E-Discovery in the US: Overview
|
|
- Marshall Griffin
- 6 years ago
- Views:
Transcription
1 Resource ID: E-Discovery in the US: Overview ANA TAGVORYAN, BLANK ROME LLP, JOSHUA BRIONES, MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND POPEO, P.C., AND BROWNING E. MAREAN (DECEASED), DLA PIPER LLP Search the Resource ID numbers in blue on Practical Law for more. A Practice Note addressing the key issues organizations, individuals, and their counsel must consider to ensure that they comply with their legal duty to produce electronically stored information (ESI) in litigation. This Note specifically addresses parties and non-parties ESI preservation and production obligations and the consequences of failing to meet those duties. Electronic discovery (e-discovery) refers to the exchange of electronically stored information (ESI) as part of the discovery process in civil litigation. The basic legal framework governing a litigant s duty to disclose (and right to receive) ESI is, in many ways, no different from the legal framework governing the disclosure of paper documents. However, e-discovery poses several challenges that are not as prevalent with traditional paper discovery. For example, in today s business environment, the volume of discoverable ESI typically dwarfs the volume of discoverable paper documents. Additionally, figuring out where all potentially relevant ESI resides and devising a strategy to efficiently identify and collect this information requires technological expertise that is not required for paper discovery. This Practice Note Overview addresses the key issues that an individual or organizational party or non-party (collectively referred to in this Overview as a responding party ) and their counsel must consider to ensure that they comply with their legal duties to preserve and produce relevant ESI in litigation. WHAT IS ESI? The Federal Rules of Civil Procedure (FRCP) broadly define ESI to include writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations (FRCP 34(a)). Some obvious forms of ESI include s and attachments, Excel spreadsheets, information stored in databases, and word processing documents such as those created in Microsoft Word. However, there are many other types of ESI that may be less obvious. For example, voic s, text messages, internet history logs, backup tapes, social media profiles and activity, and videos also qualify as ESI. ESI consists of both the: Information displayed on the face of a document, such as the body of the or the typed content of a Microsoft Word document. Document s metadata, such as the document s author and creation date. Counsel may corrupt a document s original metadata when preserving and collecting ESI, but the ESI will have metadata even in that circumstance (albeit unoriginal). The FRCP do not specifically speak to the discoverability of metadata, but some courts have addressed the issue in opinions, local orders, e-discovery guidelines, and the like. Absent an absolute directive from the forum court on metadata, counsel should always negotiate how they will handle metadata in litigation before they engage in e-discovery. COMPARISON TO TRADITIONAL PAPER DISCOVERY Generally, e-discovery proceeds in the same manner as traditional paper discovery. FRCP 26(b) dictates the permissible scope of discovery, limiting it to include only nonprivileged matter[s] that [are] relevant to any party s claim or defense and proportional to the needs of the case[.] The parties: Make any initial disclosures required by FRCP 26(a)(1) (see Standard Document, Initial Disclosures ( )). Request and produce specific documents under FRCP 34 (see Standard Document, Document Requests: Request for the Production of Documents (RFP) ( )). Subpoena documents from non-parties under FRCP 45 (see Practice Note, Subpoenas: Using Subpoenas to Obtain Evidence (Federal) ( )). ESI does, however, present some unique challenges. For example, unlike paper documents: Copying or accessing a particular file can irreversibly alter or destroy ESI metadata.
