ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP

Similar documents
Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Federal Rules of Civil Procedure IT Obligations For

The Trail of Electrons

Community Unit School District No. 1. School Board

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

Developing an All About Me folder will enable you to write down and store important information about your life.

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

CHANGING KNOWLEDGE, ATTITUDE AND BEHAVIOUR TOWARDS LIFE, AGE, DEATH AND LOSS

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte

GOOGLE VAULT AND SPANNING BACKUP

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

E-DISCOVERY SEARCH COMPETENCE

Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

Enterprise Vault & e-discovery

January 17, 2013 CLE 1 General Credit Presented to: Association of Corporate Counsel

UNCLASSIFIED. Mimecast UK Archiving Service Description

Certified Digital Forensics Examiner

What every attorney should know about E-security Also, ESI

SPRING-FORD AREA SCHOOL DISTRICT

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs

8/28/2017. What Is a Federal Record? What is Records Management?

CLEANING OUT THE DATA CLOSET

Guide. A small business guide to data storage and backup

Managing Your Record Retention Policy Safely

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Cyber Security and Data Management

Southington Public Schools

CIS 444: Computer. Networking. Courses X X X X X X X X X

Vendor Fraud. Goals of Presentation. Detection and Investigation

Practical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Matt Danner Flashback Data

Top 10 Mistakes to Avoid When Creating Productions

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

Although many business owners think that Virtualization and Disaster Recovery (DR) are two separate services, the

Certified Digital Forensics Examiner

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

10 Hidden IT Risks That Might Threaten Your Business

Data Breach Preparedness & Response

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Emerging Trends in Records Management Technology. Jessie Weston, CRA 2018 MISA Conference October 11-12, 2018

Defensibility: The Dirty Little Secrets of ediscovery

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations

PROFILE: ACCESS DATA

What s Old Is New A Peek At Concordance Andy Kass

SAMPLE LITIGATION HOLD NOTICES

Forensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION

Security Andy Kass. Now, Security:

The Migration HANDBOOK

Mobility Policy Bundle

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

The Legal Health Record and E-Discovery: Where You Need to Be

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

E-Discovery in the US: Overview

Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Records Information Management

Cloud Computing Lectures. Cloud Security

Shielding the Organization from Data Risk & E- Discovery Failures

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Eliminating the Blame Game: Creating your Company Strategy for Documented Defense

EADS up. stop think connect

WHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR.

SOARING THROUGH THE CLOUDS IT S A BREEZE

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Technology in Litigation:

Data Breach Preparation and Response. April 21, 2017

Preservation of Electronic Records for Litigation University Operations - Administrative

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering

Law Prac ce Management MCLE Mee ng ARC May 27, 2014

How to Take Advantage of the Cloud for ediscovery

A Litigator's Guide to Going Native

XP: Backup Your Important Files for Safety

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

Checklist and guidance for a Data Management Plan, v1.0

The State of E-Discovery: An Overview of State & Uniform Rulemaking Efforts

Excerpt from Best Practices Guide for ESI Pretrial Discovery - Strategy and Tactics ( ), ESI Discovery, Type and Storage.

Management Case Study. Kapil Lohia

Preserving Your Genealogy. Hope N. Tillman & Walt Howe Charlestown June 10, 2016

Disaster Preparedness + Cloud Computing. Jack Newton CEO + Founder Clio

Linking Using TM Connect from the Microsoft Outlook Program. Presented by: Jennifer M. Ramovs, Esq. Accellis Technology Group

What to do if your business is the victim of a data or security breach?

