Future Proof Your ediscovery Practices

Size: px
Start display at page:

Download "Future Proof Your ediscovery Practices"

Transcription

1 FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Barak Cohen, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica Watts, AGC and Discovery Counsel, HP George T. Tziahanas, VP Strategy, HP SaaS

2 Agenda Introductions Rise of the Machines Criminal Investigations in a Digital World Information Border Wars Model of Discovery in the Future

3 RISE OF THE MACHINES

4 History of Discovery Even with the advent of ediscovery ~20 years ago, a majority of relevant discoverable content has been human generated; that is likely to change. Pierson v. Post, 3 Cai. R. 175, 2 Am. Dec. 264 (N.Y. 1805)

5 Rise of the Machines Gartner Analytics Trends: The Internet of Things Really Matters for Communications Service Providers, December 2014

6 Rise of the Machines Phases of the digital revolution Web 1.0: Destruction Web 2.0: User Creation? Wikipedia Launch A 100 fold multiplication in the amount of data is a 10,000 fold multiplication in the number of patterns we can see in that data Philip Evans: Boston Consulting Group Fellow, Ted Talk

7 Rise of the Machines

8 Rise of the Machines Discovery tomorrow will rely less on what people said, and more on what their machines tell us

9 CRIMINAL INVESTIGATIONS IN THE DIGITAL AGE SEARCH FIRST ASK QUESTIONS LATER

10 Government Right to Corporate Data Government has broad rights to obtain corporate data in connection with criminal matters Rights subject to 4 th Amendment and ECPA Generally require facially valid legal process, which varies depending on type of data sought Government may also request Grand Jury or trial testimony from records custodians

11 Government Requests for Data Requests for Your Data Domestic Abroad (e.g., FCPA investigations) Requests for Third Party Data Your vendors or service partners Your customers or clients Requests to Third Parties for Your Data Who has your data? Are they obligated to protect it?

12 More Data More Problems Government may search first ask questions later Recent circuit court decisions support broad, warrantless access to stored data Govt. using third-parties to conduct searches on their behalf (e.g., In re Warrant to Search a Certain Account Controlled and Maintained by Microsoft Corporation, Nos. M9-150, 13-MJ-2814 Govt. using new technologies with unclear precedent (e.g., cell signal tracking in United States v. Skinner, No (6th Cir. 2012)) But SCOTUS says there are limits The 4 th amendment still matters (Riley v. California, 134 S. Ct. 2473, 189 L. Ed. 2d 430, (2014)) See also United States v. Warshak, 631 F.3d 266, 286 (6th Cir. 2010), rejecting warrantless seizure of s

13 ECPA: Obsolete, But Still An Issue ECPA, enacted in 1986, has not aged well. It fails to strike a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement. ECPA fails to account for: Cloud-based services Location data from cellular devices Transactional data Should you provide, or not provide notice, to account holders when you receive a subpoena or 2703(d) order? Is an ECPA search warrant more like a subpoena than a physical search warrant to search premises or seize property?

14 Responding to Government Requests Have a process in place Point person Prompt attention/triage Assess facial validity and identify issues Negotiate to limit scope To contain costs To avoid collateral issues

15 Pick Your Battles Considerations: - PR - Customer Relations - Risk of Poking the Bear - Example: Google NSL fight re: notice to user Some examples from industry: - Reddit refused 42% of government and civil data requests in In 2012, Google received 21,389 government requests for information affecting 33,634 user accounts. Google provided at least some data 66% of the time.

16 INFORMATION BORDER WARS

17 Microsoft Case Summary (In re Warrant) Dec 2013 Magistrate issues a warrant under the Stored Communications Act to Microsoft to produce content and non-content information about a user. The customer s were stored in Ireland on Microsoft servers. The non-content information about the (metadata about the account), is stored in the US. MS objected to producing data stored in Ireland, arguing that the warrant would require an extraterritorial search and seizure of data. The Government responded the issue is whether the content is in MS s custody or control. Magistrate rejected the motion to vacate. Found that warrants issued under the SCA are hybrids part warrant and part subpoena. Therefore the extraterritorial limits on warrants are not implicated and the relevant question is whether the data is in the provider s control. Further the search does not occur until the data is reviewed by US law enforcement, which would not happen until the data is in the US. MS appealed. The District Court upheld the Magistrate s ruling. The case is now before the 2 nd Circuit: 28 technology and media companies, 23 trade associations and advocacy groups and 35 professors of computer science filed legal papers in support of MS s opposition to the warrant.