2 Computer systems may automatically discard or overwrite ESI as part of routine operations. Computers can create ESI without the operator s direction or awareness. Although a user may delete ESI, it: zoften continues to exist in forms that may be difficult to locate, retrieve, or search; and zmay be recovered with the help of a computer forensics expert. ESI may be incomprehensible if separated from the system or software used to create it. WHERE ESI IS LOCATED ESI resides almost everywhere. If a computerized device or service has a memory capacity, it is probably an ESI repository. For example, ESI exists on computer hard drives, telephones (including smart phones), voic systems, tablets, compact discs, floppy disks, thumb drives, and wearable technology. ESI also exists on social media websites such as Facebook, Twitter, Instagram, and LinkedIn, corporate accounts, internet-based accounts, and even the memory chips of digital copiers. Network backup tapes are frequently the largest (and most overlooked) ESI repositories. Organizations often use backup tapes to store copies of their employees ESI for certain periods of time as a safeguard against organization-wide data loss. MANAGING AN ORGANIZATION S INFORMATION IN THE ORDINARY COURSE OF BUSINESS Organizations routinely identify, retain, and dispose of records in the ordinary course of business. It is important for organizations to implement a records management program that: Directs employees how to handle the organization s information. Provides a systematic approach to record preservation and deletion. For more information about records retention, see Records Management Toolkit ( ). BENEFITS OF A RECORDS MANAGEMENT PROGRAM A properly-administered records management program may provide an organization with several significant benefits, such as: Minimizing the high costs of storing and maintaining ESI and other information in the ordinary course of business. An effective records management program enables an organization to dispose of worthless records and free up physical or digital storage space. In turn, the organization can reduce the cost of storing and managing documents (including ESI). Reducing the time and cost involved in locating, collecting, and producing documents (including ESI) in litigation. An organization with a records management program can, for example, more easily determine whether it still has certain corporate documents from a particular time period. Knowing what still exists and where it is stored enables personnel to conduct an efficient search for relevant records. Demonstrating that the organization had a legitimate purpose for destroying ESI and other information. If ESI and other information that are now relevant to a lawsuit or investigation were destroyed by the organization before it reasonably anticipated the lawsuit or investigation (see Duty to Preserve ESI), having an organization-wide records retention program in place may help establish that the organization had a legitimate business purpose for destroying the information. Minimizing exposure to certain legal claims. A records management program can help shield an organization against claims based on old and trivial documents drafted by current or former employees who may not be available or able to recall and provide proper context for the documents (due to fading memories, for example). DESTROYING ESI A comprehensive records management program includes specific procedures for deleting ESI, including: What types of ESI can, should, and must be deleted. When to delete each type of ESI. How to delete each type of ESI. Who is responsible for deleting each type of ESI. Eliminating or deleting ESI is not as simple as it sounds. For example, an employee may delete ESI from a shared drive. If the organization previously backed up the shared drive and a copy of the backup tape remains, the file is still within the organization s possession, custody, or control and may be discoverable in litigation. Similarly, an employee may delete ESI from her laptop computer and empty the Recycling Bin. The file, however, may still exist on the laptop hard drive and be recoverable by computer forensics experts. Accordingly, when developing the deletion elements of its records management program, an organization should involve both: Individuals who are familiar with the various laws and regulations governing records retention. Information technologists who are familiar with all of the organization s data storage practices. DUTY TO PRESERVE ESI Organizations and other potential litigants have a duty to preserve all relevant information (both ESI and hard copy documents) as soon as they know or reasonably anticipate that they will become involved in litigation or a government investigation (see Fujitsu Ltd. v. Fed. Exp. Corp., 247 F.3d 423, 436 (2d Cir. 2001); Orbit One Commc ns, Inc. v. Numerex Corp., 271 F.R.D. 429, 436 (S.D.N.Y. 2010)). The duty to preserve may be triggered in various ways. For example: A plaintiff has a duty to preserve relevant information once it begins to seriously contemplate filing a lawsuit. A defendant has a duty to preserve relevant information: zwhen it has notice of a credible threat of litigation; or zonce it is served with the complaint (if it was not already on notice). A non-party s duty to preserve may be triggered when it receives a subpoena in connection with a pending lawsuit or government investigation. Once an organization has a duty to preserve, counsel should issue a proper litigation hold (see Issuing a Written Litigation Hold). 2
