Practical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1
|
|
- Sharleen Jordan
- 6 years ago
- Views:
Transcription
1 Practical ESI Discovery Iowa Defense Counsel Phil A. Burian 6/10/14 1
2 Electronically Stored ESI Information Information created, manipulated, communicated, stored, converted to, or best utilized in digital form, requiring the use of computing hardware and software 2
3 Requests for Production F.R.Civ.P. 34 & I.R.Civ.P Must produce ESI directly or, if necessary, after translation by the responding party into a reasonably usable form Documents must be produced as they are kept in the usual course of business or organized/labeled to correspond to the categories of requests ESI must be produced in a form in which it is ordinarily maintained or in a reasonably usable form or forms unless specified otherwise A party need not produce the same ESI in more than one form May object to the form requested but must state the form intended for production 3
4 Subpoenas F.R.Civ.P 45. & I.R.Civ.P May specify the form or forms of ESI production ESI can be combined with traditional document requests If no form is specified, must be produced in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms Need not produce the same ESI in more than one form May object (within 14 days) because the ESI is not reasonably accessible because of undue burden or cost and the court will decide the issues based on protective orders factors 4
5 ESI Types Communications s Texts IM Voice mails Blogs Third-party platforms Loose Active Files Operating documents (MS Word, Excel, Power Point, etc.) Image documents (.pdf,.tif,.jpg, video, etc.) Other documents Legacy data Deleted data 5
6 ESI Locations Networks & Servers / voic / fax / personal or local directories Individual towers Laptops Portable storage External hard drives / Thumb drives CD s / SIM & camera cards Third-party systems Cloud / Web-based servers / social networks Hand-held ( BYOD ) Smart/cell phones / Tablets / GPS Legacy Systems Archives / Backup media Any other devise capable of storing data Proprietary Systems / Databases / BYOD s 6
7 Imbalance and Leverage 7
8 MYTHS $...,000, % 8
9 Metadata Matters! Stored in the but often not even viewable in the application (e.g., bcc, rec d date) - varies by system Document: Properties about the file rather than content - often not viewable in the application but in Properties view (e.g., author, and create / revision / print dates) Application: Created by the particular application, moved with the file when copied but can be altered by copying File System: Logs / other logistical information generated by an operating system to track the demographics (name, size, location, usage, etc.) of the ESI and, not embedded within, but stored externally Embedded: Usually hidden and not normally extracted by copies and s. May only be found in the original, native file. (e.g., track changes, comments and notes ) 9
10 Metadata Matters! More often our friend we need it as much as the other side wants it Data reduction: filtering Validating search logic More reliable than OCR Can be more reliable than humans 10
11 Ethical Duties Case Size Proprietary, Privacy & Privilege Risk Attorney Legal Fees Paralegal Vendor Costs Staff Motion Tactics & Defensibility Trial Tactics Settlement Tactics
12 DATA CAPTURE & REDUCTION Ethically Effectively & Verifiably Defensibly Economically 12
13 Hold, Capture & Collection Electronic Filtering Process & Cost Sources 13
14 Litigation Hold Internal Hold Trigger: reasonable anticipation of litigation Benchmark for work product protection No standard form Smart and defensible filter strategies Involved IT up front and have IT execute Think beyond client to those in client s control accountants, lawyers, contractors 14
15 Litigation Hold Internal Hold: ESI Filtering and Capture Scope ESI Filtering strategies Ongoing: later created data & reassessment Proportionality What you want v. what the other side wants Strong evidence of good faith: document decisions and create audit trials 15
16 Litigation Hold Internal Hold: ESI Preservation Method: Preserve in place? Collect? Image? Considerations: Proportionate expense Document retention policy / auto delete Risks of self collection and retention Mischief / bad actors / bias / mistakes Technical capabilities Potential for two phases Verification 16
17 Litigation Hold Internal Hold: Drafting Plain but specific language Less can be more Case specific Provide a point of contact Have IT and critical custodians review for effectiveness Require acknowledgement 17
18 Litigation Hold Litigation Hold Letter to Adverse Party Specificity of Document types Custodians Sources Defensible Start the cooperation early 18
