January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel

Size: px
Start display at page:

Download "January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel"

Transcription

1 January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel

2 Current Sources for Collection & Forensics Laptops, Desktops, Tablets Virtual Machines Cell Phones Network Shares CDs/DVD, Thumb Drive Social Media Webmail Cloud storage Back-up Tapes

3 Corporate Network Architecture

4 Duty to Preserve & Legal Holds

5 Duty to Preserve Once an entity reasonably anticipates litigation It must suspend its document destruction policies Zubulake IV: service of complaint is the latest possible date the duty to preserve may attach Recent Seventh Circuit (Pradaxa) decision supports the reasonable anticipation doctrine Court found that the duty to preserve arose after the at-issue information was destroyed in accordance with Defendant s document retention policies and that an adverse inference was not warranted. The duty to preserve is triggered only when a litigant knew or should have known that litigation was imminent (at least in the Seventh Circuit). In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., MDL No. 2385, 2013 WL (S.D. Ill. Sept. 25, 2013)

6 Litigation Holds Notify your response team Send an immediate notice of the Litigation Hold, including: Instruction to all impacted employees and IT Department to save e- mail and electronic documents, as well as paper files Broad description of possibly relevant documents (Wiginton v. CB Richard Ellis, Inc., 2003 U.S. Dist. LEXIS (N.D. Ill., Oct. 24, 2003). Suspend deletion policies for: Custodians identified or known to be relevant Servers, clouds, wikis, collaboration spaces, etc. Turn off automatic deletion defaults

7 Permissible Loss, Damage, Alteration or Overwrite of ESI? FRCP 37 (e) & Cal. C.C.P. govern Absent exceptional circumstances, a court may not impose sanctions under these rules for failing to provide [ESI] lost as a result of the routine, good-faith operation of an electronic information system. Five new CA provisions are based on FRCP 37(e) - [A]bsent exceptional circumstances a court may not impose sanctions... for failing to produce [ESI] lost, damaged, altered, or overwritten as a result of the routine, good faith operation of an electronic information system See also: C.C.P (l)(1), (i)(1), (d)(1), (j)(1) and (d)(1) Rule 37(f) responds to a distinctive and necessary feature of computer systems - the recycling, overwriting, and alteration of [ESI] that attends normal use.... Even when litigation is anticipated, it can be very difficult to interrupt or suspend the routine operation of computer systems to isolate and preserve discrete parts of the information they overwrite, delete, or update on an ongoing basis, without creating problems for the larger system. The Committee Note re the comparable F.R.C.P. Rule 37(f), Report of the Judicial Conference Committee on Rules of Practice and Procedure (Agenda E-18, Rules, September 2005) at 32.

8 Where do you start. Who are the relevant custodians? What is the key subject matter? When - What are the relevant dates? Where is the data stored? What types of data? What types of metadata?

9 Collections

10 Collections Interview Process 1. IT Questionnaire a. What did IT say about the potential data sources? 2. Custodian Questionnaire a. What did the end user say about where they store data?

11 Interview IT first when possible Provide IT the questionnaire regarding possible data sources. Have them review it prior to their interview. There are many times when IT knows of data sources or legacy data sources that could be overlooked. Ask questions about backups even though you may not need them.

12 IT Collection Questionnaire Custodian Information o Key Custodians o Key IT Personnel ESI Systems o Asset Library o Work Stations o Servers o Cloud Computing o Data Map & Protocols o Data Map o Data Retention & Destruction Other Media o External Media o Back-up Media o Personal Devices Functional Requirements o Multi Media Preservation or Litigation Holds o Efforts undertaken to date o Any suspension of document destruction practices, etc. Case Documentation o Pleadings o Production Protocol o Discovery Orders/Rulings Non Discoverable Data Sources o Undue Burden Miscellaneous o Safe Harbor o Privilege Terms o Claw Back

13 Data Map What is a data map? A roadmap of the known data locations for a specific matter. Laptops Network Shares Backups The collection methodology can easily be generated from the known data locations.

14 Data Map The following is a summary of the main sources of electronicallystored information (ESI): Employee Workstations o There are 25 Windows laptops. o Employees store local Outlook archives as well as native files on their local workstation. o Their My Documents folder is synced to a file server. Server Shares o There are individual and group file shares. The estimated volume of data is 250 to 300 GB s. Server o Location A (City A) is running a Microsoft Exchange Server o Location B (City B) is running a Microsoft Exchange Server o Location A is running a Blackberry Enterprise Sever (BES) to support their Blackberry users. o Location A uses RedGate for archiving. ERP Server o Company X is running Microsoft Dynamics NAV (Navision). This isan enterprise resource planning software product that is intended to assist with finance, manufacturing, customer relationship management, supply chains, analytics and electronic commerce.