3 Although litigants have a duty to preserve relevant ESI, organizations do not need to search for and preserve every single piece of ESI that might conceivably be relevant to a lawsuit or investigation. Rather, counsel must make a reasonable effort to preserve potentially relevant information (FRCP 37(e)). Accordingly, when developing and executing a preservation plan, counsel should carefully document the: Steps they take to preserve. Any steps they considered but did not take, including the rationale for that decision. Contemporaneous documentation will likely be helpful should counsel later need to defend the reasonableness of the preservation protocol in connection with an ESI spoliation claim. For more information on preservation, see Litigation Hold Toolkit ( ). CONSEQUENCES OF NOT PRESERVING ESI Because of the ever-increasing volume of ESI, perfection in preserving all relevant ESI often is impossible (2015 Advisory Committee Notes to FRCP 37). However, once an organization has a duty to preserve, it may face severe sanctions if it destroys or loses potentially relevant ESI. FRCP 37(e) governs when a court may sanction a party that fails to preserve ESI and authorizes a court to sanction a party for lost ESI only when both: The party failed to take reasonable steps to preserve the ESI. The information cannot be obtained elsewhere. If the court makes both such findings, the court must then determine whether the party intended to destroy the ESI: If the court finds that the party did not intend to destroy the ESI, the court may impose the least severe sanction that will cure the prejudice cause by the ESI loss (FRCP 37(e)(1)). If the court finds that the party intended to deprive another party of the information contained in the ESI, the court may impose the following sanctions: zpresume that the lost information was unfavorable to the party; zinstruct the jury that it may or must presume the information was unfavorable to the party; or zdismiss the action or enter a default judgment. (FRCP 37(e)(2)). COMPLYING WITH THE DUTY TO PRESERVE AND PRODUCE ESI In many cases, organizations cast a wide net to ensure that all potentially relevant ESI (and other information) is preserved so that they can later collect, process, review, and produce it if necessary. However, counsel must keep in mind that FRCP 26(b)(1) limits discovery to that which is proportional to the needs of the case. Accordingly, a party s preservation efforts should be proportional to the case (2015 Advisory Committee Notes to FRCP 37). To avoid disputes about whether a particular preservation protocol is reasonable and proportional, counsel should negotiate the scope of discovery early in the lawsuit (FRCP 1) (see Discovery Conference). Compliance with the duty to preserve and produce ESI (and other information) is a continuing process that involves several steps, including: Identifying ESI and hard copy documents that are within the scope of discovery. Issuing a written litigation hold (see Issuing a Written Litigation Hold). Locating ESI (see Locating ESI). Preserving ESI (see Preserving ESI). Collecting ESI (see Collecting ESI). Processing ESI (see Processing ESI). Reviewing ESI (see Reviewing ESI). Producing ESI (see Producing ESI). ISSUING A WRITTEN LITIGATION HOLD Once an organization has a duty to preserve, it must issue a written litigation hold notice that basically serves as a freeze on the organization s routine record disposal activities (see Standard Document, Litigation Hold Notice ( )).The litigation hold notice should: Describe the types of ESI and other information that the organization must preserve in enough detail that employees can easily identify which information must be retained and which may be discarded under the organization s normal business practices. Be updated and reissued periodically to include any ESI and other information that becomes relevant but may not have been included in previous versions of the hold notice. An organization should issue the litigation hold to: Key players. Information technologists and record managers. Select consultants, agents, and affiliates. Key Players Counsel should communicate directly with employees who are key players in the lawsuit or investigation and clearly advise them of their duty to preserve relevant ESI and other information (see Zubulake v. UBS Warburg LLC, 229 F.R.D. 422, (S.D.N.Y. 2004)). Information Technologists and Record Managers An organization must notify information technology (IT) personnel of litigation holds to ensure that they preserve relevant backup tapes and stop any routine or automated destruction processes that may affect relevant ESI. As a general rule, organizations must preserve backup tapes that are the sole source of relevant ESI, although there is no need to save or search backup tapes when the same ESI is also available from more easily accessible sources (see Margolis v. Dial Corp., 2012 WL , at *3-4 (S.D. Cal. July 3, 2012); see also Coverall N. Am., Inc. v. Verica, L.L.C., 2013 WL , at *11 (D. Neb. May 2, 2013) (the plaintiff was not required to recreate backup tapes where some of the documents sought on the tapes already have been produced); Nycomed U.S. Inc. v. Glenmark Generics Ltd., No. 08-cv-5023, 2010 WL , at *9 n.13 (E.D.N.Y. Aug. 11, 2010)). 3
