Shielding the Organization from Data Risk & E- Discovery Failures

Similar documents
costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

Achieving & Maintaining E-Discovery Fitness

Law Prac ce Management MCLE Mee ng ARC May 27, 2014

Bring Your Own Device (BYOD)

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

Meta-Discovery Presents Challenges for Producing Parties

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

BUILT FOR THE STORM. AND THE NORM.

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

Solutions Technology, Inc. (STI) Corporate Capability Brief

CONFLICT OF INTEREST SYSTEMS

CLOUD COMPUTING BY DENNIS KENNEDY

Optimisation drives digital transformation

Managing Your Record Retention Policy Safely

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

Playing in the Big (Data) Leagues: Consumer Data Mining Data Privacy and Compliance

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics

Measuring Your. E-Discovery Program. Against Industry, 2015

Deloitte Discovery Caribbean & Bermuda Countries Guide

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte

A Global Look at IT Audit Best Practices

VMware Cloud Operations Management Technology Consulting Services

Victor Stanley and the Changing Face

Securing Digital Transformation

Section One of the Order: The Cybersecurity of Federal Networks.

Kroll Ontrack VMware Forum. Survey and Report

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

Google Cloud & the General Data Protection Regulation (GDPR)

R E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Uptime and Proactive Support Services

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Cloud Strategies for Addressing IT Challenges

locuz.com SOC Services

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

MNsure Privacy Program Strategic Plan FY

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Education Brochure. Education. Accelerate your path to business discovery. qlik.com

Cloud solution consultant

Subject: University Information Technology Resource Security Policy: OUTDATED

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

DeMystifying Data Breaches and Information Security Compliance

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

New CEPIS Mission

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Cloud solution consultant

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Cisco Spark. Questions? Use Cisco Spark to communicate with the speaker after the session. How

General Data Protection Regulation (GDPR) The impact of doing business in Asia

7 Ways to Save Big Money on ediscovery

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

White Paper. Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection

Department of Management Services REQUEST FOR INFORMATION

AACE Certification Background, Overview and Process Rocky Mountain Section September 22, Ken Cressman EVP PMP CCP Robert Van Gundy PMP PSP EVP

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

The Migration HANDBOOK

Enabling Innovation in the Digital Economy

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Top Ten Tips for Managing e-discovery Vendors

Avanade s Approach to Client Data Protection

Three Common Techniques for E-Discovery Preservation

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

2015 HFMA What Healthcare Can Learn from the Banking Industry

PLEASE NOTE. - Text the phrase MICHAELBERWA428 to the number /23/2016 1

Transform Your Enterprise Search and ediscovery on the AWS Cloud.

Overview. Business value

Design Build Services - Service Description-v7

ForeScout Extended Module for Splunk

CA Services Partner. Implementation Enablement. Eugene Banks FY18

ESTABLISHING THE PILLARS. of a Successful Data Governance Program

CLOUD COMPUTING READINESS CHECKLIST

Cyber Risks in the Boardroom Conference

Table of Contents. Why Get Secure Messaging? Secure Messaging Business Advantages

Saving Time Amanda McPherson, CCBIA Vice President/Internal Audit Manager Colorado East Bank & Trust

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

Cybersecurity. Securely enabling transformation and change

Symantec Document Retention and Discovery

Trustwave Managed Security Testing

Embedding Privacy by Design

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Autofill and Other Disasters: The Ethics of Inadvertent Disclosures

deep (i) the most advanced solution for managed security services

Transcription:

Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America, Inc. Matthew Fisher, Global Head of Records and Information Management, Diageo North America, Inc. Moderator: Jason Ray, Managing Director, FTI Technology legalweekshow.com legaltechshow.com #Legalweek17 #Legaltech

Audience Poll #1 Where do you work? Choose one: 1. Corporate/In-House 2. Law Firm 3. Service Provider 4. Other 2

Audience Poll #2 What is your role? Choose one: 1. Lawyer 2. Litigation Support 3. Compliance/Security 4. IT/Technologist 5. Paralegal 6. Consultant 7. Other 3

Computing Paradigm s Changes

Creating Chaos in the Enterprise Technical Diversity A new Apple App is submitted for approval every two minutes New companies and new applications appear faster than packaged software can be modified Minimal IT expense, instant scalability, and (almost) free software Workplace Changes Mobile, global workforce puts new demands on data storage and access + = Lines blurring between professional data owned by a company or by an individual Many users do not know how to (or want to) maintain multiple identities Lack of Corporate Control IT and Legal departments do not know their data universe Users can easily move, share or delete data Collection tools cannot keep pace with new applications