15 Custodian Interview Based on the information you learned from IT, you can now customize the Custodian Questionnaire. The questionnaire will list common data sources used within the company as well as data sources that are commonly used for personal use. With BYOD, the lines are blurred between corporate assigned devices and personal devices.

16 Custodian Questionnaire If you have been contacted by Widgets Legal in connection with the Giants matter, there is a document collection process that is initiated in order to collect all relevant documentation related to this case. The following areas should be checked for any relevant materials: 1. Any and all computing and electronic devices used by a custodian during the course of employment at Widgets including: all Widgets assigned laptops, (shared) workstations or personal devices used to perform work duties. 2. Any network drive used for storage of materials. Please provide a listing of the folders that may contain relevant material. Here are some examples of network drives: H: Drive (Home Directory) W: Drive (Share Files) S: Drive (Employee Share) 3. All held by a custodian in any of the following locations: Lotus Notes Mailbox Lotus Notes (NSF) Message Files (EML) or other formats 4. All hard copy workbooks, notepads, files or any other written documentation in the possession of a custodian. 5. Any internal shared portals created, maintained, edited, or used by a custodian. For example: SharePoint Sites Please provide a URL of the site(s) you use Amazon Sites Please provide a URL of the site(s) you use 6. Any SaaS/ASP s maintained, managed, or used by a custodian. For example: Marketing Materials Administrative SAP Financial SAP Sales 7. Any PDA or portable media devices. For example: PDA USB Thumb Drive USB Hard Drive CD/DVD 8. Any personal computing devices not owned by Widgets that were used for work related activities. Virtual Drop Boxes (Box.net) Home or Personal Computer FTP Sites

17 Collection Options Guided Self Collection Traditional Collection Methods Full Forensic Images Targeted Collections Web Mail (POP vs IMAP) Network Server Shares SaaS Applications Cell phones, PDA, Smart Phones, PDA & Tablets SharePoint & Web Portals Personal Devices Remote Collection Methods Selective Forensic

18 Misguided Self Collection How not to do it. National Day Laborer Facts - Plaintiffs sought information from several U.S. Government Agencies; issued FOIA requests Defendant Agencies missed initial production deadline; Judge Scheindlin ordered new production drop dead date Agencies searched through records/esi and produced in accordance with new deadline. Plaintiffs argued that the searches didn t include custodians likely to possess relevant data, and that the search methodology employed on the custodians they did search wasn t adequate. The court reviewed the defendant Agency s retrieval process and agreed with the plaintiffs, noting: [I]t [is] abundantly clear that a court cannot simply trust the defendant agencies unsupported assertions that their lay custodians have designed and conducted a reasonable search... National Day Laborer Organizing Network et al v. United States Immigration and Customs Enforcement Agency, et al U.S. Dist. Lexis (SDNY, July 13, 2012)

19 Safe Methods of Self Collection: Training, Tools & Repeatable Standard Operating Procedures (SOPS) Examples of Tools: EnCase Portable Self Collection Nuix Collector Custodian Self Collection Examples of Self Collection SOPs: Self Collection of Local Outlook Archives

20 Traditional Collection Methods Forensic Collections Bit for bit copy of the original. Logical Collections Robocopy FTK AD1 File EnCase L01 Social Media X1 Cellular and Tablet Cellebrite

21 Remote Collections Full Forensic Images EnCase Portable Live Collection with FTK Selective File Collections with Total Discovery

22 Forensically Sound Method Change of Custody Preserves integrity of the data (hash values) Repeatable process Defensible

23 Chain of Custody

24 Hash Value Integrity

25 Challenges posed by Solid State Drives (SDD)

26 What is the challenge? Rotational Media Drives (HDD): Data from a deleted file is accessible Data is static and consistent Drive hash is always consistent Solid State Drives (SSD): Data from erased file may disappear immediately or over time Data changes over time Drive hash may not always be consistent

27 What is an SSD? a solid state disk is a high-performance plug-and-playstorage device that contains no moving parts. SSD components include either DRAM or EEPROM memory boards, a memory bus board, a CPU, and a battery card. An SSD (solid-state drive or solid-state disk) is a storage device that stores persistent data on solid-state flash memory. Advantages: fast, robust, low power Disadvantages: price per GB, lifespan