19 Social Networks and Internet Service Providers Stored Communications Act Prohibits knowingly divulging the content of communications stored by: 18 U.S.C. 2701, et seq. Electronic communication services: " any service which provides to users thereof the ability to send or receive wire or electronic communications Remote computing services: "the provision to the public of computer storage or processing services by means of an electronic communications system" 19
20 Social Networks and Internet Service Providers Stored Communications Act 18 U.S.C. 2701, et seq. Sender and recipient name, date, re: etc. may be interpreted to be content In re Zynga Privacy Litig., , 2014 WL (9th Cir. May 8, 2014) 20
21 Social Networks and Internet Service Providers Stored Communications Act 18 U.S.C. 2701, et seq. Exceptions: Proper Civil Subpoena? Civil Court Order? Exceptions Intended uses Protection of the rights or property of the service User s consent (probably request) Child abuse Public agents and law enforcement 21
22 Social Networks and Internet Service Providers Stored Communications Act 18 U.S.C. 2701, et seq. Immediate Litigation Hold Demand Prevent ordinary course updates Obtain signed consent (or adverse counsel agreement) Third-party provider dependent: Account holder name, birthdate, SSN User name, group name, passwords ISP and registration data for ISP Precise description of records sought Citation to SCA exception (18 USC 2703(b)(3)) Original signatures for each service provider 22
23 Filtering Starts with litigation hold Be thoughtful Inclusion v. Exclusion Relevance Privilege / work product Do it only once 23
24 Filtering Source Physical source / Hardware Project- specific files/directories Electronic Custodian Term List Most common Brings imbalances to a head Clumsy Targeted key words Date ranges Domains File and data types de-nist ing. Technology Assisted Review (predictive coding) 24
25 Filtering Considerations: Secondary linear review Search tool limitations Validation & defensibility Proprietary software Valid Mass-Designations 25
26 Hold, Capture & Collection Electronic Filtering Ingestion & Hosting Process & Cost Sources 26
27 Ingestion Deduping Near Deduping Threading Families Database rules and protocol 27
28 Support Data collection Filtering Production Evidentiary presentation Defensibility testimony Vendors Internal cost amount/control shifting Different Interfaces / Looks Search and management software (not always) be so different: Summation Clearwell Caselogistics iconectnxt Nextpoint LexBe... Relativity Concordance Edge ImageDepot MasterFile Eclispe Competitive: Different price structures Functions Soft numbers Oversells 28
29 Hold, Capture & Collection Electronic Filtering Process & Cost Sources Ingestion & Hosting Targeted / Hybrid Electronic Filtering Linear Review 29 Production and Use
30 Discuss with the client: Before Starting ESI sources & volume Client s and Adversary s Litigation holds How to find the balance Risks of inadvertent disclosure Privilege Proprietary Privacy Dispel the myths 30
31 Discuss with the client: Data Collection Before Starting Motion considerations Witnesses Credibility Defensibility Later costs Lost metadata Corrupted files Technical abilities Business interruption 31
32 Before Starting Learn the case with ESI in mind for filtering considerations Buzz terms Custodians Irrelevant areas to be caught up 32
33 Before Starting Engage the right people Client In-House IT (single point of direct contact) Will they be a witness? Are they equipped? Authorized Shepherds Outside Vendors Attorneys & Staff 33
34 Engage Adverse Counsel Early and Often Never to early to start... and document it. 34
35 Engage Adverse Counsel Early and Often Meet and confers (Fed. R. Civ. P. 26(f) or otherwise) Plan for data: 1) preservation; 2) collection; 3) filtering; and 4) production based on: What do you need What will they claim they need Who stands to benefit from details (or who stands to lose) Your technical capabilities/systems Creativity such as phasing discovery (what is really needed for negotiations?) Mutual cost savings such as using the same vendor Need for forensic collection (will protocol compliance and authenticity be an issue?) Obtain/Exchange beforehand: Sources, formats, estimated volumes etc. fully disclose. Estimated vendor and HR costs set up cost shifting early Involve IT / Vendors in real time: Dispel technological assumptions by attorneys they may be your own 35
36 Engage Adverse Counsel Early and Often Sources of disputes, delay, and downstream expenses: Technological assumptions Uninformed / reactionary entrenching The term list what is on it and what it means Protocol gamesmanship Failure to identify all ESI sources... there is a new sheriff in town-not Gary Cooper, but me. The filing of fortypage discovery motions accompanied by thousands of pages of exhibits will cease and will now be replaced by a new regimen in which the parties, without surrendering any of their rights, must make genuine efforts to engage in the cooperative discovery regimen contemplated by the Sedona Conference Cooperation Proclamation. Tadayon v. Greyhound Lines, Inc., CIV ABJ/JMF, 2012 WL , * (D.D.C. June 6, 2012) (citing 36