4 The organization also should notify its record management administrators to ensure that they discontinue any routine processes that could cause the loss of relevant ESI or documents. Consultants, Agents, and Affiliates Parties involved in litigation have a duty to preserve and produce any designated documents and ESI that are under their control, even if that information is in another entity s physical possession (FRCP 34(a) and 45(a)(1)(A)(iii)). A party has control over another entity s documents and ESI if it has the legal right to obtain the information from that entity or if it regularly receives documents and ESI from that entity upon request during the normal course of business (see F.D.I.C. v. McCaffree, 289 F.R.D. 331, 339 (D. Kan. 2012); Nycomed U.S. Inc., 2010 WL , at *7; SEC v. Credit Bancorp. Ltd., 194 F.R.D. 469, 472 (S.D.N.Y. 2000); see also Article, Protecting Foreign Corporations from US Discovery: The Custody or Control Analysis ( )). Accordingly, an organization should issue a litigation hold to related entities if both: The entity maintains ESI or other information that may be relevant to the litigation or investigation. The ESI or other information they maintain is within the organization s possession, custody, or control. For a comprehensive discussion of litigation holds, see Practice Note, Implementing a Litigation Hold ( ). LOCATING ESI Locating all relevant ESI poses one of the biggest logistical challenges for organizations involved in litigation or an investigation. ESI can reside on virtually any electronic medium, ranging from computer hard drives to backup tapes (see Where ESI Is Located). As part of their efforts to locate all relevant ESI, counsel should interview each key employee involved or implicated in the lawsuit or investigation to determine where that employee stores ESI. The organization likely does not know the full extent of an employee s document management habits unless counsel actually speak with the employee. For example, an employee may save ESI on an office computer, home computer, laptop, internet-based account, smartphone, tablet, or portable thumb drives. For an outline of questions to ask an ESI or document custodian, see Standard Document, Data Collection: Document Custodian Interview Questions ( ). Counsel also must work closely with the organization s IT personnel, as key employees may not know where all of their data is stored or may be less than forthcoming regarding the location of their files. Additionally, non-key employees may have relevant ESI and not even know it. In these situations, IT personnel can help locate all potential sources of relevant ESI. Counsel should work with IT personnel to: Create a data map that describes where various types of ESI are located within the organization s network. Determine where relevant ESI is likely to be stored, based on information provided by custodians. Identify a process for preserving and eventually collecting relevant ESI. For an outline of questions to ask an IT professional or records manager, see Standard Document, Data Collection: Locating and Collecting Relevant Data ( ). PRESERVING ESI An organization must take reasonable steps to preserve all potentially relevant ESI and other discovery materials. Both in-house and outside counsel should be intimately involved with the ongoing preservation efforts. In addition to developing and issuing the litigation hold letter, management, IT personnel, and counsel should work together to: Train employees on how to properly preserve ESI and other information. Continually check on and communicate directly with employees to ensure that they comply with the litigation hold and that all relevant ESI is preserved. Closely monitor the organization s records management administrators to ensure that the organization s records retention practices (such as automatic firm-wide disposals) comply with the litigation hold. COLLECTING ESI After identifying and preserving relevant ESI, the organization must collect it. Counsel should be wary of permitting a custodian to selfsearch or self-collect, as such approaches are particularly susceptible to attack. For example, an opposing party may view a self-search and self-collection as inadequate if: The custodian fails to search for reasonable variations of a keyword or neglects to search a broad enough date range. The custodian inadvertently collects data in a manner that damages the ESI s original metadata, such that it can no longer be leveraged by either party for filtering or searching. However, self-search and self-collection may be defensible in some cases. At times, the FRCP 26(b) proportionality analysis supports self-search and self-collection, rather than more costly alternatives like retention of an e-discovery vendor. If counsel opt for selfsearch and self-collection, they should carefully plan, supervise, and document the process to maximize defensibility. Counsel often elect to have the organization s IT staff or an e-discovery vendor collect ESI. Having professional technologists conduct a search or collection ensures the integrity of the processes. If counsel opt to use an outside vendor, they must keep in mind that although vendors can eliminate some of the anxiety of discovery, counsel must still supervise them. The consequences of not preserving (or not taking reasonable steps to preserve) relevant ESI ultimately fall on the organization and its counsel, not the vendor. (See Considerations When Selecting an E-Discovery Vendor Checklist ( ).) PROCESSING ESI Once counsel collect ESI, they can process it. While counsel do not always need to process all collected ESI, processing offers meaningful benefits if counsel: Collected native files. Can use metadata filtering to narrow the universe of ESI that they must review. Intend on reviewing ESI in a document review platform. Plan to produce metadata as part of document productions. 4
