Future Proof Your ediscovery Practices
|
|
- Elvin Lyons
- 8 years ago
- Views:
Transcription
1 FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Barak Cohen, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica Watts, AGC and Discovery Counsel, HP George T. Tziahanas, VP Strategy, HP SaaS
2 Agenda Introductions Rise of the Machines Criminal Investigations in a Digital World Information Border Wars Model of Discovery in the Future
3 RISE OF THE MACHINES
4 History of Discovery Even with the advent of ediscovery ~20 years ago, a majority of relevant discoverable content has been human generated; that is likely to change. Pierson v. Post, 3 Cai. R. 175, 2 Am. Dec. 264 (N.Y. 1805)
5 Rise of the Machines Gartner Analytics Trends: The Internet of Things Really Matters for Communications Service Providers, December 2014
6 Rise of the Machines Phases of the digital revolution Web 1.0: Destruction Web 2.0: User Creation? Wikipedia Launch A 100 fold multiplication in the amount of data is a 10,000 fold multiplication in the number of patterns we can see in that data Philip Evans: Boston Consulting Group Fellow, Ted Talk
7 Rise of the Machines
8 Rise of the Machines Discovery tomorrow will rely less on what people said, and more on what their machines tell us
9 CRIMINAL INVESTIGATIONS IN THE DIGITAL AGE SEARCH FIRST ASK QUESTIONS LATER
10 Government Right to Corporate Data Government has broad rights to obtain corporate data in connection with criminal matters Rights subject to 4 th Amendment and ECPA Generally require facially valid legal process, which varies depending on type of data sought Government may also request Grand Jury or trial testimony from records custodians
11 Government Requests for Data Requests for Your Data Domestic Abroad (e.g., FCPA investigations) Requests for Third Party Data Your vendors or service partners Your customers or clients Requests to Third Parties for Your Data Who has your data? Are they obligated to protect it?
12 More Data More Problems Government may search first ask questions later Recent circuit court decisions support broad, warrantless access to stored data Govt. using third-parties to conduct searches on their behalf (e.g., In re Warrant to Search a Certain Account Controlled and Maintained by Microsoft Corporation, Nos. M9-150, 13-MJ-2814 Govt. using new technologies with unclear precedent (e.g., cell signal tracking in United States v. Skinner, No (6th Cir. 2012)) But SCOTUS says there are limits The 4 th amendment still matters (Riley v. California, 134 S. Ct. 2473, 189 L. Ed. 2d 430, (2014)) See also United States v. Warshak, 631 F.3d 266, 286 (6th Cir. 2010), rejecting warrantless seizure of s
13 ECPA: Obsolete, But Still An Issue ECPA, enacted in 1986, has not aged well. It fails to strike a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement. ECPA fails to account for: Cloud-based services Location data from cellular devices Transactional data Should you provide, or not provide notice, to account holders when you receive a subpoena or 2703(d) order? Is an ECPA search warrant more like a subpoena than a physical search warrant to search premises or seize property?
14 Responding to Government Requests Have a process in place Point person Prompt attention/triage Assess facial validity and identify issues Negotiate to limit scope To contain costs To avoid collateral issues
15 Pick Your Battles Considerations: - PR - Customer Relations - Risk of Poking the Bear - Example: Google NSL fight re: notice to user Some examples from industry: - Reddit refused 42% of government and civil data requests in In 2012, Google received 21,389 government requests for information affecting 33,634 user accounts. Google provided at least some data 66% of the time.
16 INFORMATION BORDER WARS
17 Microsoft Case Summary (In re Warrant) Dec 2013 Magistrate issues a warrant under the Stored Communications Act to Microsoft to produce content and non-content information about a user. The customer s were stored in Ireland on Microsoft servers. The non-content information about the (metadata about the account), is stored in the US. MS objected to producing data stored in Ireland, arguing that the warrant would require an extraterritorial search and seizure of data. The Government responded the issue is whether the content is in MS s custody or control. Magistrate rejected the motion to vacate. Found that warrants issued under the SCA are hybrids part warrant and part subpoena. Therefore the extraterritorial limits on warrants are not implicated and the relevant question is whether the data is in the provider s control. Further the search does not occur until the data is reviewed by US law enforcement, which would not happen until the data is in the US. MS appealed. The District Court upheld the Magistrate s ruling. The case is now before the 2 nd Circuit: 28 technology and media companies, 23 trade associations and advocacy groups and 35 professors of computer science filed legal papers in support of MS s opposition to the warrant.
