January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel
|
|
- Hilary Stephens
- 5 years ago
- Views:
Transcription
1 January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel
2 Current Sources for Collection & Forensics Laptops, Desktops, Tablets Virtual Machines Cell Phones Network Shares CDs/DVD, Thumb Drive Social Media Webmail Cloud storage Back-up Tapes
3 Corporate Network Architecture
4 Duty to Preserve & Legal Holds
5 Duty to Preserve Once an entity reasonably anticipates litigation It must suspend its document destruction policies Zubulake IV: service of complaint is the latest possible date the duty to preserve may attach Recent Seventh Circuit (Pradaxa) decision supports the reasonable anticipation doctrine Court found that the duty to preserve arose after the at-issue information was destroyed in accordance with Defendant s document retention policies and that an adverse inference was not warranted. The duty to preserve is triggered only when a litigant knew or should have known that litigation was imminent (at least in the Seventh Circuit). In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., MDL No. 2385, 2013 WL (S.D. Ill. Sept. 25, 2013)
6 Litigation Holds Notify your response team Send an immediate notice of the Litigation Hold, including: Instruction to all impacted employees and IT Department to save e- mail and electronic documents, as well as paper files Broad description of possibly relevant documents (Wiginton v. CB Richard Ellis, Inc., 2003 U.S. Dist. LEXIS (N.D. Ill., Oct. 24, 2003). Suspend deletion policies for: Custodians identified or known to be relevant Servers, clouds, wikis, collaboration spaces, etc. Turn off automatic deletion defaults
7 Permissible Loss, Damage, Alteration or Overwrite of ESI? FRCP 37 (e) & Cal. C.C.P. govern Absent exceptional circumstances, a court may not impose sanctions under these rules for failing to provide [ESI] lost as a result of the routine, good-faith operation of an electronic information system. Five new CA provisions are based on FRCP 37(e) - [A]bsent exceptional circumstances a court may not impose sanctions... for failing to produce [ESI] lost, damaged, altered, or overwritten as a result of the routine, good faith operation of an electronic information system See also: C.C.P (l)(1), (i)(1), (d)(1), (j)(1) and (d)(1) Rule 37(f) responds to a distinctive and necessary feature of computer systems - the recycling, overwriting, and alteration of [ESI] that attends normal use.... Even when litigation is anticipated, it can be very difficult to interrupt or suspend the routine operation of computer systems to isolate and preserve discrete parts of the information they overwrite, delete, or update on an ongoing basis, without creating problems for the larger system. The Committee Note re the comparable F.R.C.P. Rule 37(f), Report of the Judicial Conference Committee on Rules of Practice and Procedure (Agenda E-18, Rules, September 2005) at 32.
8 Where do you start. Who are the relevant custodians? What is the key subject matter? When - What are the relevant dates? Where is the data stored? What types of data? What types of metadata?
9 Collections
10 Collections Interview Process 1. IT Questionnaire a. What did IT say about the potential data sources? 2. Custodian Questionnaire a. What did the end user say about where they store data?
11 Interview IT first when possible Provide IT the questionnaire regarding possible data sources. Have them review it prior to their interview. There are many times when IT knows of data sources or legacy data sources that could be overlooked. Ask questions about backups even though you may not need them.
12 IT Collection Questionnaire Custodian Information o Key Custodians o Key IT Personnel ESI Systems o Asset Library o Work Stations o Servers o Cloud Computing o Data Map & Protocols o Data Map o Data Retention & Destruction Other Media o External Media o Back-up Media o Personal Devices Functional Requirements o Multi Media Preservation or Litigation Holds o Efforts undertaken to date o Any suspension of document destruction practices, etc. Case Documentation o Pleadings o Production Protocol o Discovery Orders/Rulings Non Discoverable Data Sources o Undue Burden Miscellaneous o Safe Harbor o Privilege Terms o Claw Back
13 Data Map What is a data map? A roadmap of the known data locations for a specific matter. Laptops Network Shares Backups The collection methodology can easily be generated from the known data locations.
