

Employee Departure Checklist

Employee Departure Checklist Employee Departure Checklist Departing employee's name: Departure date: Supervisor's name: Employee to be terminated: Yes No DO NOT NOTIFY EMPLOYEE OF THIS LIST IF YES Person responsible for completing

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Lexbe Sample ediscovery Order. ESI Discovery Order

Lexbe Sample ediscovery Order. ESI Discovery Order Lexbe Sample ediscovery Order This sample forms is provided as a courtesy by Lexbe for use by experienced attorneys as is, and should be customized for the particular jurisdiction, case, court, and circumstances.

More information

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David

More information

CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1

CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND  COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1 CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND EMAIL COMMUNICATIONS POLICY AND PROCEDURE Effective Date: ~ \ 1 1-Pl) Pursuant to Article XIII of the Association's Bylaws, "records and

More information

Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist

Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Database Checklist Use this Checklist as a guide to assessing existing databases for compliance with Canada s Anti-Spam

More information

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

Adobe Fonts Service Additional Terms. Last updated October 15, Replaces all prior versions.

Adobe Fonts Service Additional Terms. Last updated October 15, Replaces all prior versions. Adobe Fonts Service Additional Terms Last updated October 15, 2018. Replaces all prior versions. These Additional Terms govern your use of the Adobe Fonts service and are incorporated by reference into

More information

PUBLIC RECORDS. May 2016

PUBLIC RECORDS. May 2016 PUBLIC RECORDS May 2016 ACCESS Florida Law creates a right of access to inspect and/or have copies of public records. WHO? This means ANYONE regardless of: Identity Reason YOU MAY NOT REQUIRE A REQUESTOR

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

GENERAL PRIVACY POLICY

GENERAL PRIVACY POLICY GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

This factsheet intends to provide guidance on how you can manage your s. You will discover:

This factsheet intends to provide guidance on how you can manage your  s. You will discover: Summary This factsheet intends to provide guidance on how you can manage your emails. You will discover: Why it is important to manage your emails Guidance for approaching email management How to identify

More information