18 Information Border Wars The US government s unilateral use of a search warrant to reach in another country puts both fundamental privacy rights and cordial international relations at risk. -Brad Smith, Microsoft GC It s a question of control, not a question of location of that information. U.S. District Judge Loretta Preska In this case, no such exposure takes place until the information is reviewed in the United States, and consequently no extraterritorial search has occurred. Magistrate's Decision The refusal of the U.S. Attorney to recognize that the account at issue is located in a foreign jurisdiction and subject to foreign data protection rules is not only offensive to the sensitivities of European citizens but also reinforces the already strong sentiment of many EU citizens that their data is not 'safe' when they use IT services offered by U.S. corporations. Jan Phillip Albrecht, EU MP
19 Not entirely new Societe Nationale Industrielle Aerospatiale v U.S Supreme Court held that a litigant must produce information located overseas even if it violates a blocking statute. Five factor test (1) the importance of the documents to the litigation; (2) the degree of specificity of the request; (3) whether the information originated in the United States; (4) the availability of alternative means of obtaining the information; and (5) the extent to which noncompliance with the request would undermine important interests of the United States, or undermine the interests of the state where the information is located.
20 What is new The Cloud, the WWW, users connected everywhere/ all of the time. Compelling production of someone else s data High sensitivities around the world to privacy concerns
21 Information Border Wars What is location Physical Virtual Access privileges Third-party When will you need information Prior to litigation (broader info. governance) ediscovery Law firm practices
22 Information Border Wars Important Considerations & Questions Companies should have a data map of what is stored in Europe on servers belonging to US cloud providers. Keep it up to date. Does this open demands from foreign countries to US companies that have presence in that country to information kept in the US Contract with cloud providers stipulate that the data must not be accessible from the US. If storing information abroad make it inaccessible in the US? Use partner company so not subject to US law? Encryption of data with customer having only encryption key
23 MODEL OF DISCOVERY IN THE FUTURE (AKA NOW)
24 Model of Discovery in the Future Case Study Facts Large multinational corporation engaged in business in the US, Europe and in Asia was the subject of a significant security breach. Hackers accessed and downloaded large volumes of protected information (PII, PHI, HR, confidential, etc.). In many instances, once downloaded, the data was completely wiped from the company systems. The information was not only stolen, but large parts were published on various public websites and in the press. Eventually the corporation secured its environment, but is now subject to several types of actions.
25 Model of Discovery in the Future Case Study Questions Based on high likelihood of civil and potentially criminal action, what data sources should be preserved? Given the case specifics, must we consider additional, less standard data sources? System Security Settings DNS Logs Server Logs Security Logs System/Security Patch and Update Histories Malware and Virus Protection Software Update and Incident Logs Firewall Logs, etc. Given these additional data sources may be large and mostly unstructured text files, how do they impact discovery (preservation, collection, and review)?
26 Model of Discovery in the Future Additional Questions Where is the Network Boundary? Third-Party or Partner Networks? Propagation of Local Risks? Additional Data Sources? Potential Liability? The U.S. DOJ has issued a subpoena to a third-party service provider hosting your communications information under the SCA; do you intervene? An EU sovereign entity has sent you a letter precluding you from sharing any non-public information transmitted under Safe Harbor in any civil or criminal proceeding; how do you respond?
Future Proof Your ediscovery Practices
FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting
More informationCovington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants
Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants Marney Cheek Kristen Eichensehr Alex Hastings Ed Rippey Agenda Introduction (Rippey) Key Considerations in Cross-Border
More informationRecent Developments in Cybersurveillance
David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information
More informationSTATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION
STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION BEFORE THE SUBCOMMITTEE ON THE CONSTITUTION, CIVIL RIGHTS, AND CIVIL LIBERTIES UNITED STATES HOUSE OF REPRESENTATIVES HEARING
More informationPolicy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE
Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the
More informationBYOD Privacy and Security in Europe
BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,
More informationLSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice
LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice LSSA 2014 1 Use of Internet-Based Technologies in Legal Practice LSSA Guidelines Version 1.0 November 2014 2 Foreword Please
More informationBILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed
BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information
More informationSocial networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.
THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan
More informationTECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of
More informationDOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
More informationWHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH
WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH 1 Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes
More informationE-Discovery in Practice: A Roadmap for Financial Institutions
E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida
More informationPresented by: John Mockler, ITS Kate Dwyer, OLR
Presented by: John Mockler, ITS Kate Dwyer, OLR *Cloud: network of servers in different locations where each server has a different function *Three types of cloud service: *Infrastructure as a service
More informationCorporate Counsel Beware: Limits Of 'No Contact Rule'
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Counsel Beware: Limits Of 'No Contact Rule'
More informationDEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
More informationAGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches.