18 Information Border Wars The US government s unilateral use of a search warrant to reach in another country puts both fundamental privacy rights and cordial international relations at risk. -Brad Smith, Microsoft GC It s a question of control, not a question of location of that information. U.S. District Judge Loretta Preska In this case, no such exposure takes place until the information is reviewed in the United States, and consequently no extraterritorial search has occurred. Magistrate's Decision The refusal of the U.S. Attorney to recognize that the account at issue is located in a foreign jurisdiction and subject to foreign data protection rules is not only offensive to the sensitivities of European citizens but also reinforces the already strong sentiment of many EU citizens that their data is not 'safe' when they use IT services offered by U.S. corporations. Jan Phillip Albrecht, EU MP

19 Not entirely new Societe Nationale Industrielle Aerospatiale v U.S Supreme Court held that a litigant must produce information located overseas even if it violates a blocking statute. Five factor test (1) the importance of the documents to the litigation; (2) the degree of specificity of the request; (3) whether the information originated in the United States; (4) the availability of alternative means of obtaining the information; and (5) the extent to which noncompliance with the request would undermine important interests of the United States, or undermine the interests of the state where the information is located.

20 What is new The Cloud, the WWW, users connected everywhere/ all of the time. Compelling production of someone else s data High sensitivities around the world to privacy concerns

21 Information Border Wars What is location Physical Virtual Access privileges Third-party When will you need information Prior to litigation (broader info. governance) ediscovery Law firm practices

22 Information Border Wars Important Considerations & Questions Companies should have a data map of what is stored in Europe on servers belonging to US cloud providers. Keep it up to date. Does this open demands from foreign countries to US companies that have presence in that country to information kept in the US Contract with cloud providers stipulate that the data must not be accessible from the US. If storing information abroad make it inaccessible in the US? Use partner company so not subject to US law? Encryption of data with customer having only encryption key

23 MODEL OF DISCOVERY IN THE FUTURE (AKA NOW)

24 Model of Discovery in the Future Case Study Facts Large multinational corporation engaged in business in the US, Europe and in Asia was the subject of a significant security breach. Hackers accessed and downloaded large volumes of protected information (PII, PHI, HR, confidential, etc.). In many instances, once downloaded, the data was completely wiped from the company systems. The information was not only stolen, but large parts were published on various public websites and in the press. Eventually the corporation secured its environment, but is now subject to several types of actions.

25 Model of Discovery in the Future Case Study Questions Based on high likelihood of civil and potentially criminal action, what data sources should be preserved? Given the case specifics, must we consider additional, less standard data sources? System Security Settings DNS Logs Server Logs Security Logs System/Security Patch and Update Histories Malware and Virus Protection Software Update and Incident Logs Firewall Logs, etc. Given these additional data sources may be large and mostly unstructured text files, how do they impact discovery (preservation, collection, and review)?

26 Model of Discovery in the Future Additional Questions Where is the Network Boundary? Third-Party or Partner Networks? Propagation of Local Risks? Additional Data Sources? Potential Liability? The U.S. DOJ has issued a subpoena to a third-party service provider hosting your communications information under the SCA; do you intervene? An EU sovereign entity has sent you a letter precluding you from sharing any non-public information transmitted under Safe Harbor in any civil or criminal proceeding; how do you respond?

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting

More information

Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants

Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants Marney Cheek Kristen Eichensehr Alex Hastings Ed Rippey Agenda Introduction (Rippey) Key Considerations in Cross-Border

More information

Recent Developments in Cybersurveillance

Recent Developments in Cybersurveillance David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information

More information

STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION

STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION BEFORE THE SUBCOMMITTEE ON THE CONSTITUTION, CIVIL RIGHTS, AND CIVIL LIBERTIES UNITED STATES HOUSE OF REPRESENTATIVES HEARING

More information

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the

More information

BYOD Privacy and Security in Europe

BYOD Privacy and Security in Europe BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,