37 Express Agreements Under Imbalances Wait for permission or seek forgiveness later? 37
38 Express Agreements Under Imbalances Wait for permission or seek forgiveness later? Preservation Collection and mass-filters: protocol, validation and logs Expectation of manual linear review after electronic searches ( the list ) 38
39 Express Agreements Under Imbalances Wait for permission or seek forgiveness later? Production Organization: Ordinary course Folders and subfolders Identified by request # Production format Hard copy Load files True v. Hybrid (TIFF) native format Images only (OCR Compatible) Proprietary software requirements Production Metadata s: Subject Author Recipient CC BCC Rec d date and time Sent date and time Threading and attachment Loose / Active File: Name & Extensions Author Create date/time Edit Version Access / edit history 39
40 Privilege protocol Express Agreements Under Imbalances Wait for permission or seek forgiveness later? Inadvertent production Rely on the rules? Log content and organization Audit procedures Deadline for challenging privilege designations 40
41 MOTIONS Stake out the high ground with early and ongoing good faith diligence, and document it. Move or defend (permission v. forgiveness)? Know the judge & jurisdiction: How much technical education does the bench need? How much myth-busting does the bench need? 41
42 MOTIONS Seeking ESI Why the source is relevant and necessary Why there is no alternative source Why the source is not duplicative or cumulative of other sources Protecting ESI Why irrelevant or relevance is outweighed by the cost Why it is cumulative Specifically why it is burdensome/expensive How the request is better framed/focused Evidence: samples, hit report, informed affidavits Cost shifting: informed statements of expense 42
43 Forensic Investigators Investigator Data Source Third Party Referee Requesting Counsel Protocol Custodian / Counsel 43
44 Client Considerations Control ESI: Sources TM s Personal accounts BYOD s outside of server Cloud Central operating directories: To C:/ or not to C:/.... Central backup / imaging capabilities Central custodians 44
45 Client Considerations Control ESI: Sources Use Personal s Everyone should know everything is saved. Internal and external professionalism 45
46 Client Considerations Control ESI: Sources Use Volume Unsubscribe v. spam filtering Document retention Policy Saving as new 46
47 Client Considerations Control ESI: Sources Use Volume Organization Standardize file nomenclature & organization Project specific directories Server drive allocation Identifying privileged communications 47
48 Client Considerations Plan for ESI: Litigation Hold General guidelines v. case specific requirements Identifying triggering events Will the plan be followed... 48
49 Client Considerations Plan for ESI: Litigation Hold Personnel Routine points of contract Urgent points of contact Counsel Critical personnel departure Personnel to execute a litigation hold Business interruption mitigation 49
50 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Preserve in place Collection for preservation Image for preservation 50
51 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Preserve in place Collection for preservation Image for preservation Real time redundancy 51
52 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Legacy data preservation Archive Organization Vendor recommendations 52
53 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Prime issue for costly disputes 53
54 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Employee Education Limit surprises to them Limit surprises to you 54
55 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Employee Education Culture of compliance Top -down 55
56 Client Considerations Plan for ESI: Litigation Hold Personnel Preservation Updates Extraction Employee Education Culture of compliance Plans made before the client knows who stands to benefit, if followed, may help defensibility 56
57 Process & Cost Sources Collection Electronic Filtering Ingestion & Hosting Targeted / Hybrid Electronic Filtering Linear Review 57 Production and Use
58 Presenter: Phil A. Burian Contact: (319)
59 This presentation is designed and intended for general information purposes only and is not intended, nor should it be construed or relied on, as legal advice. Please consult your attorney if specific legal information is desired. 59
E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More information3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?
Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More information25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators
25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationElectronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson
Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationThe Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration
The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of
More informationE-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS
E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationCOUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
More informationSnap Inc. Law Enforcement Guide
Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street
More informationMinimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering
From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,
More informationSAMPLE LITIGATION HOLD NOTICES
Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope
More informationencrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?
Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information
More informationTop 10 Mistakes to Avoid When Creating Productions
Top 10 Mistakes to Avoid When Creating Productions Steer Clear of Common Pitfalls and Flawlessly Execute Productions October 30, 2014 Gene Albert Principal, Lexbe LC ediscovery Webinar Series Info Takes
More informationZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive
More informationVictor Stanley and the Changing Face
Victor Stanley and the Changing Face of E-Discovery What You Need to Know page : 1 Victor Stanley and the Changing Face of E-Discovery What You Need to Know A Clearwell White Paper Victor Stanley and the
More informationBuilding Information Modeling and Digital Data Exhibit
Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following
More informationTerms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client
Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible
More informationHIPAA For Assisted Living WALA iii
Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More informationcosts maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com
Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response
More informationSouthington Public Schools
3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction
More informationDiscovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family.
Discovery Attender Version 2.2 White Paper Discovery Attender is a member of the Attender Utilities family Table of Contents Introduction...3 Benefits...4 Product Overview...5 FAQ...8 Product History...12
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26
More information8/28/2017. What Is a Federal Record? What is Records Management?
Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical
More informationShielding the Organization from Data Risk & E- Discovery Failures
Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,
More informationWASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information
WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington
More informationFreedom of Information and Protection of Privacy (FOIPOP)
Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period
More informationHow Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.
How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationE-Discovery in the US: Overview
Resource ID: 1-503-3009 E-Discovery in the US: Overview ANA TAGVORYAN, BLANK ROME LLP, JOSHUA BRIONES, MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND POPEO, P.C., AND BROWNING E. MAREAN (DECEASED), DLA PIPER
More informationediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP
ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP 713-752-4200 Fun Facts to Know and Tell GHOST/MIRROR: Complete bit by bit copy of a drive. (Not just
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification
More informationA Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016
A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US
More informationPinpoint Labs ESI Collection Tools
Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationAvoiding the Pitfalls of Bring Your Own Device Policies
Pitfalls of Bring Device Policies BYOD/T Represents a Constant Battle Between Compliance Objectives and Employee Usability Presenters: Constantinos Dino G. Panagopoulos, Labor and Employment Group Philip
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationSupersedes Policy previously approved by TBM
Document Title: Email Policy Pages Document Type: Policy 6 No. Of Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 27 Treasury Board Approval ( # ) TBM2009-298 Supersedes
More informationFinding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics
Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing
More informationThe Legal Health Record and E-Discovery: Where You Need to Be
The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.
More informationCompass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018
Compass Consulting Group Terms of Use & Privacy Policy Last Updated: 10/1/2018 1. Introduction. At Compass Consulting Group LLC ( Compass, we, us, or our ), we recognize that your privacy is important.
More informationScientific Working Group on Digital Evidence
Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationSTRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR
STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR Judith Germano, Esq. Member, New Jersey Supreme Court s Working Group on Ethical Issues Involving Metadata in Electronic Documents Germano
More informationASSOCIATION OF DEFENSE TRIAL COUNSEL WEB SITE AND SERVICE
ASSOCIATION OF DEFENSE TRIAL COUNSEL WEB SITE AND EMAIL SERVICE Dear ADTC Member: The Board of the ADTC is developing a web site (adtc.org) that will contain information of interest to its members and
More informationIllinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.
E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will
More informationTOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell
Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More information5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.
Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationDATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System
DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationUniversity Policies and Procedures ELECTRONIC MAIL POLICY
University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must
More informationCommunity Unit School District No. 1. School Board
Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationGUESTBOOK REWARDS, INC. Privacy Policy
GUESTBOOK REWARDS, INC. Privacy Policy Welcome to The Guestbook and Gopher, the online and mobile services of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,
More informationEnterprise Vault & e-discovery
Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing
More informationHandling Large Data Sets
Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies Today s Talk Forensics and E-Discovery Modern
More informationBuilding YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services
Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data
More informationDEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy
DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of
More informationSafeguarding Attorney-Client Privilege in a Wireless World
Safeguarding Attorney-Client Privilege in a Wireless World What to consider when communicating with your clients Marc S. Martin, Partner 202-778-9859 mmartin@klng.com www.klng.com Attorney Treatment of
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationTake control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
More informationInformation Security Procedures and Privacy Protection
Information Security Procedures and Privacy Protection Michele Dow, Associate Marketing Consultant Eli Lilly & Company Monday, February 25, 2008 Email Environment Today CAN SPAM Increased Privacy Needs
More informationCumberland Employment Law Update 2014
Cumberland Employment Law Update 2014 Agenda Requesting and Resisting Disclosure of Electronic Information What the defense lawyer should ask for The plaintiff s guide to preventing overreaching Discovery
More informationPRIVACY POLICY Last Updated May, 2018
PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise
More informationInformation Resources, Inc. ( IRI ) Global Privacy Policy Part I. May 25, 2018 Version 0.1 Chief Privacy Officer / Data Protection Steering Committee
Information Resources, Inc. ( IRI ) Global Privacy Policy Part I May 25, 2018 Version 0.1 Chief Privacy Officer / Data Protection Steering Committee 1 Table of contents 1. Purpose... 3 2. Message from
More informationIAM Security & Privacy Policies Scott Bradner
IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationData Protection Policy
Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,
More informationDecember 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION
December 6, 2017 VIA E-MAIL Senate President Joe Negron Office of the Florida Senate 404 S. Monroe Street Tallahassee, Florida 32399-1100 Negron.joe@flsenate.gov RE: Rachel Perrin Rogers NOTICE OF DEMAND
More informationManaging Your Record Retention Policy Safely
Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients
More informationDocument Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and
More informationU.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009)
636 F.Supp.2d 769 UNITED STATES of America, Plaintiff, v. Justin D. WEAVER, Defendant. No. 09-30036. United States District Court, C.D. Illinois, Springfield Division. July 15, 2009. Elham M. Peirson,
More informationSynchronoss Website Privacy Statement
Synchronoss Website Privacy Statement This website privacy statement ("Privacy Statement") explains how Synchronoss Technologies, Inc. ( Synchronoss, we, us and our ) may collect, use, store and disseminate
More informationEmployee Departure Checklist
Employee Departure Checklist Departing employee's name: Departure date: Supervisor's name: Employee to be terminated: Yes No DO NOT NOTIFY EMPLOYEE OF THIS LIST IF YES Person responsible for completing
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationLexbe Sample ediscovery Order. ESI Discovery Order
Lexbe Sample ediscovery Order This sample forms is provided as a courtesy by Lexbe for use by experienced attorneys as is, and should be customized for the particular jurisdiction, case, court, and circumstances.
More informationMEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL
National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David
More informationCUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1
CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND EMAIL COMMUNICATIONS POLICY AND PROCEDURE Effective Date: ~ \ 1 1-Pl) Pursuant to Article XIII of the Association's Bylaws, "records and
More informationCanadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist
Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Database Checklist Use this Checklist as a guide to assessing existing databases for compliance with Canada s Anti-Spam
More informationHitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between
between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by
More informationApplications for Preservation and Production in our Digital World
Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background
More informationAdobe Fonts Service Additional Terms. Last updated October 15, Replaces all prior versions.
Adobe Fonts Service Additional Terms Last updated October 15, 2018. Replaces all prior versions. These Additional Terms govern your use of the Adobe Fonts service and are incorporated by reference into
More informationPUBLIC RECORDS. May 2016
PUBLIC RECORDS May 2016 ACCESS Florida Law creates a right of access to inspect and/or have copies of public records. WHO? This means ANYONE regardless of: Identity Reason YOU MAY NOT REQUIRE A REQUESTOR
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationGENERAL PRIVACY POLICY
GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationThis factsheet intends to provide guidance on how you can manage your s. You will discover:
Summary This factsheet intends to provide guidance on how you can manage your emails. You will discover: Why it is important to manage your emails Guidance for approaching email management How to identify
More information