Where Is My Ripcord?
|
|
- Daniel Montgomery
- 8 years ago
- Views:
Transcription
1 Where Is My Ripcord? What Counsel and Compliance Officers Need to Do When They Find Out the Company s Data Has Been Shoved into the Cloud Tuesday, March 1, 2011 Web Seminar
2 Speakers Bob Owen (Moderator) Fulbright & Jaworski David Kessler Fulbright & Jaworski Dan Regard Intelligent Discovery Solutions, Inc. 2
3 Continuing Legal Education Information We have applied for one hour of California, Minnesota, Texas, and Virginia CLE and New York non-transitional CLE credit. Newly admitted New York attorneys may not receive non-transitional CLE credit. For attendees in other states, we will supply a certificate of attendance that may be used to apply for CLE credit with the applicable bar or other accrediting agency. Fulbright will supply a certificate of attendance to all participants who: 1. Participate in the web seminar by phone and via the web. 2. Complete our online evaluation, which we will send to you after the web seminar (required by some states). 3
4 Administrative Information Today s program will be conducted in a listen-only mode. To ask an online question at any time throughout the program, simply click on the question mark icon located on the tool bar in the bottom right side of your screen. We will try to answer your question during the session. Everything we say today is opinion. i We are not tdispensing i legal advice, and listening does not establish an attorneyclient relationship. This discussion is off the record. You may not quote the speakers without our express written permission. If the press is listening, you may contact us, and we may be able to speak on the record. 4
5 This Just In Google still working to restore Gmail service Company says s are not lost, but many still without today By Sharon Gaudin March 1, :46 AM ET Computerworld - Two days after tens of thousands of Google Gmail users discovered their , chat histories and contacts had disappeared from their accounts, the problem still is not fixed. 5
6 Situation You re involved in an employee interview related to a litigation. You find out that the employee has been using a web-based service to create and share certain business data. This is the first time you ve ever heard of this use, or even of this ISP. This ISP has never been vetted by IT, Legal or Compliance. What do you do now? Photos from historycommons.org, civilliberty.about.com, dvdnear.com 6
7 Photo from fireflyshipworks.com 7
8 Agenda Intro Is this Situation Realistic? Why is it Happening? Definition(s) Cloud Computing SLA Data Governance Credit Card IT Triage the Situation Litigation Reaction Plan Identification Preservation Collection Compliance Reaction Plan Security Retention and Disposal What Are the Long Term Plans? How Do I Guide the Cloud Information into Data Governance Best Practices? Here Is Your Ripcord 8
9 Types of Cloud Purpose Source Software Public Hardware Private Platform Hybrid 9
10 Case Examples Saleforce ($25 per month) Facebook (free) Base Camp ($49 per month) Sugarsync (freemium) Amazon Elastic Compute Cloud (EC2) ($1 per hour) Google Docs (free) 10
11 Basecamp Yes But Data Ownership Policy What about subpoena? Redundancy Physical Security Protected Billing Information What if I want to delete? Cyber is hard Least of my concerns 11
12 TRIAGE: Or Do I Need to Jump Out of the Plane? Find and Review Cloud Provider Agreement Emergency Preservation? Is it Relevant/Material? Is it Unique? Do I have automatic data loss? What are my self-help options? Can I extract? Can I change user behavior? Disclosure or Representation Gap Are our disclosures incomplete or inaccurate 12
13 ediscovery Life Cycle Volume Relevance 13