More information

LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice

LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice LSSA 2014 1 Use of Internet-Based Technologies in Legal Practice LSSA Guidelines Version 1.0 November 2014 2 Foreword Please

More information

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information

More information

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication. THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan

More information

TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT

TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH

WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH 1 Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes

More information

E-Discovery in Practice: A Roadmap for Financial Institutions

E-Discovery in Practice: A Roadmap for Financial Institutions E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida

More information

Presented by: John Mockler, ITS Kate Dwyer, OLR

Presented by: John Mockler, ITS Kate Dwyer, OLR Presented by: John Mockler, ITS Kate Dwyer, OLR *Cloud: network of servers in different locations where each server has a different function *Three types of cloud service: *Infrastructure as a service

More information

Corporate Counsel Beware: Limits Of 'No Contact Rule'

Corporate Counsel Beware: Limits Of 'No Contact Rule' Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Counsel Beware: Limits Of 'No Contact Rule'

More information

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches.

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches. Leland Corky Dwight, Investigator Louisiana State Police ELECTRONIC ADVANCES AND THE LAW J. J. Williams, Jr., Staff Attorney Louisiana District Attorneys Association JJ@LDAA.ORG AGENDA Tangipahoa Case

More information

(2) For production of public records or hospital medical records. Where the subpoena commands any custodian of public records or any custodian of hosp

(2) For production of public records or hospital medical records. Where the subpoena commands any custodian of public records or any custodian of hosp Rule 45. Subpoena. (a) Form; Issuance. (1) Every subpoena shall state all of the following: a. The title of the action, the name of the court in which the action is pending, the number of the civil action,

More information

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074 BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the

More information

Preparing For and Responding to Government Investigations. Presented by Jeffrey Coopersmith

Preparing For and Responding to Government Investigations. Presented by Jeffrey Coopersmith Preparing For and Responding to Government Investigations Presented by Jeffrey Coopersmith Substantive Areas of Government Inquiry Areas Where the Gov t Routinely Conducts Investigations: Securities Fraud

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES

US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES May 11, 2012 Bijan E. Eghbal, Paris Browning E. Marean, San Diego Carol A.F. Umhoefer, Paris Agenda I. Overview of US discovery and document

More information

DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES

DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES By KYL attorneys Elizabeth P. Beazley and Tara B. Voss California Litigation Volume 25 Number 1 2012 This article was previously

More information

NLRB: NxGen Case Management, E-Government and E-Discovery

NLRB: NxGen Case Management, E-Government and E-Discovery NLRB: NxGen Case Management, By: James G. Paulsen, Assistant General Counsel, OGC and Bryan Burnett, Chief Information Officer, OCIO, National Labor Relations Board A. Next Generation (NxGen) Case Management

More information

E-Discovery and EU Data Protection laws

E-Discovery and EU Data Protection laws Robert Bond robert.bond@speechlys.com Alexander Carter-Silk alexander.carter-silk@speechlys.com IP, Technology & Data Group E-Discovery and EU Data Protection laws Alex Carter-Silk, Partner, IP, Technology

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

The Duke Conference: Bench-Bar-Academy Distinguished Lawyers Series Protected-Privacy Data Conference

The Duke Conference: Bench-Bar-Academy Distinguished Lawyers Series Protected-Privacy Data Conference CURRENT APPROACHES TAKEN IN U.S. LITIGATION TO COMPLY WITH POTENTIALLY CONFLICTING U.S. DISCOVERY OBLIGATIONS AND EU AND OTHER FOREIGN DATA PRIVACY STATUTES David W. Ichel, Simpson Thacher & Bartlett Peter

More information

Legal Issues of Forensics in the Cloud

Legal Issues of Forensics in the Cloud Legal Issues of Forensics in the Cloud About Me Owner, Titan Info Security Group, LLC A Risk Management and Cyber Security Law Firm Partner, OnlineIntell, LLC Protecting online brands and reputation while

More information

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Varun Badhwar Co-Founder; VP of Products & Solution Engineering 1 2013 CipherCloud All rights reserved. Agenda Introduction

More information

Digital Evidence Collection and Use. CS 585 Fall 2009

Digital Evidence Collection and Use. CS 585 Fall 2009 Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers

More information

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) This matter is before the court upon the objection by