5 Processing ESI generally involves extracting metadata from native ESI and extracting (or generating) searchable text. These basic processes enable counsel to: Defensibly eliminate duplicative and irrelevant documents from the universe of ESI that they ultimately host and review in a document review platform (the review set). When filtering the ESI to isolate the review set, counsel can take advantage of common processing functions like: zde-duplication; zde-nisting; and z threading. Efficiently navigate and review the ESI in the review set. If counsel process ESI and then upload the extracted metadata and other processing output to the document review platform, they can: zmore easily view the ESI in the platform; and zsearch and sort the ESI by metadata fields (for example, isolate all s sent by a particular individual in a limited date range). For a more detailed discussion of ESI processing, see Practice Note, E-Discovery: Processing Electronically Stored Information (w ). REVIEWING ESI Once the organization identifies and collects the relevant (and reasonably accessible) ESI, counsel must review that information before producing it to the requesting party. Undertaking a careful and systematic review before production is essential to ensure that the organization does not disclose irrelevant documents, trade secrets, or other commercially sensitive data. A thorough review also helps to ensure that the organization does not waive the attorney-client privilege or work product protection by inadvertently producing privileged or protected documents to the requesting party. Although the FRCP and the Federal Rules of Evidence (FRE) offer safeguards against inadvertent waivers, organizations still risk waiving the privilege or other evidentiary protection if they do not perform any type of privilege review or take other measures to protect against waiving privilege (FRCP 16(b) and 26(b)(5)(B); FRE 502). For more information about protecting against waiving privilege, see Standard Document, FRE 502(d) Order ( ) and Practice Note, Attorney-Client Privilege: Waiving the Privilege: Non-Waiver and Clawback Agreements and Court Orders ( ). Finally, counsel should typically review documents before production so that they: Know what ESI and other information they have produced to their adversary. Can properly prepare for litigation. For various resources on document review, see Document Review and Production in Federal Court Toolkit ( ). PRODUCING ESI Production Format Production format is the manner in which a party produces documents, rather than the substance or content of the production. Common production formats include: Images (for example, searchable or unsearchable PDF). TIFF files accompanied by extracted text files and a load file containing relevant metadata. Native files. Hard copy printouts of electronic files. When selecting a production format, counsel should consider court rules and guidelines regarding production format as well as the needs of the particular case. FRCP 34 and 45 provide that: The requesting party may specify the format in which it wants the responding party to produce responsive ESI (FRCP 34(b)(1)(C) and 45(a)(1)(C)). The responding party may object to the requested format (FRCP 34(b)(2)(D) and 45(d)(2)(B)). If the requesting party does not request a particular a production format, the responding party may produce ESI in a form or forms in which [the ESI] is ordinarily maintained or in a reasonably usable form or forms (FRCP 34(b)(2)(E)(ii) and 45(e)(1)(B)). The responding party does not need to produce ESI in more than one format (FRCP 34(b)(2)(E)(iii) and 45(e)(1)(C)). Many federal courts also have local rules, guidelines, and protocols regarding the format in which parties (or subpoenaed entities) produce ESI. When considering the circumstances of a particular case, counsel should be mindful of proportionality. On some occasions, the cost of producing ESI in a particular format may be disproportionate under the FRCP 26(b)(1) analysis. Organizing ESI for Production Unless the court orders otherwise, a party must either: Produce ESI as it is kept in the usual course of business. Organize and label the ESI to correspond to the categories in the document request or subpoena. (FRCP 34(b)(2)(E)(i).) With respect to ESI, a producing party may only be able to produce ESI as it is kept in the usual course of business by disclosing where it originally stored the ESI. While a producing party may be able to describe such a location (for example, on a particular individual s hard drive in a desktop folder named 2016 Construction Contracts ), it is more common for the producing party to include each file s original file path in the load file that the party includes in its production. Inaccessible ESI An entity producing ESI in response to a document request or subpoena does not need to provide ESI from sources that are not reasonably accessible because of undue burden or cost (for example, backup tapes used solely for disaster recovery purposes may, in some cases, present an undue burden) (FRCP 26(b)(2)(B) and 45(e)(1)(D)). If the requesting party objects and contends that the ESI is reasonably accessible, the entity resisting discovery bears the burden of demonstrating that production from that source would result in undue burden or cost (FRCP 26(b)(2)(B) and 45(e)(1)(D)). 5