14 Data Map The following is a summary of the main sources of electronicallystored information (ESI): Employee Workstations o There are 25 Windows laptops. o Employees store local Outlook archives as well as native files on their local workstation. o Their My Documents folder is synced to a file server. Server Shares o There are individual and group file shares. The estimated volume of data is 250 to 300 GB s. Server o Location A (City A) is running a Microsoft Exchange Server o Location B (City B) is running a Microsoft Exchange Server o Location A is running a Blackberry Enterprise Sever (BES) to support their Blackberry users. o Location A uses RedGate for archiving. ERP Server o Company X is running Microsoft Dynamics NAV (Navision). This isan enterprise resource planning software product that is intended to assist with finance, manufacturing, customer relationship management, supply chains, analytics and electronic commerce.
15 Custodian Interview Based on the information you learned from IT, you can now customize the Custodian Questionnaire. The questionnaire will list common data sources used within the company as well as data sources that are commonly used for personal use. With BYOD, the lines are blurred between corporate assigned devices and personal devices.
16 Custodian Questionnaire If you have been contacted by Widgets Legal in connection with the Giants matter, there is a document collection process that is initiated in order to collect all relevant documentation related to this case. The following areas should be checked for any relevant materials: 1. Any and all computing and electronic devices used by a custodian during the course of employment at Widgets including: all Widgets assigned laptops, (shared) workstations or personal devices used to perform work duties. 2. Any network drive used for storage of materials. Please provide a listing of the folders that may contain relevant material. Here are some examples of network drives: H: Drive (Home Directory) W: Drive (Share Files) S: Drive (Employee Share) 3. All held by a custodian in any of the following locations: Lotus Notes Mailbox Lotus Notes (NSF) Message Files (EML) or other formats 4. All hard copy workbooks, notepads, files or any other written documentation in the possession of a custodian. 5. Any internal shared portals created, maintained, edited, or used by a custodian. For example: SharePoint Sites Please provide a URL of the site(s) you use Amazon Sites Please provide a URL of the site(s) you use 6. Any SaaS/ASP s maintained, managed, or used by a custodian. For example: Marketing Materials Administrative SAP Financial SAP Sales 7. Any PDA or portable media devices. For example: PDA USB Thumb Drive USB Hard Drive CD/DVD 8. Any personal computing devices not owned by Widgets that were used for work related activities. Virtual Drop Boxes (Box.net) Home or Personal Computer FTP Sites
17 Collection Options Guided Self Collection Traditional Collection Methods Full Forensic Images Targeted Collections Web Mail (POP vs IMAP) Network Server Shares SaaS Applications Cell phones, PDA, Smart Phones, PDA & Tablets SharePoint & Web Portals Personal Devices Remote Collection Methods Selective Forensic
18 Misguided Self Collection How not to do it. National Day Laborer Facts - Plaintiffs sought information from several U.S. Government Agencies; issued FOIA requests Defendant Agencies missed initial production deadline; Judge Scheindlin ordered new production drop dead date Agencies searched through records/esi and produced in accordance with new deadline. Plaintiffs argued that the searches didn t include custodians likely to possess relevant data, and that the search methodology employed on the custodians they did search wasn t adequate. The court reviewed the defendant Agency s retrieval process and agreed with the plaintiffs, noting: [I]t [is] abundantly clear that a court cannot simply trust the defendant agencies unsupported assertions that their lay custodians have designed and conducted a reasonable search... National Day Laborer Organizing Network et al v. United States Immigration and Customs Enforcement Agency, et al U.S. Dist. Lexis (SDNY, July 13, 2012)
19 Safe Methods of Self Collection: Training, Tools & Repeatable Standard Operating Procedures (SOPS) Examples of Tools: EnCase Portable Self Collection Nuix Collector Custodian Self Collection Examples of Self Collection SOPs: Self Collection of Local Outlook Archives
20 Traditional Collection Methods Forensic Collections Bit for bit copy of the original. Logical Collections Robocopy FTK AD1 File EnCase L01 Social Media X1 Cellular and Tablet Cellebrite
21 Remote Collections Full Forensic Images EnCase Portable Live Collection with FTK Selective File Collections with Total Discovery
22 Forensically Sound Method Change of Custody Preserves integrity of the data (hash values) Repeatable process Defensible
23 Chain of Custody
24 Hash Value Integrity
25 Challenges posed by Solid State Drives (SDD)
26 What is the challenge? Rotational Media Drives (HDD): Data from a deleted file is accessible Data is static and consistent Drive hash is always consistent Solid State Drives (SSD): Data from erased file may disappear immediately or over time Data changes over time Drive hash may not always be consistent