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) This matter is before the court upon the objection by United States of America, UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) Plaintiff, v. ORDER Michael Duane Hoffman, This matter is before the court upon the objection by

More information

Scholarship @ GEORGETOWN LAW. Georgetown University Law Center

Scholarship @ GEORGETOWN LAW. Georgetown University Law Center Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2010 Electronic Communications Privacy Act and the Revolution in Cloud Computing : Hearing Before the Subcomm. on the Constitution, Civil Rights,

More information

Vehicle Black Boxes. With every aviation accident involving an aircraft of sufficient

Vehicle Black Boxes. With every aviation accident involving an aircraft of sufficient Mary Ellen Morris Miller & Martin PLLC 1200 One Nashville Place 150 Fourth Avenue, North Nashville, Tennessee 37219-2433 Vehicle Black Boxes With every aviation accident involving an aircraft of sufficient

More information

Department, Board, Or Commission Author Bill Number

Department, Board, Or Commission Author Bill Number BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain

More information

The Importance of Privacy & Data Security in a Changing World

The Importance of Privacy & Data Security in a Changing World Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but

More information

Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie

Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten MHC.ie Rewriting the Past Oisin Tobin otobin@mhc.ie Agenda 1. Background 2. Findings and impact: a) Jurisdiction b) A

More information

A Brief Overview of ediscovery in California

A Brief Overview of ediscovery in California What is ediscovery? Electronic discovery ( ediscovery ) is discovery of electronic information in litigation. ediscovery in California is governed generally by the Civil Discovery Act. In 2009, the California

More information

2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013

2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013 1 2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013 CONTEXT 2006 FEDERAL COURT E-DISCOVERY AMENDMENTS The 2006 Federal E-Discovery

More information

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)

More information

Information For Tenants. About Evictions. And the Court Process

Information For Tenants. About Evictions. And the Court Process Information For Tenants About Evictions And the Court Process Prepared By: APPALACHIAN LEGAL SERVICES Page 2 "Information About Evictions" 1-800-834-0598 "Information About Evictions" Page 3 If you have

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015

More information

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP Presented by Frank H. Gassler, Esq. Written by Jeffrey M. James, Esq. Over the last few years,

More information

Drafting and Issuing Subpoenas: New Jersey

Drafting and Issuing Subpoenas: New Jersey View the online version at http://us.practicallaw.com/6-569-5426 Drafting and Issuing Subpoenas: New Jersey EZRA ROSENBERG, MICHELLE HART YEARY AND THOMAS J. MILLER, DECHERT LLP, WITH PRACTICAL LAW LITIGATION

More information

Outline to HIPAA presentation

Outline to HIPAA presentation Outline to HIPAA presentation I) Overview of the HIPAA Privacy Rule regulations that relate to obtaining a person s medical records for court proceedings and law enforcement purposes. A) Entities covered

More information

Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION

Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION SALT LAKE CITY CORPORATION, a Utah municipal corporation;

More information

Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO.

Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO. Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO. 05-10037-GAO-1 UNITED STATES OF AMERICA v. GRANT BOYD, Defendant. O TOOLE,

More information

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data

More information

WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT. Presenting the results from BDO s inaugural Inside E-Discovery Survey

WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT. Presenting the results from BDO s inaugural Inside E-Discovery Survey WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT Presenting the results from BDO s inaugural Inside E-Discovery Survey 1 ACEDS Membership Benefits Training, Resources and Networking for

More information

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use

More information

Assembly Bill No. 5 CHAPTER 5

Assembly Bill No. 5 CHAPTER 5 Assembly Bill No. 5 CHAPTER 5 An act to amend Sections 2016.020, 2031.010, 2031.020, 2031.030, 2031.040, 2031.050, 2031.060, 2031.210, 2031.220, 2031.230, 2031.240, 2031.250, 2031.260, 2031.270, 2031.280,

More information

The need for companies to have a predetermined plan in place in the

The need for companies to have a predetermined plan in place in the Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

An Investigator Appears: Are You Ready? Presentation Slides

An Investigator Appears: Are You Ready? Presentation Slides Chapter 1 An Investigator Appears: Are You Ready? Presentation Slides Tom E. Lindley Perkins Coie LLP Portland, Oregon Managing Environmental Enforcement Risk 1 ii An Investigator Appears: Are You Ready?