14 IDENTIFICATION: Measure the Data What do I want to measure? Content: Quantity, Quantity Business Purpose Materiality / Relevance Ownership Control (Right to Access) Security (Ability to Prevent Access) Jurisdiction (Physical Location) Privacy (Protected Data Status) How do I measure? Review the Contract Talk to the Business People who are using the Cloud Talk to the Cloud Provider Cloud Legal/Business Cloud IT 14
15 IDENTIFICATION: Review the SLA What Are Your Administrative Rights? How can you get a copy of your data? Are there cost clauses for preservation and collection? What happens at termination? 15
16 PRESERVATION and COLLECTION: Dynamic Data with Little (or No) Controls Copy (Administrative Rights) Confidential / Secretive Preservation Unknown Metadata How do you establish integrity of process? Who is Going to Pay for It? 16
17 COMPLIANCE Can you quickly repatriate? What do you mean by Delete? What is the CP s Disaster Recovery Plan? Can You Encrypt in Place? In Transfer? 17
18 After the Emergency Leave Upgrade Repatriate Substitute Adjust Future Behavior 18
19 Adjust Future Behavior Root cause Preferred outcome Enabled outcome Education Monitoring Photo from blogs4bauer.com 19
20 SLA Considerations Duration Termination Security Location Retention Access Subpoenas Administrative control 20
21 Recap of Takeaways A question of when not if Don t compound the problem Measure your data Consider your obligations Advise the appropriate stakeholders Take triage actions Take corrective actions Develop a long term policy 21
22 Questions? Bob Owen (Moderator) Fulbright & Jaworski David Kessler Fulbright & Jaworski Dan Regard Intelligent Discovery Solutions, Inc. 22
23 Continuing Legal Education Information If you are requesting CLE credit for this presentation, please record the number given during the program and respond to the survey that Fulbright will within the next day. Completion of the above-mentioned survey is required in certain states to obtain CLE credit. If you are viewing a recording of this web seminar, most state bar organizations will only allow you to claim self-study CLE credit. Please refer to your state's CLE rules. If you have any questions regarding CLE approval of this course in your applicable bar, please contact your bar administrator. 23
24 JOIN US NEXT MONTH! Visit to view and register for our upcoming web seminars. Join us on April 5, 2011 Employer s Liability for Third-Party Retaliation: Just How Wide Is Title VII s Net and How Does an Employer Avoid Liability? 24
25 Thank you for your participation!
International ediscovery. When Cyber Workspaces Collide with U.S. Litigation. May 1, 2012
International ediscovery When Cyber Workspaces Collide with U.S. Litigation May 1, 2012 Continuing Education Information We have applied for one hour of California, Minnesota, Texas and Virginia CLE and
More informationBig Data: Navigating the Recent and Pending Releases of CMS Data Sets
Big Data: Navigating the Recent and Pending Releases of CMS Data Sets Bernard J. Ford, Navigant Consulting, Inc. Benjamin Koplin, Fulbright & Jaworski LLP (Norton Rose Fulbright) Lesley Reynolds, Fulbright
More informationHealth information privacy and security. Norton Rose Fulbright US LLP October 6, 2015
Health information privacy and security Norton Rose Fulbright US LLP October 6, 2015 Speaker Mark Faccenda Mark Faccenda is a Partner in the Washington, D.C. office. As part of Norton Rose Fulbright's
More informationM&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015
M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the
More informationEvery Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. lstevens@llminc.com
More informationM&A in 2013: Litigation Issues Affecting Mergers & Acquisitions
Peter Stokes and Mark Oakes Fulbright & Jaworski L.L.P. 98 San Jacinto Blvd., Ste 1100 Austin, Texas 78701 512.474.5201 M&A in 2013: Litigation Issues Affecting Mergers & Acquisitions Speakers Peter A.