Components and Considerations in Building an Insider Threat Program

Security Policies and Procedures Principles and Practices

Forensic Discovery By Wietse Venema, Dan Farmer READ ONLINE

Mobile Device Investigations: From Android to iphone and Back. February 2017

The Table Privacy Policy Last revised on August 22, 2012

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

YADTEL - Privacy Information INFORMATION WE COLLECT

Top Five Privacy and Data Security Issues for Nonprofit Organizations

Transcription:

ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP 713-752-4200

Fun Facts to Know and Tell GHOST/MIRROR: Complete bit by bit copy of a drive. (Not just copying data; actually reproducing the hard drive.) LEGACY: Information from older systems no longer actively supported and not easily accessible. METADATA: Automatically created identifying information describing the history, tracking or management of an electronic file; linked to the file, but not visible when viewing the file. NATIVE: File format for a particular software (i.e..doc for MS Word;.xls for MS Excel, etc.). 2

Know Your Client (and their client) Understand the hierarchy Who is responsible? Do they need expert help? Tour the facility What is their architecture? Legacy systems Proprietary software Hardware laptops, smartphones, etc. 3

Preservation Process - Plan Anticipation of Litigation Notice to Client Identify Witnesses/Key Players IT Legal HR Witnesses Auto Delete Policies - Network Architecture - Departed Employees - Backup Procedures - Initial, cost effective steps to preserve - Competency - Documentation Employee hold notice Compliance Reissue notice Consider Forensic Collection - Bad Actors - Criminal? - Risk Departing Employees - Policy for Departing Employees - Work Data - Home Data - Personal email Accounts - PDAs Third Parties 4

Litigation HOLD, Seriously If the attorney work product privilege attaches, so does the duty to preserve. Tell every department: IT, Legal, HR, etc. Be SPECIFIC as to the information to be preserved. Monitor and document compliance. Disable automatic deletion* *BUT remember the safe-harbor (37(e)) for pre-suit deletions 5

Pre-discovery Collection Make sure you are working with competent employees. Self-collection is subject to attack. Find independent collection/storage. Never offer to secure the data yourself and do not have e-mails forwarded to you. (You should work from a copy.) Don t assume that everyone knows the obvious (e.g. make sure everyone understands the meaning of document ). 6

Internal Process Workflow Data Collection Received Internal Processing Intake - Materials logged - Evidence ticket created - Evidence mounted Analysis - Create working copy - Analyze file types - Submit to attorney Processing - ESI Preparation - Dedupe and Filter - Exception handling - Quality control Review Production 7

Avoid Overproduction Preserve ALL E-mail boxes Key hard drives Tape back up Collect SOME Review SOME Produce LESS Only what they ask for Only what is reasonably accessible Preserve Collect Review Produce 8

Reasonably Accessible Most Accessible Active data (e.g. hard drives in use, on-line) Offline archives (e.g. indexed tapes) Near line data (e.g. CD s, flash drives) Least Accessible Offline storage (e.g. disaster recovery tapes) Erased or fragmented files (e.g. deleted files) Legacy data (e.g. for systems no longer in use) 9

Speaking with the Enemy Protective order Privilege waiver: Claw Back Quick Peek Format and preservation of ESI. Personnel, subject matters and search terms. 10

Pesky Third Parties Who else has your client s documents? Are you gathering data from another client of yours? Bank, Medical (and other) privacy laws Requests to third parties need to be narrow. 11

Something WILL Go Wrong Rogue or forgetful employees LOTUS Notes You ll forget if you do not write it down The data you forget could be your own Don t forget about PAPER! 12

Texas Rule 196.4: They re not all Federal Cases Specifically ask for electronic or magnetic data. Must produce what is reasonably available. Requesting party bears the cost. Weekley Homes (295 S.W.3d 309) Courts must balance the benefit with the burden. Sensitive information must be protected. Look to FRCP for guidance. 13

You can ediscover some evidence on your own Aggregators Addictomatic.com Blogpulse.com Boardreader.com Omgili.com Tweetbeep.com Twitrratr.com Tweetdeck.com Archive.org (Wayback) People Finders ZabaSearch.com Pipl.com Wink.com Zoominfo.com Google.com Peoplefinder.com Spokeo.com 411.com Whowhere.com Incriminating photos Incriminating posts, tweets, etc. Mood indicators Lists of friends 14