More information

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011 E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Privacy in the Cloud A Microsoft Perspective

Privacy in the Cloud A Microsoft Perspective A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft

More information

ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial

ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial February 10, 2016 The Role of Economics in Antitrust Law February 13, 2008 Copyright 2008, The Sedona Conference 1 1 The Sedona

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION BRIAN Z. FRANCE, v. MEGAN P. FRANCE, Plaintiff, Defendant. Case No. 3:11-CV-00186 PLAINTIFF S MEMORANDUM OF LAW IN SUPPORT

More information

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act. Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015

PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015 PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015 Introduction The statute creating the Michigan Indigent Defense Commission (MIDC) provides: The MIDC shall implement minimum standards, rules,

More information

SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen

SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill

More information

Cross-Border EDiscovery

Cross-Border EDiscovery Cross-Border EDiscovery Machine translation use cases Given the increasing rate of globalization and risk of regulatory action, the likelihood that organizations will have to contend with cross-border

More information

Counsel must be fully familiar with the Uniform Civil Rules for the Supreme Court 22 NYCRR Part 202.

Counsel must be fully familiar with the Uniform Civil Rules for the Supreme Court 22 NYCRR Part 202. JUSTICE GERALD E. LOEHR, J.S.C. Rockland County Supreme Court 1 South Main Street New City, New York 10956 Courtroom 1 Tel: (845) 483-8343 Fax: (845) 708-7236 Staff Bruce J. Pearl, Principal Law Secretary

More information

Large Law Firm structure

Large Law Firm structure Large Law Firm structure Senior Partners ultimate control over the firm Junior Partners all the partners own the firm together Although, how they divide profits depends on their agreement, which factors

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Digital Evidence Legal Issues and Trends

Digital Evidence Legal Issues and Trends State of the States Cyber Crime Consortium By Justin Fitzsimmons Program Manager, High-Tech Crime Training Services SEARCH On April 30, 2015, the Office of the Massachusetts Attorney General, along with

More information

ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 539 (Levine) As Introduced February 23, 2015

ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 539 (Levine) As Introduced February 23, 2015 AB 539 Page 1 Date of Hearing: April 7, 2015 Counsel: Sandra Uribe ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair AB 539 (Levine) As Introduced February 23, 2015 SUMMARY: Authorizes the issuance

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

Friday 31st October, 2008.

Friday 31st October, 2008. Friday 31st October, 2008. It is ordered that the Rules heretofore adopted and promulgated by this Court and now in effect be and they hereby are amended to become effective January 1, 2009. Amend Rules

More information

A Guide to Dealing with Judgement Debt

A Guide to Dealing with Judgement Debt A Guide to Dealing with Judgement Debt This factsheet explains your legal rights and options and contains contact details for organisations that may be able to help you. This fact sheet has been prepared

More information

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

THE CIVIL LITIGATOR New Shield Law Prohibits Most Subpoenas to Reporters. by Daniel E.D. Friesen and Andrew M. Low

THE CIVIL LITIGATOR New Shield Law Prohibits Most Subpoenas to Reporters. by Daniel E.D. Friesen and Andrew M. Low Originally published in The Colorado Lawyer, Vol. 20, No. 5, May 1991. THE CIVIL LITIGATOR New Shield Law Prohibits Most Subpoenas to Reporters by Daniel E.D. Friesen and Andrew M. Low A new Colorado law

More information

Case 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 FOR THE DISTRICT OF ARIZONA

Case 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 FOR THE DISTRICT OF ARIZONA Case 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 WO IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) ) TOWN OF COLORADO CITY,

More information

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business

More information

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth

More information

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,

More information

Employee Relations. Howard S. Lavin and Elizabeth E. DiMichele

Employee Relations. Howard S. Lavin and Elizabeth E. DiMichele VOL. 34, NO. 4 SPRING 2009 Employee Relations L A W J O U R N A L Split Circuits Does Charging Party s Receipt of a Right-to-Sue Letter and Commencement of a Lawsuit Divest the EEOC of its Investigative

More information

Electronic Discovery Rules & Social Media

Electronic Discovery Rules & Social Media Electronic Discovery Rules & Social Media What is ESI? ESI is any information stored in electronic form All ESI is discoverable if relevant and reasonably accessible Privileges and other exceptions to