6 DISCOVERY CONFERENCE REQUIRED PLANNING Subject to few exceptions, FRCP 26 provides a general meet and confer process that parties follow to address e-discovery and other related issues at the outset of litigation. Specifically, FRCP 26(f) requires that parties meet at least 21 days before a scheduling conference is to be held or a scheduling order is due under Rule 16(b). During this meeting, the parties must discuss any issues about preserving discoverable information and develop a proposed discovery plan. FRCP 26(f)(3) provides additional detail about the discovery plan that the parties must develop during the FRCP 26(f) meeting. In part, the discovery plan must address: The subjects on which discovery may be needed, when discovery should be completed, and whether discovery should be conducted in phases or be limited to or focused on particular issues (FRCP 26(f)(3)(B)). The disclosure, discovery, or preservation of ESI, including the form or forms in which it should be produced (FRCP 26(f)(3)(C)). Issues related to privilege, including whether the parties desire the entry of a FRE 502(d) order (see FRCP 26(f)(3)(D)). Any other orders that the court should issue under FRCP 16 or 26 (see FRCP 26(f)(3)(F)). Within the 14 days following the FRCP 26(f) meeting, the parties must: Submit a written report outlining the [discovery] plan to the court (see FRCP 26(f)(2)). Disclose certain information, including a copy or a description by category and location of all... electronically stored information... that the disclosing party has in its possession, custody, or control and may use to support its claims or defenses, unless the use would be solely for impeachment (see FRCP 26(a)(1)). Some courts provide form FRCP 26(f) reports, and others even provide model e-discovery orders, guidelines, or checklists. Such resources help the parties identify the e-discovery-related issues they should discuss. BENEFITS OF ROBUST NEGOTIATION AND PLANNING Many counsel perceive e-discovery as time-consuming, unwieldy, and costly. To minimize the risk of these outcomes, counsel should carefully prepare for the FRCP 26(f) meeting and commit to a robust discussion and negotiation. If properly leveraged, the parties can use the FRCP 26(f) process to: Define the list of subjects on which the parties will conduct discovery. Narrow the relevant time frame for which the parties will conduct discovery. Limit the sources (and custodians) from which counsel must collect, process, review, and produce ESI. Agree on the type of search methodology the parties will use (for example, the parties may agree on a particular predictive coding protocol). Clarify the format in which the parties will produce ESI. For more information about a FRCP 26(f) conference, see Rule 26(f) Conference Checklist ( ) and Standard Document, Rule 26(f) Report and Discovery Plan ( ). BEST PRACTICES TO PRESERVE AND PRODUCE ESI Properly preserving, collecting, processing, reviewing, and producing ESI is not an easy task. In fact, it can be one of the most tedious, time-consuming, and expensive exercises a party undertakes during a lawsuit or government investigation. However, with proper preparation and attention to detail, organizations and their counsel should be able to avoid some of the more common e-discovery pitfalls. Organizations and their counsel should: Implement a document retention policy (see Standard Document, Document Retention Policy ( ) and Practice Note, Information Governance: Establishing a Program and Executing Initial Projects (w )). Issue a litigation hold and cease document and ESI destruction practices once the preservation duty is triggered. Develop a discovery plan at the first sign of impending litigation. Immediately identify key sources of ESI and important file types. Never overlook metadata preservation. The need for metadata impacts how counsel must handle various aspects of e-discovery, including preservation, collection, processing, and production. Avoid ESI self-collection unless the organization has staff who are properly trained in handling digital data. Recognize that deleting ESI from one medium does not necessarily mean that the ESI does not exist on other media. Be aware that the organization s IT department may not be able to shoulder the e-discovery burden alone. Identify and discuss alternative ways of meeting that need, such as counsel s in-house litigation technologist or an e-discovery vendor. If available, use a single document review platform to host and review all hard copy documents and ESI for review. ABOUT PRACTICAL LAW Practical Law provides legal know-how that gives lawyers a better starting point. Our expert team of attorney editors creates and maintains thousands of up-to-date, practical resources across all major practice areas. We go beyond primary law and traditional legal research to give you the resources needed to practice more efficiently, improve client service and add more value. If you are not currently a subscriber, we invite you to take a trial of our online services at legalsolutions.com/practical-law. For more information or to schedule training, call or referenceattorneys@tr.com Use of Practical Law websites and services is subject to the Terms of Use ( and Privacy Policy ( 6
Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationSAMPLE LITIGATION HOLD NOTICES
Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope
More information3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?
Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationElectronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson
Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationIllinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.
E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will
More information25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators
25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.
More informationManaging Your Record Retention Policy Safely
Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients
More informationCLEANING OUT THE DATA CLOSET
2 Moderator Hon. Andrew Jennifer Aaron Brett Peck Feldman Laliberte Tarr DLA Piper DLA Piper Zapproved Caesars 3 What is defensible deletion? What does the law say? How do we get started? What if something
More informationSouthington Public Schools
3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More informationCircling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.
Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case
More informationCase 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA
Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationAshford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION
Ashford Board of Education Ashford, Connecticut Series 2000 Administration POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I. POLICY The Board of Education (the Board ) complies with all
More informationMinimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering
From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More information8/28/2017. What Is a Federal Record? What is Records Management?
Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical
More informationCARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose
CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,
More information5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.
Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationThe Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration
The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of
More informationCommunity Unit School District No. 1. School Board
Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in
More informationTo Document or Not to Document: That is the Question DPLE 182
To Document or Not to Document: That is the Question DPLE 182 RLI Design Professionals is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on
More informationUnderstanding Illinois New Ediscovery Rules
Illinois Association of Defense Trial Counsel Springfield, Illinois www.iadtc.org 800-232-0169 IDC Quarterly Volume 24, Number 3 (24.3.60) Feature Article Steven M. Puiszis Hinshaw & Culbertson LLP, Chicago
More informationAAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO
AAPA Legal Issues and Record Retention May 15, 2013 SML, Inc. Steve M. Lewis, President and CEO 813.205.2850 stevemlewis@msn.com www.smlinfo.net TABLE OF CONTENTS Page CORPORATE OR PUBLIC RECORDS 3 Copy
More informationPolicy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents
Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationSPRING-FORD AREA SCHOOL DISTRICT
No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In
More informationPrivacy Breach Policy
1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure
More informationPractical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1
Practical ESI Discovery Iowa Defense Counsel Phil A. Burian 6/10/14 1 Electronically Stored ESI Information Information created, manipulated, communicated, stored, converted to, or best utilized in digital
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationWorld Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018
World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationMEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL
National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David
More informationAutofill and Other Disasters: The Ethics of Inadvertent Disclosures
Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)
More informationMinnesota Government Data Practices Act and Litigation Holds In An Electronic Environment
Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment MACA-MCHRMA Fall Conference Ruttger s Bay Lake Lodge September 10, 2015 1 PRESENTED BY: Karen Clayton Ebert MCIT
More informationJustice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information
Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of
More informationAccess Rights and Responsibilities. A guide for Individuals and Organisations
Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making
More informationPrivacy Policy Identity Games
Document Name: Privacy Policy Reference: GDPR 1.0 This privacy policy was last modified on 26 July, 2018. Privacy Policy Identity Games In this policy, "we", "us" and "our" refer to Identity Games International
More informationSEPTEMBER 2018
www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering
More informationWhat You Need to Know About Addressing GDPR Data Subject Rights in Pivot
What You Need to Know About Addressing GDPR Data Subject Rights in Pivot Not Legal Advice This document is provided for informational purposes only and must not be interpreted as legal advice or opinion.
More informationElement Finance Solutions Ltd Data Protection Policy
Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationHow Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.
How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationThis policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.
Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s
More informationDATA PROTECTION AND PRIVACY POLICY
DATA PROTECTION AND PRIVACY POLICY Data Protection Act London Capital Group (Cyprus) Limited (LCG) may process information relating to you, including holding such information in a manual format or electronic
More informationThe Legal Health Record and E-Discovery: Where You Need to Be
The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.
More informationCONFLICT OF INTEREST SYSTEMS
CONFLICT OF INTEREST SYSTEMS Conflicts of interest can lead to serious malpractice and ethical problems. To detect conflicts, a good conflicts checking system is essential. No lawyer can remember every
More informationVETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES
VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,
More informationPreservation of Electronic Records for Litigation University Operations - Administrative
Preservation of Electronic Records for Litigation University Operations - Administrative EWU Policy 201-02 Effective: December 2, 2008 Authority: Board of Trustees Proponent: University President Summary:
More informationecare Vault, Inc. Privacy Policy
ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and
More informationJanuary 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel
January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel Current Sources for Collection & Forensics Laptops, Desktops, Tablets Virtual Machines Cell Phones Network Shares CDs/DVD,
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationIRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]
IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The
More informationPrivacy Policy. Effective: March 16, 2018.