28 Types of SSD Volatile Memory (RAM) Static RAM Dynamic RAM Non Volatile Memory Flash (NOR, SLC, MLC, emlc) F-RAM ReRAM M-RAM PRAM

29 Best Practice Understand the differences between HDD and SSD imaging You may only get one chance Know the limitations of your lab/technology Litigation Hold Letters Consider specific instructions for SSD ESI requests Require immediate imaging of devices Delays? STOP! Power off equipment and get a hold of a specialist ESI will potentially degrade with any attempts

30 Overview Preservation Effort Duty to preserve beings with reasonable anticipation of litigation, not with a filed complaint Litigation Hold Document the entire process from custodian interviews, to responses Interviews Collaborate with IT to identify potential data sources Custodian interviews tailored to help them understand what you are looking for laymen's terms Collect the data Self collection, forensic, logical, targeted, remote, etc. Document all processes, procedures and parties who may have been involved in these efforts!

31 Any Questions? Adam Wells, Vice President ediscovery Consulting, Jack Grimes, Director of IT,

Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.

Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved. Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case

More information

SAMPLE LITIGATION HOLD NOTICES

SAMPLE LITIGATION HOLD NOTICES Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your

More information

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )? Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What

More information

Enterprise Vault & e-discovery

Enterprise Vault & e-discovery Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing

More information

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

Community Unit School District No. 1. School Board

Community Unit School District No. 1. School Board Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court

More information

10 th National Investigations Symposium

10 th National Investigations Symposium 10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5

More information

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION December 6, 2017 VIA E-MAIL Senate President Joe Negron Office of the Florida Senate 404 S. Monroe Street Tallahassee, Florida 32399-1100 Negron.joe@flsenate.gov RE: Rachel Perrin Rogers NOTICE OF DEMAND

More information

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of

More information

Cyber Security and Data Management

Cyber Security and Data Management Cyber Security and Data Management THE EVOLVING LAW AND PRACTICE ON DELETING LARGE VOLUMES OF OLD DATA TO REDUCE CYBER RISK Presented by Avi Gesser, Davis Polk Litigation Partner Gabriel Rosenberg, Davis

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

Proposed Spoliation Rules Would Impact Apple-Samsung Trial

Proposed Spoliation Rules Would Impact Apple-Samsung Trial Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung

More information

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators 25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

8/28/2017. What Is a Federal Record? What is Records Management?

8/28/2017. What Is a Federal Record? What is Records Management? Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

Preservation of Electronic Records for Litigation University Operations - Administrative

Preservation of Electronic Records for Litigation University Operations - Administrative Preservation of Electronic Records for Litigation University Operations - Administrative EWU Policy 201-02 Effective: December 2, 2008 Authority: Board of Trustees Proponent: University President Summary:

More information

Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud

Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Description See first-hand how Enterprise Vault.cloud, Symantec's hosted archiving service, can help address mailbox management, email

More information

Pinpoint Labs ESI Collection Tools

Pinpoint Labs ESI Collection Tools Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Eliminating the Blame Game: Creating your Company Strategy for Documented Defense

Eliminating the Blame Game: Creating your Company Strategy for Documented Defense Eliminating the Blame Game: Creating your Company Strategy for Documented Defense Welcome Presenter: Wesley Ballance Sales Engineer Viewpoint Construction Software Wesley Ballance is a sales engineer with

More information

Illinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.

Illinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4. E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will

More information

Case 1:07-cv HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:07-cv HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:07-cv-01707-HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA CITIZENS FOR RESPONSIBILITY AND ETHICS IN WASHINGTON, v. Plaintiff, Civil Action

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization. Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,

More information

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

Southington Public Schools

Southington Public Schools 3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction

More information

IMPORTANT NOTICE: This Publication Has Been Superseded. See the Most Current Publication at

IMPORTANT NOTICE: This Publication Has Been Superseded. See the Most Current Publication at IMPORTANT NOTICE: This Publication Has Been Superseded See the Most Current Publication at https://thesedonaconference.org/publication/jumpstart_outline THE SEDONA CONFERENCE JUMPSTART OUTLINE : QUESTIONS

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

E-Discovery in the US: Overview

E-Discovery in the US: Overview Resource ID: 1-503-3009 E-Discovery in the US: Overview ANA TAGVORYAN, BLANK ROME LLP, JOSHUA BRIONES, MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND POPEO, P.C., AND BROWNING E. MAREAN (DECEASED), DLA PIPER

More information

Management Case Study. Kapil Lohia

Management Case Study. Kapil Lohia Email Management Case Study Kapil Lohia ARMA Survey on Information Management Prepared or Not? > Majority of RIM professionals feel unprepared when it comes to email management 72% for ediscovery - 68