Leland Corky Dwight, Investigator Louisiana State Police ELECTRONIC ADVANCES AND THE LAW J. J. Williams, Jr., Staff Attorney Louisiana District Attorneys Association JJ@LDAA.ORG AGENDA Tangipahoa Case
More information(2) For production of public records or hospital medical records. Where the subpoena commands any custodian of public records or any custodian of hosp
Rule 45. Subpoena. (a) Form; Issuance. (1) Every subpoena shall state all of the following: a. The title of the action, the name of the court in which the action is pending, the number of the civil action,
More informationBYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074
BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the
More informationPreparing For and Responding to Government Investigations. Presented by Jeffrey Coopersmith
Preparing For and Responding to Government Investigations Presented by Jeffrey Coopersmith Substantive Areas of Government Inquiry Areas Where the Gov t Routinely Conducts Investigations: Securities Fraud
More informationPractical Legal Aspects of BYOD
Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise
More informationUS DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES
US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES May 11, 2012 Bijan E. Eghbal, Paris Browning E. Marean, San Diego Carol A.F. Umhoefer, Paris Agenda I. Overview of US discovery and document
More informationDISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES
DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES By KYL attorneys Elizabeth P. Beazley and Tara B. Voss California Litigation Volume 25 Number 1 2012 This article was previously
More informationNLRB: NxGen Case Management, E-Government and E-Discovery
NLRB: NxGen Case Management, By: James G. Paulsen, Assistant General Counsel, OGC and Bryan Burnett, Chief Information Officer, OCIO, National Labor Relations Board A. Next Generation (NxGen) Case Management
More informationE-Discovery and EU Data Protection laws
Robert Bond robert.bond@speechlys.com Alexander Carter-Silk alexander.carter-silk@speechlys.com IP, Technology & Data Group E-Discovery and EU Data Protection laws Alex Carter-Silk, Partner, IP, Technology
More informationLegal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
More informationThe Duke Conference: Bench-Bar-Academy Distinguished Lawyers Series Protected-Privacy Data Conference
CURRENT APPROACHES TAKEN IN U.S. LITIGATION TO COMPLY WITH POTENTIALLY CONFLICTING U.S. DISCOVERY OBLIGATIONS AND EU AND OTHER FOREIGN DATA PRIVACY STATUTES David W. Ichel, Simpson Thacher & Bartlett Peter
More informationLegal Issues of Forensics in the Cloud
Legal Issues of Forensics in the Cloud About Me Owner, Titan Info Security Group, LLC A Risk Management and Cyber Security Law Firm Partner, OnlineIntell, LLC Protecting online brands and reputation while
More informationAddressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Varun Badhwar Co-Founder; VP of Products & Solution Engineering 1 2013 CipherCloud All rights reserved. Agenda Introduction
More informationDigital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
More informationUNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) This matter is before the court upon the objection by
United States of America, UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) Plaintiff, v. ORDER Michael Duane Hoffman, This matter is before the court upon the objection by
More informationScholarship @ GEORGETOWN LAW. Georgetown University Law Center
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2010 Electronic Communications Privacy Act and the Revolution in Cloud Computing : Hearing Before the Subcomm. on the Constitution, Civil Rights,
More informationVehicle Black Boxes. With every aviation accident involving an aircraft of sufficient
Mary Ellen Morris Miller & Martin PLLC 1200 One Nashville Place 150 Fourth Avenue, North Nashville, Tennessee 37219-2433 Vehicle Black Boxes With every aviation accident involving an aircraft of sufficient
More informationDepartment, Board, Or Commission Author Bill Number
BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain
More informationThe Importance of Privacy & Data Security in a Changing World
Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but
More informationInhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie
Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten MHC.ie Rewriting the Past Oisin Tobin otobin@mhc.ie Agenda 1. Background 2. Findings and impact: a) Jurisdiction b) A
More informationA Brief Overview of ediscovery in California
What is ediscovery? Electronic discovery ( ediscovery ) is discovery of electronic information in litigation. ediscovery in California is governed generally by the Civil Discovery Act. In 2009, the California
More information2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013
1 2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013 CONTEXT 2006 FEDERAL COURT E-DISCOVERY AMENDMENTS The 2006 Federal E-Discovery
More informationLocation and Cell Phone Tracking: Technology, Law, and Defense Strategy
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
More informationInformation For Tenants. About Evictions. And the Court Process
Information For Tenants About Evictions And the Court Process Prepared By: APPALACHIAN LEGAL SERVICES Page 2 "Information About Evictions" 1-800-834-0598 "Information About Evictions" Page 3 If you have
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationUNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015
More informationDISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP Presented by Frank H. Gassler, Esq. Written by Jeffrey M. James, Esq. Over the last few years,
More informationDrafting and Issuing Subpoenas: New Jersey
View the online version at http://us.practicallaw.com/6-569-5426 Drafting and Issuing Subpoenas: New Jersey EZRA ROSENBERG, MICHELLE HART YEARY AND THOMAS J. MILLER, DECHERT LLP, WITH PRACTICAL LAW LITIGATION
More informationOutline to HIPAA presentation
Outline to HIPAA presentation I) Overview of the HIPAA Privacy Rule regulations that relate to obtaining a person s medical records for court proceedings and law enforcement purposes. A) Entities covered
More informationCase 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION
Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION SALT LAKE CITY CORPORATION, a Utah municipal corporation;
More informationCase 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO.
Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO. 05-10037-GAO-1 UNITED STATES OF AMERICA v. GRANT BOYD, Defendant. O TOOLE,
More informationIntroduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery
Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data
More informationWHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT. Presenting the results from BDO s inaugural Inside E-Discovery Survey
WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT Presenting the results from BDO s inaugural Inside E-Discovery Survey 1 ACEDS Membership Benefits Training, Resources and Networking for
More informationElectronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
More informationAssembly Bill No. 5 CHAPTER 5
Assembly Bill No. 5 CHAPTER 5 An act to amend Sections 2016.020, 2031.010, 2031.020, 2031.030, 2031.040, 2031.050, 2031.060, 2031.210, 2031.220, 2031.230, 2031.240, 2031.250, 2031.260, 2031.270, 2031.280,
More informationThe need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
More informationCLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com
More informationIN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)
More informationMASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
More informationAn Investigator Appears: Are You Ready? Presentation Slides
Chapter 1 An Investigator Appears: Are You Ready? Presentation Slides Tom E. Lindley Perkins Coie LLP Portland, Oregon Managing Environmental Enforcement Risk 1 ii An Investigator Appears: Are You Ready?
More informationE-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.
More informationNetwork Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
More informationPrivacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
More informationESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial
ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial February 10, 2016 The Role of Economics in Antitrust Law February 13, 2008 Copyright 2008, The Sedona Conference 1 1 The Sedona
More informationUNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION BRIAN Z. FRANCE, v. MEGAN P. FRANCE, Plaintiff, Defendant. Case No. 3:11-CV-00186 PLAINTIFF S MEMORANDUM OF LAW IN SUPPORT
More informationAntivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
More informationTODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
More informationElectronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.
Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationPROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015
PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015 Introduction The statute creating the Michigan Indigent Defense Commission (MIDC) provides: The MIDC shall implement minimum standards, rules,
More informationSENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen
SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill
More informationCross-Border EDiscovery
Cross-Border EDiscovery Machine translation use cases Given the increasing rate of globalization and risk of regulatory action, the likelihood that organizations will have to contend with cross-border
More informationCounsel must be fully familiar with the Uniform Civil Rules for the Supreme Court 22 NYCRR Part 202.
JUSTICE GERALD E. LOEHR, J.S.C. Rockland County Supreme Court 1 South Main Street New City, New York 10956 Courtroom 1 Tel: (845) 483-8343 Fax: (845) 708-7236 Staff Bruce J. Pearl, Principal Law Secretary
More informationLarge Law Firm structure
Large Law Firm structure Senior Partners ultimate control over the firm Junior Partners all the partners own the firm together Although, how they divide profits depends on their agreement, which factors
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationDigital Evidence Legal Issues and Trends
State of the States Cyber Crime Consortium By Justin Fitzsimmons Program Manager, High-Tech Crime Training Services SEARCH On April 30, 2015, the Office of the Massachusetts Attorney General, along with
More informationASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 539 (Levine) As Introduced February 23, 2015
AB 539 Page 1 Date of Hearing: April 7, 2015 Counsel: Sandra Uribe ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair AB 539 (Levine) As Introduced February 23, 2015 SUMMARY: Authorizes the issuance
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationFriday 31st October, 2008.