27 What is an SSD? a solid state disk is a high-performance plug-and-playstorage device that contains no moving parts. SSD components include either DRAM or EEPROM memory boards, a memory bus board, a CPU, and a battery card. An SSD (solid-state drive or solid-state disk) is a storage device that stores persistent data on solid-state flash memory. Advantages: fast, robust, low power Disadvantages: price per GB, lifespan
28 Types of SSD Volatile Memory (RAM) Static RAM Dynamic RAM Non Volatile Memory Flash (NOR, SLC, MLC, emlc) F-RAM ReRAM M-RAM PRAM
29 Best Practice Understand the differences between HDD and SSD imaging You may only get one chance Know the limitations of your lab/technology Litigation Hold Letters Consider specific instructions for SSD ESI requests Require immediate imaging of devices Delays? STOP! Power off equipment and get a hold of a specialist ESI will potentially degrade with any attempts
30 Overview Preservation Effort Duty to preserve beings with reasonable anticipation of litigation, not with a filed complaint Litigation Hold Document the entire process from custodian interviews, to responses Interviews Collaborate with IT to identify potential data sources Custodian interviews tailored to help them understand what you are looking for laymen's terms Collect the data Self collection, forensic, logical, targeted, remote, etc. Document all processes, procedures and parties who may have been involved in these efforts!
31 Any Questions? Adam Wells, Vice President ediscovery Consulting, Jack Grimes, Director of IT,
Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.
Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case
More informationSAMPLE LITIGATION HOLD NOTICES
Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationElectronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson
Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your
More information3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?
Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What
More informationEnterprise Vault & e-discovery
Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing
More informationIRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]
IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The
More informationManaging Your Record Retention Policy Safely
Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients
More informationCommunity Unit School District No. 1. School Board
Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationE-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS
E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court
More information10 th National Investigations Symposium
10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5
More informationDecember 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION
December 6, 2017 VIA E-MAIL Senate President Joe Negron Office of the Florida Senate 404 S. Monroe Street Tallahassee, Florida 32399-1100 Negron.joe@flsenate.gov RE: Rachel Perrin Rogers NOTICE OF DEMAND
More informationJustice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information
Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of
More informationCyber Security and Data Management
Cyber Security and Data Management THE EVOLVING LAW AND PRACTICE ON DELETING LARGE VOLUMES OF OLD DATA TO REDUCE CYBER RISK Presented by Avi Gesser, Davis Polk Litigation Partner Gabriel Rosenberg, Davis
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationProposed Spoliation Rules Would Impact Apple-Samsung Trial
Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung
More information25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators
25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.
More informationCARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose
CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More information8/28/2017. What Is a Federal Record? What is Records Management?
Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationPreservation of Electronic Records for Litigation University Operations - Administrative
Preservation of Electronic Records for Litigation University Operations - Administrative EWU Policy 201-02 Effective: December 2, 2008 Authority: Board of Trustees Proponent: University President Summary:
More informationArchive to the Cloud: Hands on Experience with Enterprise Vault.cloud
Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Description See first-hand how Enterprise Vault.cloud, Symantec's hosted archiving service, can help address mailbox management, email
More informationPinpoint Labs ESI Collection Tools
Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationEliminating the Blame Game: Creating your Company Strategy for Documented Defense
Eliminating the Blame Game: Creating your Company Strategy for Documented Defense Welcome Presenter: Wesley Ballance Sales Engineer Viewpoint Construction Software Wesley Ballance is a sales engineer with
More informationIllinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.
E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will
More informationCase 1:07-cv HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:07-cv-01707-HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA CITIZENS FOR RESPONSIBILITY AND ETHICS IN WASHINGTON, v. Plaintiff, Civil Action
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More information5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.
Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,
More informationTake control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
More informationSouthington Public Schools
3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction
More informationIMPORTANT NOTICE: This Publication Has Been Superseded. See the Most Current Publication at
IMPORTANT NOTICE: This Publication Has Been Superseded See the Most Current Publication at https://thesedonaconference.org/publication/jumpstart_outline THE SEDONA CONFERENCE JUMPSTART OUTLINE : QUESTIONS
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationE-Discovery in the US: Overview
Resource ID: 1-503-3009 E-Discovery in the US: Overview ANA TAGVORYAN, BLANK ROME LLP, JOSHUA BRIONES, MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND POPEO, P.C., AND BROWNING E. MAREAN (DECEASED), DLA PIPER
More informationManagement Case Study. Kapil Lohia
Email Management Case Study Kapil Lohia ARMA Survey on Information Management Prepared or Not? > Majority of RIM professionals feel unprepared when it comes to email management 72% for ediscovery - 68
More informationData Destruction: Easier Said than Done
Data Destruction: Easier Said than Done Carl Winchester, Mayer Brown Adam Hansen, Sonnenschein Bill Dean, Sword & Shield Moderator: Rachelle Rennagel, Esq., Sheppard Mullin Agenda Data Destruction Drivers
More informationIncident Response Data Acquisition Guidelines for Investigation Purposes 1
Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response
More informationTHE SEDONA CONFERENCE JUMPSTART OUTLINE :
T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationADVANCED ARBITRATION ACADEMY E Discovery Segment
August 8 12, 2016 ADVANCED ARBITRATION ACADEMY E Discovery Segment Judge Judith O. Hollinger Program in Alternative Dispute Resolution USC Gould School of Law Dealing with E-Discovery Issues in Arbitration
More informationMaintain Data Control and Work Productivity
DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud
More informationThis Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data
More informationApplications for Preservation and Production in our Digital World
Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background
More informationPolicy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents
Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information
More informationDevelopment of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit
Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,
More informationLegal Developments in ediscovery: Implications for Security Management
Legal Developments in ediscovery: Implications for Security Management Abstract Richard S. Swart Utah State University This paper defines ediscovery and reviews recent court cases and amendment to Federal
More informationFinding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics
Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing
More informationNorth American Market for Electronic Content Archiving
An Osterman Research Industry Survey Report January 2016 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 206 683 5683 Tel: +1 206 905 1010 info@ostermanresearch.com
More informationMEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL
National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David
More informationAshford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION
Ashford Board of Education Ashford, Connecticut Series 2000 Administration POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I. POLICY The Board of Education (the Board ) complies with all
More informationInstitute of Technology, Sligo. Information Security Policy. Version 0.2
Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date
More informationMinnesota Government Data Practices Act and Litigation Holds In An Electronic Environment
Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment MACA-MCHRMA Fall Conference Ruttger s Bay Lake Lodge September 10, 2015 1 PRESENTED BY: Karen Clayton Ebert MCIT
More informationEXAM Administration of Symantec ediscovery Platform 8.0 for Users. Buy Full Product.
Symantec EXAM - 250-412 Administration of Symantec ediscovery Platform 8.0 for Users Buy Full Product http://www.examskey.com/250-412.html Examskey Symantec 250-412 exam demo product is here for you to
More informationediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP
ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP 713-752-4200 Fun Facts to Know and Tell GHOST/MIRROR: Complete bit by bit copy of a drive. (Not just
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationThe Legal Health Record and E-Discovery: Where You Need to Be
The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.
More informationSYSTEM SPECIFICATIONS GUIDE
SYSTEM SPECIFICATIONS GUIDE AD Enterprise NETWORK INVESTIGATION AND POST-BREACH ANALYSIS v6.5 Revision (May 8, 2018) www.accessdata.com Contents AccessData Enterprise Overview and System Specifications
More informationTHINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte
Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationMinimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering
From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationLaw Prac ce Management MCLE Mee ng ARC May 27, 2014
Law Prac ce Management MCLE Mee ng ARC May 27, 2014 11:45 AM Noon Sign In/Lunch 11:55 AM Noon Welcome/Introductions Michael Calabrese, Chair Charles Wentworth, Co-Chair Noon 1:00 PM Program Discovering
More informationARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING
EMAIL ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING 2013 2014 2015 2016 2017 Worldwide Email Accounts (M) 3,899 4,116 4,353 4,626 4,920 Business Email Accounts (M) % Business Email Accounts
More informationAddendum 1. APPENDIX B - Technical Information / Requirements Records Management Solution Capabilities. Questions. Number
APPENDIX B - Technical Information / Requirements 6.01 Records Management Solution Capabilities s 6.01.01 Is your solution available for cloud and on premise? How does the solution integrate with SharePoint
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationScientific Working Group on Digital Evidence
Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or
More informationMichael McCartney, President
Michael McCartney, President Litigation Landscape Computer Forensics Overview Forensic Data vs. Non-Forensic Dangers of Hard Drives Forensic Process HR Escrow Proactive Forensics Pit falls to avoid 1 650
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationTop 8 Healthcare Archiving and e-discovery Requirements
White paper Top 8 Healthcare Archiving and e-discovery Requirements www.proofpoint.com Table of Contents Overview... 3 Top 8 Healthcare Requirements... 3 1. Effective and Defensible E-discovery... 3 Search
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More information6/4/2015. ESI: Is It Contagious? James L. Gale, Special Superior Court Judge Thursday, June 25, 2015 TOPICS FOR DISCUSSION MYTH OR REALITY?