More information

Data Destruction: Easier Said than Done

Data Destruction: Easier Said than Done Data Destruction: Easier Said than Done Carl Winchester, Mayer Brown Adam Hansen, Sonnenschein Bill Dean, Sword & Shield Moderator: Rachelle Rennagel, Esq., Sheppard Mullin Agenda Data Destruction Drivers

More information

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

Incident Response Data Acquisition Guidelines for Investigation Purposes 1 Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26

More information

Three Common Techniques for E-Discovery Preservation

Three Common Techniques for E-Discovery Preservation www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

ADVANCED ARBITRATION ACADEMY E Discovery Segment

ADVANCED ARBITRATION ACADEMY E Discovery Segment August 8 12, 2016 ADVANCED ARBITRATION ACADEMY E Discovery Segment Judge Judith O. Hollinger Program in Alternative Dispute Resolution USC Gould School of Law Dealing with E-Discovery Issues in Arbitration

More information

Maintain Data Control and Work Productivity

Maintain Data Control and Work Productivity DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,

More information

Legal Developments in ediscovery: Implications for Security Management

Legal Developments in ediscovery: Implications for Security Management Legal Developments in ediscovery: Implications for Security Management Abstract Richard S. Swart Utah State University This paper defines ediscovery and reviews recent court cases and amendment to Federal

More information

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing

More information

North American Market for Electronic Content Archiving

North American Market for Electronic Content Archiving An Osterman Research Industry Survey Report January 2016 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 206 683 5683 Tel: +1 206 905 1010 info@ostermanresearch.com

More information

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David

More information

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION Ashford Board of Education Ashford, Connecticut Series 2000 Administration POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I. POLICY The Board of Education (the Board ) complies with all

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment

Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment MACA-MCHRMA Fall Conference Ruttger s Bay Lake Lodge September 10, 2015 1 PRESENTED BY: Karen Clayton Ebert MCIT

More information

EXAM Administration of Symantec ediscovery Platform 8.0 for Users. Buy Full Product.

EXAM Administration of Symantec ediscovery Platform 8.0 for Users. Buy Full Product. Symantec EXAM - 250-412 Administration of Symantec ediscovery Platform 8.0 for Users Buy Full Product http://www.examskey.com/250-412.html Examskey Symantec 250-412 exam demo product is here for you to

More information

ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP

ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP 713-752-4200 Fun Facts to Know and Tell GHOST/MIRROR: Complete bit by bit copy of a drive. (Not just

More information

Records Retention Policy

Records Retention Policy June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable

More information

The Legal Health Record and E-Discovery: Where You Need to Be

The Legal Health Record and E-Discovery: Where You Need to Be The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.

More information

SYSTEM SPECIFICATIONS GUIDE

SYSTEM SPECIFICATIONS GUIDE SYSTEM SPECIFICATIONS GUIDE AD Enterprise NETWORK INVESTIGATION AND POST-BREACH ANALYSIS v6.5 Revision (May 8, 2018) www.accessdata.com Contents AccessData Enterprise Overview and System Specifications

More information

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,

More information

The Trail of Electrons

The Trail of Electrons E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic

More information

Law Prac ce Management MCLE Mee ng ARC May 27, 2014

Law Prac ce Management MCLE Mee ng ARC May 27, 2014 Law Prac ce Management MCLE Mee ng ARC May 27, 2014 11:45 AM Noon Sign In/Lunch 11:55 AM Noon Welcome/Introductions Michael Calabrese, Chair Charles Wentworth, Co-Chair Noon 1:00 PM Program Discovering

More information

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING EMAIL ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING 2013 2014 2015 2016 2017 Worldwide Email Accounts (M) 3,899 4,116 4,353 4,626 4,920 Business Email Accounts (M) % Business Email Accounts

More information

Addendum 1. APPENDIX B - Technical Information / Requirements Records Management Solution Capabilities. Questions. Number

Addendum 1. APPENDIX B - Technical Information / Requirements Records Management Solution Capabilities. Questions. Number APPENDIX B - Technical Information / Requirements 6.01 Records Management Solution Capabilities s 6.01.01 Is your solution available for cloud and on premise? How does the solution integrate with SharePoint

More information

Management: A Guide For Harvard Administrators

Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or

More information

Michael McCartney, President

Michael McCartney, President Michael McCartney, President Litigation Landscape Computer Forensics Overview Forensic Data vs. Non-Forensic Dangers of Hard Drives Forensic Process HR Escrow Proactive Forensics Pit falls to avoid 1 650

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Top 8 Healthcare Archiving and e-discovery Requirements

Top 8 Healthcare Archiving and e-discovery Requirements White paper Top 8 Healthcare Archiving and e-discovery Requirements www.proofpoint.com Table of Contents Overview... 3 Top 8 Healthcare Requirements... 3 1. Effective and Defensible E-discovery... 3 Search

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

6/4/2015. ESI: Is It Contagious? James L. Gale, Special Superior Court Judge Thursday, June 25, 2015 TOPICS FOR DISCUSSION MYTH OR REALITY?