Friday 31st October, 2008. It is ordered that the Rules heretofore adopted and promulgated by this Court and now in effect be and they hereby are amended to become effective January 1, 2009. Amend Rules
More informationA Guide to Dealing with Judgement Debt
A Guide to Dealing with Judgement Debt This factsheet explains your legal rights and options and contains contact details for organisations that may be able to help you. This fact sheet has been prepared
More informationPrivacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
More informationCalifornia State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
More informationTHE CIVIL LITIGATOR New Shield Law Prohibits Most Subpoenas to Reporters. by Daniel E.D. Friesen and Andrew M. Low
Originally published in The Colorado Lawyer, Vol. 20, No. 5, May 1991. THE CIVIL LITIGATOR New Shield Law Prohibits Most Subpoenas to Reporters by Daniel E.D. Friesen and Andrew M. Low A new Colorado law
More informationCase 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 FOR THE DISTRICT OF ARIZONA
Case 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 WO IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) ) TOWN OF COLORADO CITY,
More informationEthics in Technology and ediscovery Stuff You Know, But Aren t Thinking About
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business
More informationMASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT
MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth
More informationSecretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor
Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,
More informationEmployee Relations. Howard S. Lavin and Elizabeth E. DiMichele
VOL. 34, NO. 4 SPRING 2009 Employee Relations L A W J O U R N A L Split Circuits Does Charging Party s Receipt of a Right-to-Sue Letter and Commencement of a Lawsuit Divest the EEOC of its Investigative
More informationElectronic Discovery Rules & Social Media
Electronic Discovery Rules & Social Media What is ESI? ESI is any information stored in electronic form All ESI is discoverable if relevant and reasonably accessible Privileges and other exceptions to
More informationTHE NEW WORLD OF E-DISCOVERY
THE NEW WORLD OF E-DISCOVERY Ralph Losey: partner and National e-discovery Counsel of Jackson Lewis LLP, a labor & employment firm with 700 lawyers and 46 offices nationwide. JacksonLewis.com author of
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationIN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH, CENTRAL DIVISION
Jehan A. Patterson (pro hac vice application pending) Adina H. Rosenbaum (pro hac vice application pending) Public Citizen Litigation Group 1600 20th Street NW Washington, DC 20009 (202) 588-1000 jpatterson@citizen.org
More informationPredictability in E-Discovery
Predictability in E-Discovery Presented by: John G. Roman, Jr. National Manager, Practice Group Technology Services Nixon Peabody LLP Tom Barce Assistant Director of Practice Support Fulbright & Jaworski
More informationE-Discovery: New to California 1
E-Discovery: New to California 1 Patrick O Donnell and Martin Dean 2 Introduction The New Electronic Discovery Act The new Electronic Discovery Act, Assembly Bill 5 (Evans), has modernized California law
More informationGuilford Medical Associates, P.A.
Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
More informationBusiness Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas ejones@littler.com (214) 880-8115 Michelle B. Brookshire Littler, Dallas mbrookshire@littler.com
More informationCase5:15-cv-03698-HRL Document1 Filed08/12/15 Page1 of 10
Case:-cv-0-HRL Document Filed0// Page of 0 Donald E. J. Kilmer, Jr. [SBN: ] LAW OFFICES OF DONALD KILMER Willow Street, Suite 0 San Jose, California Voice: (0) - Fax: (0) - E-Mail: Don@DKLawOffice.com
More informationArbitration in Seamen Cases
Arbitration in Seamen Cases Recently, seamen have been facing mandatory arbitration provisions in their employment agreements which deny them their rights to a jury trial under the Jones Act, and also
More informationNC General Statutes - Chapter 15A Article 17 1
SUBCHAPTER III. CRIMINAL PROCESS. Article 17. Criminal Process. 15A-301. Criminal process generally. (a) Formal Requirements. (1) A record of each criminal process issued in the trial division of the General
More informationUNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON ) ) ) ) ) ) ) ) ) ) STIPULATION
1 1 1 1 1 BOURNE INTERNATIONAL, INC., v. UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON Plaintiff, CHET STOLER; SOUTH SEAS TRADING CO., Defendants. STIPULATION NO. C0-0RJB PROTECTIVE ORDER
More informationWEST VIRGINIA LEGISLATURE. House Bill 4402
06R WEST VIRGINIA LEGISLATURE 06 REGULAR SESSION Introduced House Bill 0 BY DELEGATES SKINNER AND FAIRCLOTH [Introduced February, 06; referred to the committee on the Judiciary.] 06R A BILL to amend the
More informationHIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com
HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates scates@vormetric.com Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide
More informationFairfax County Circuit Court Preferred Criminal Law Practices
Page 1 Fairfax County Circuit Court Preferred Criminal Law Practices I. Objectives 1. To expedite the efficient resolution of criminal cases. 2. To reduce the number of unnecessary continuances while providing
More informationORDER GRANTING DEFENDANT'S MOTION TO SUPPRESS EVIDENCE
STATE OF FLORIDA, Plaintiff, v. RICARDO H. GLASCO, Defendant. Circuit Court, 18th Judicial Circuit in and for Brevard County. Case No. 05-2010-CF-021349-AXXX-XX. February 24, 2011. John M. Harris, Judge.
More information