More information

THE NEW WORLD OF E-DISCOVERY

THE NEW WORLD OF E-DISCOVERY THE NEW WORLD OF E-DISCOVERY Ralph Losey: partner and National e-discovery Counsel of Jackson Lewis LLP, a labor & employment firm with 700 lawyers and 46 offices nationwide. JacksonLewis.com author of

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH, CENTRAL DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH, CENTRAL DIVISION Jehan A. Patterson (pro hac vice application pending) Adina H. Rosenbaum (pro hac vice application pending) Public Citizen Litigation Group 1600 20th Street NW Washington, DC 20009 (202) 588-1000 jpatterson@citizen.org

More information

Predictability in E-Discovery

Predictability in E-Discovery Predictability in E-Discovery Presented by: John G. Roman, Jr. National Manager, Practice Group Technology Services Nixon Peabody LLP Tom Barce Assistant Director of Practice Support Fulbright & Jaworski

More information

E-Discovery: New to California 1

E-Discovery: New to California 1 E-Discovery: New to California 1 Patrick O Donnell and Martin Dean 2 Introduction The New Electronic Discovery Act The new Electronic Discovery Act, Assembly Bill 5 (Evans), has modernized California law

More information

Guilford Medical Associates, P.A.

Guilford Medical Associates, P.A. Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE

More information

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas ejones@littler.com (214) 880-8115 Michelle B. Brookshire Littler, Dallas mbrookshire@littler.com

More information

Case5:15-cv-03698-HRL Document1 Filed08/12/15 Page1 of 10

Case5:15-cv-03698-HRL Document1 Filed08/12/15 Page1 of 10 Case:-cv-0-HRL Document Filed0// Page of 0 Donald E. J. Kilmer, Jr. [SBN: ] LAW OFFICES OF DONALD KILMER Willow Street, Suite 0 San Jose, California Voice: (0) - Fax: (0) - E-Mail: Don@DKLawOffice.com

More information

Arbitration in Seamen Cases

Arbitration in Seamen Cases Arbitration in Seamen Cases Recently, seamen have been facing mandatory arbitration provisions in their employment agreements which deny them their rights to a jury trial under the Jones Act, and also

More information

NC General Statutes - Chapter 15A Article 17 1

NC General Statutes - Chapter 15A Article 17 1 SUBCHAPTER III. CRIMINAL PROCESS. Article 17. Criminal Process. 15A-301. Criminal process generally. (a) Formal Requirements. (1) A record of each criminal process issued in the trial division of the General

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON ) ) ) ) ) ) ) ) ) ) STIPULATION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON ) ) ) ) ) ) ) ) ) ) STIPULATION 1 1 1 1 1 BOURNE INTERNATIONAL, INC., v. UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON Plaintiff, CHET STOLER; SOUTH SEAS TRADING CO., Defendants. STIPULATION NO. C0-0RJB PROTECTIVE ORDER

More information

WEST VIRGINIA LEGISLATURE. House Bill 4402

WEST VIRGINIA LEGISLATURE. House Bill 4402 06R WEST VIRGINIA LEGISLATURE 06 REGULAR SESSION Introduced House Bill 0 BY DELEGATES SKINNER AND FAIRCLOTH [Introduced February, 06; referred to the committee on the Judiciary.] 06R A BILL to amend the

More information

HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com

HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates scates@vormetric.com Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide

More information

Fairfax County Circuit Court Preferred Criminal Law Practices

Fairfax County Circuit Court Preferred Criminal Law Practices Page 1 Fairfax County Circuit Court Preferred Criminal Law Practices I. Objectives 1. To expedite the efficient resolution of criminal cases. 2. To reduce the number of unnecessary continuances while providing

More information

ORDER GRANTING DEFENDANT'S MOTION TO SUPPRESS EVIDENCE

ORDER GRANTING DEFENDANT'S MOTION TO SUPPRESS EVIDENCE STATE OF FLORIDA, Plaintiff, v. RICARDO H. GLASCO, Defendant. Circuit Court, 18th Judicial Circuit in and for Brevard County. Case No. 05-2010-CF-021349-AXXX-XX. February 24, 2011. John M. Harris, Judge.

More information