Legal Requirements: Not a priority for public app developers Critical features for legal compliance and discovery are often missing or unreliable Rapid changes targeted at the key customers break tools used for legal management Every system has unique challenges in accessing information Every messaging systems has individual interfaces and logging mechanisms Apps often have no real search capability and do not index external links or attached files Email systems and archives (including Google and evault) do not support complex legal searches 6

Today s Biggest Data Risks Hacks, data leaks, privacy violations Migration to cloud and especially O365 Shadow IT Unchecked data volumes Non-traditional data types and sources BYOD/Mobile Texting and Private Messaging Work Collaboration Platforms Social media Incomplete data preservation efforts 7

Audience Poll #3 Which of the following do you think creates the biggest data risk? Choose one: 1. Hacks/leaks 2. Migration to cloud and especially O365 3. Shadow IT 4. Unchecked data volumes 5. Non-traditional data types and sources 6. Incomplete data preservation efforts 8

Cost vs Risk Balance Eliminating risk Sometimes to the detriment of cost-savings Where is the middle ground? Keeping costs down Cost pressure is bad and getting worse 9

Audience Poll #4 In today s climate, which is more important; eliminating risk or controlling cost? Choose one: 1. Eliminating Risk 2. Controlling Cost 10

In-House Legal Department - Recommended Best Practices Know your systems Where/what/how much/who manages How are they organized and used? Knowing your organization = lower costs and higher value information Make regular data deletion a part of your process Routine and consistent remediation Less volume and less risk More up to date knowledge of business process Train your staff on data best practices Don t text or use chat apps for business processes Keep personal and company data separate on BYO devices What does Litigation Hold mean and what are the expectations around it? Have a playbook for when litigation is contemplated Have a standard, vetted process for 80-90% of cases and treat the 10-20% outliers on an individual basis Make sure affirmative documentation is part of that process Custodian interviews are key To control scope and target high value information Employ a baseline set of questions plus customized queries for specific matters Especially important for cases involving mobile, app and chat data 11

Audience Poll #5 Which of the following do you currently utilize? Choose all that apply: 1. Systems/data map 2. Regular data remediation 3. Staff training on data preservation & litigation hold 4. Updated BYOD policy 5. Playbook for data handling during litigation 6. Custodian interview template 12

Outside Counsel Recommended Best Practices Close coordination and collaboration between client and firm Be clear on methods and scope Share documentation for litigation hold, preservation and collection Define clear roles and responsibilities Have a baseline e-discovery process Have a summary description of your baseline process than can be shared with your client Make sure the process has appropriate controls When dealing with clients unused to litigation, provide additional information Field a team with the right tools and skills Key team members with enough training and experience that you would be comfortable having them testify Able to focus on the case to ensure success Engage specialists for case specific needs 13

Consultants & Vendors - Recommended Best Practices Clear and consistent communication between law firms, vendors and clients is key Clients included on emails to counsel at a minimum during scoping, preservation and collection Affirmative documentation of all specifications and controls Clear approvals of all collection and culling decisions Minimize surprises Regular updates about budget estimates and requirements Frequent cross checks to identify process gaps Proactive follow up on pending decisions and actions Find efficiencies Listen to requirements and propose solutions instead of just executing instructions Recommend methods to reduce costs including culling, analytics, TAR, or early fact finding approaches Move data to near line or offline when possible to reduce unnecessary hosting 14

Audience Poll #6 Which of the following do you currently utilize? Choose all that apply: 1. Summary description of baseline processes for data management during litigation 2. Documented specifications and controls on your current data collection/management process 3. Regularly-scheduled, consistent updates between client, law firm and consultant/vendor? 4. Documented process for cross-checks, decisions and approvals for data management during litigation 15

Ethical Considerations What level of technological expertise should a lawyer reasonably be expected to have in 2017? What types of e-discovery practices or omissions could put a lawyer in danger of violating these rules? ABA Model Rules: To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. California Ethics Opinion: Attorneys handling e-discovery should be able to perform (either by themselves or in association with competent co-counsel or expert consultants) the following: initially assess e-discovery needs and issues, if any; implement/cause to implement appropriate ESI preservation procedures; analyze and understand a client s ESI systems and storage; advise the client on available options for collection and preservation of ESI; identify custodians of potentially relevant ESI; engage in competent and meaningful meet and confer with opposing counsel concerning an e-discovery plan; perform data searches; collect responsive ESI in a manner that preserves the integrity of that ESI; and produce responsive non-privileged ESI in a recognized and appropriate manner. 16

Q&A 17

Thank You 18