6/4/2015. ESI: Is It Contagious? James L. Gale, Special Superior Court Judge Thursday, June 25, 2015 TOPICS FOR DISCUSSION MYTH OR REALITY? ESI: Is It Contagious? James L. Gale, Special Superior Court Judge Thursday, June 25, 2015 (with special thanks to Katie Bradshaw) TOPICS FOR DISCUSSION A Primer on ESI Why Should Judges Care? Standards

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance

More information

Top 8 Healthcare Archiving & ediscovery Requirements

Top 8 Healthcare Archiving & ediscovery Requirements Top 8 Healthcare Archiving & ediscovery Requirements John Wang Sr. Product Marketing Manager threat protection compliance archiving & governance secure communication Contents Overview...3 Top 8 Healthcare

More information

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Overview of  Archiving. Cloud & IT Services for your Company. EagleMercury  Archiving EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

Understanding Illinois New Ediscovery Rules

Understanding Illinois New Ediscovery Rules Illinois Association of Defense Trial Counsel Springfield, Illinois www.iadtc.org 800-232-0169 IDC Quarterly Volume 24, Number 3 (24.3.60) Feature Article Steven M. Puiszis Hinshaw & Culbertson LLP, Chicago

More information

Texas A&M AgriLife Research Procedures

Texas A&M AgriLife Research Procedures Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This

More information

DEFENSIBLE DELETION TO DOWNSIZE YOUR DATA

DEFENSIBLE DELETION TO DOWNSIZE YOUR DATA May 18, 2016 DEFENSIBLE DELETION TO DOWNSIZE YOUR DATA A Roadmap to Better Litigation Preparedness and Records Retention Practices Anthony L. McElynn E*TRADE Chief Compliance Officer Robert Fowler, CIPP/US

More information

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Archive Legislation:  archiving in the United Kingdom. The key laws that affect your business Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

This version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems

This version has been archived. Find the current version at   on the Current Documents page. Archived Version. Capture of Live Systems Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail

More information

By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting

By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting Office 365 ediscovery Background and Glossary By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting Background What is Office 365? It is a cloud-based service providing

More information

Hosted Services 2018

Hosted Services 2018 Hosted Services 2018 REV: 2 DATE: 081518 Post Office Box 0416 Saint Ansgar, Iowa 50472 Telephone: 855.776.2242 Online: www.triple3.co HOSTED SERVICES Page 1 of 3 HOSTING SERVICES (HostIt!) Website Hosting

More information

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

12 Minute Guide to Archival Search

12 Minute Guide to  Archival Search X1 Technologies, Inc. 130 W. Union Street Pasadena, CA 91103 phone: 626.585.6900 fax: 626.535.2701 www.x1.com June 2008 Foreword Too many whitepapers spend too much time building up to the meat of the

More information

E-Discovery Challenges and Message Archiving Solutions. Jon Neiditz 1 Nelson Mullins Riley & Scarborough

E-Discovery Challenges and Message Archiving Solutions. Jon Neiditz 1 Nelson Mullins Riley & Scarborough Jon Neiditz 1 Nelson Mullins Riley & Scarborough This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756

More information

AUDITING FOR PERSONALLY-OWNED DEVICES

AUDITING FOR PERSONALLY-OWNED DEVICES Digital Forensics TECHNICAL ARTICLE AUDITING FOR PERSONALLY-OWNED DEVICES Warren Kruse, CISSP, CFCE, EnCE, DFCP Vice President for Digital Forensics Auditing for Personally-Owned Devices Bring Your Own

More information

Employee Departure Checklist

Employee Departure Checklist Employee Departure Checklist Departing employee's name: Departure date: Supervisor's name: Employee to be terminated: Yes No DO NOT NOTIFY EMPLOYEE OF THIS LIST IF YES Person responsible for completing

More information

Archiving Market Update

Archiving Market Update The Radicati Group, Inc. www.radicati.com Email Archiving Market Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright September 2010, Reproduction Prohibited 9:30 am, PT September

More information