ESI: Is It Contagious? James L. Gale, Special Superior Court Judge Thursday, June 25, 2015 (with special thanks to Katie Bradshaw) TOPICS FOR DISCUSSION A Primer on ESI Why Should Judges Care? Standards
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance
More informationTop 8 Healthcare Archiving & ediscovery Requirements
Top 8 Healthcare Archiving & ediscovery Requirements John Wang Sr. Product Marketing Manager threat protection compliance archiving & governance secure communication Contents Overview...3 Top 8 Healthcare
More informationOverview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving
EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury
More informationSPRING-FORD AREA SCHOOL DISTRICT
No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In
More informationUnderstanding Illinois New Ediscovery Rules
Illinois Association of Defense Trial Counsel Springfield, Illinois www.iadtc.org 800-232-0169 IDC Quarterly Volume 24, Number 3 (24.3.60) Feature Article Steven M. Puiszis Hinshaw & Culbertson LLP, Chicago
More informationTexas A&M AgriLife Research Procedures
Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This
More informationDEFENSIBLE DELETION TO DOWNSIZE YOUR DATA
May 18, 2016 DEFENSIBLE DELETION TO DOWNSIZE YOUR DATA A Roadmap to Better Litigation Preparedness and Records Retention Practices Anthony L. McElynn E*TRADE Chief Compliance Officer Robert Fowler, CIPP/US
More informationArchive Legislation: archiving in the United Kingdom. The key laws that affect your business
Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private
More informationUCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification
University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin
More informationThis version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems
Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail
More informationBy John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting
Office 365 ediscovery Background and Glossary By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting Background What is Office 365? It is a cloud-based service providing
More informationHosted Services 2018
Hosted Services 2018 REV: 2 DATE: 081518 Post Office Box 0416 Saint Ansgar, Iowa 50472 Telephone: 855.776.2242 Online: www.triple3.co HOSTED SERVICES Page 1 of 3 HOSTING SERVICES (HostIt!) Website Hosting
More informationZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More informationData Processing Amendment to Google Apps Enterprise Agreement
Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google
More information12 Minute Guide to Archival Search
X1 Technologies, Inc. 130 W. Union Street Pasadena, CA 91103 phone: 626.585.6900 fax: 626.535.2701 www.x1.com June 2008 Foreword Too many whitepapers spend too much time building up to the meat of the
More informationE-Discovery Challenges and Message Archiving Solutions. Jon Neiditz 1 Nelson Mullins Riley & Scarborough
Jon Neiditz 1 Nelson Mullins Riley & Scarborough This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
More informationCase 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA
Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756
More informationAUDITING FOR PERSONALLY-OWNED DEVICES
Digital Forensics TECHNICAL ARTICLE AUDITING FOR PERSONALLY-OWNED DEVICES Warren Kruse, CISSP, CFCE, EnCE, DFCP Vice President for Digital Forensics Auditing for Personally-Owned Devices Bring Your Own
More informationEmployee Departure Checklist
Employee Departure Checklist Departing employee's name: Departure date: Supervisor's name: Employee to be terminated: Yes No DO NOT NOTIFY EMPLOYEE OF THIS LIST IF YES Person responsible for completing
More informationArchiving Market Update
The Radicati Group, Inc. www.radicati.com Email Archiving Market Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright September 2010, Reproduction Prohibited 9:30 am, PT September
More information