Privacy Policy Effective: March 16, 2018. This Privacy Policy ( Privacy Policy ) applies only to the websites and online products and services controlled by Midwest Real Estate Data LLC ( MRED, we, us
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationPrivacy Notice for Business Partners
We, an affiliate of the Glatfelter group ( Glatfelter, Company, us, we, or our ), are committed to protecting your personal data responsibly and in compliance with applicable privacy and data protection
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26
More informationCreative Funding Solutions Limited Data Protection Policy
Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationThe Apple Store, Coombe Lodge, Blagdon BS40 7RG,
1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More informationConsolidated Privacy Notice
Privacy Notice Overview Consolidated Privacy Notice The Southern California Edison Privacy Notice was updated on January 31, 2018 It is important to Southern California Edison (SCE) to protect your information
More informationADVANCED ARBITRATION ACADEMY E Discovery Segment
August 8 12, 2016 ADVANCED ARBITRATION ACADEMY E Discovery Segment Judge Judith O. Hollinger Program in Alternative Dispute Resolution USC Gould School of Law Dealing with E-Discovery Issues in Arbitration
More informationCase 1:07-cv HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:07-cv-01707-HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA CITIZENS FOR RESPONSIBILITY AND ETHICS IN WASHINGTON, v. Plaintiff, Civil Action
More informationRecord Keeping Best Practice. Distinguish between University and Non-University Records
UNIVERSITY SECRETARIAT Gilmour Hall, Room 210 Phone: 905.525.9140, Ext. 24337 Board of Governors 1280 Main Street West Fax: 905.526.9884 Senate Hamilton, Ontario, Canada E-mail: univsec@mcmaster.ca L8S
More informationFerrous Metal Transfer Privacy Policy
Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and
More informationUnderstanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC
Understanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC Have you ever sent an email that you wish you could recall? Have you ever sent an email
More informationDIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018
DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018 A. OVERRIDING OBJECTIVE 1.1 This Directive establishes the framework for information management of the Asian Infrastructure Investment
More informationTHINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte
Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW
More informationProposed Spoliation Rules Would Impact Apple-Samsung Trial
Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung
More informationTOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell
Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when
More informationApplications for Preservation and Production in our Digital World
Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background
More informationPrivacy Policy GENERAL
Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill
More informationThird-party ediscovery Providers = Insulation Against Cold, Harsh Sanctions?
A SCARAB CONSULTING WHITEPAPER January, 2012 Third-party ediscovery Providers = Insulation Against Cold, Harsh Sanctions? Synopsis The risk of sanctions resulting from 1) corporations doing self-collections
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationCatalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1
Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and
More informationCyber Security and Data Management
Cyber Security and Data Management THE EVOLVING LAW AND PRACTICE ON DELETING LARGE VOLUMES OF OLD DATA TO REDUCE CYBER RISK Presented by Avi Gesser, Davis Polk Litigation Partner Gabriel Rosenberg, Davis
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationWHAT BUSINESSES SHOULD KNOW ABOUT WEBSITE ACCESSIBILITY LAWSUITS UNDER THE AMERICANS WITH DISABILITIES ACT
WHAT BUSINESSES SHOULD KNOW ABOUT WEBSITE ACCESSIBILITY LAWSUITS UNDER THE AMERICANS WITH DISABILITIES ACT INTRODUCTION Serial plaintiffs are suing businesses in alarming numbers alleging that websites
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationGENERAL PRIVACY POLICY
GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationPRIVACY POLICY PRIVACY POLICY
PRIVACY POLICY 1 A. GENERAL PART 1.1. COLLECTION AND PROCESSING OF USER DATA Within the scope of the availability of the website hosted in www.alpinushotel.com and of the services and communications made
More informationLightGig Communications, LLC Privacy Policy
LightGig Communications, LLC Privacy Policy Effective Date: December 06, 2018 1. Privacy Policy Overview LightGig Communications, LLC ( we, us, or our ) operates the website https://lightgig.com/ (the
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller
More informationWithin the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):
Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification
More information