More informationNORTON ROSE FULBRIGHT FORUM TM Web Seminar. A Monthly
NORTON ROSE FULBRIGHT FORUM TM Web Seminar A Monthly Ethics and the lawyer's professional responsibilities in securities and other business transactions September 10, 2013 First Tuesday of Every Month
More informationLegal Issues of Forensics in the Cloud
Legal Issues of Forensics in the Cloud About Me Owner, Titan Info Security Group, LLC A Risk Management and Cyber Security Law Firm Partner, OnlineIntell, LLC Protecting online brands and reputation while
More informationInter Partes Review: Claim amendments at the Patent Trial and Appeal Board. October 8, 2015
Inter Partes Review: Claim amendments at the Patent Trial and Appeal Board October 8, 2015 Today s presenters Mike Stimson Norton Rose Fulbright San Antonio, Texas Brandy Nolan Norton Rose Fulbright Dallas,
More informationHosted ediscovery: Adoption, Use, and Results. September, 2011
Hosted ediscovery: Adoption, Use, and Results September, 2011 SaaS is a Delivery Model Of Cloud Computing Attitudes About SaaS Are Still Evolving Legal Community Embracing SaaS In general, are you leaning
More informationCSUSB Cloud Computing Standard CSUSB, Information Security Office
CSUSB, Information Security Office Last Revised: 01/30/2013 Final REVISION CONTROL Document Title: Author: File Reference: CSUSB Cloud Computing Standard James Macdonell Date By Action Pages 05/04/12 J
More informationLegal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009
Legal Issues Associated with Cloud Computing Laurin H. Mills May 13, 2009 What Is Cloud Computing? The cloud is a metaphor for the Internet Leverages the connectivity of the Internet to optimize the utility
More informationE-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and
More informationSPIN-OFFS An Overview
SPIN-OFFS An Overview John R. Allender, Head of Tax, US Kevin Trautner, Partner, M&A/Securities Fulbright & Jaworski LLP December 12, 2013 79289972.4 Speaker John R. Allender Head of Tax, United States
More informationLEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
More informationHow To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationIs Cloud Computing Inevitable for Lawyers?
Is Cloud Computing Inevitable for Lawyers? by Sharon D. Nelson and John W. Simek 2015 Sensei Enterprises, Inc. Not a single day goes by when you don t hear something about cloud computing. It could be
More information3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
More informationKroll Ontrack VMware Forum. Survey and Report
Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions
More informationETHICS for Lawyers and Law Firms Using Cloud Technology
ETHICS for Lawyers and Law Firms Using Cloud Technology Donna Kirk Seyle ~ Legal Tech Advisor: Law Practice Strategy 108 MONTESANO ST SANTA CRUZ, CA 95062 (831) 332-2243 Donna Seyle is an attorney, author,
More informationLegal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationElectronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationWrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors
1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance
More information( and how to fix them )
THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.
More informationE-Discovery Perils: The AutoArchive Function Not Gone, But Forgotten?
E-Discovery Perils: The AutoArchive Function Not Gone, But Forgotten? Thomas J. Smith This article examines the hidden perils, from an e-discovery and records management perspective, of the AutoArchive
More informationCloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationCLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
More informationDigital Security. Dr. Gavin W. Manes, Chief Executive Officer
Dr. Gavin W. Manes, Chief Executive Officer About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI
More informationCloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.
Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity Amy Mushahwar, Esq. What s New? Not That Much. Some have their heads in the cloud we prefer to stay down in the weeds and know
More informationEmail Retention and Archiving
Personnel Connections Email Retention and Archiving 10 a.m. August 21, 2009 John L. Baines OIT Security and Compliance Agenda NC State Government & University Email References Background Governor s Email
More informationCloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,
More informationCloud Computing Paradigm Shift. Jan Šedivý
Cloud Computing Paradigm Shift Jan Šedivý Business expectations Improving business processes Reducing enterprise costs Increasing the use of information/analytics Improving enterprise workforce effectiveness
More informationThe Data Melting Pot Computing in the Cloud. Becky Pinkard Manager, Security Operations Centres Research In Motion
The Data Melting Pot Computing in the Cloud Becky Pinkard Manager, Security Operations Centres Research In Motion Notable Quotes January 2010, Mark Zuckerberg (Facebook founder): People have really gotten
More informationAcquisition Techniques: Choosing Between One Step vs. Two Step Mergers
Acquisition Techniques: Choosing Between One Step vs. Two Step Mergers Marilyn Mooney, Dan Wellington and Anita Tarar Partners Fulbright & Jaworski LLP November 14, 2013 Speaker Marilyn Mooney Partner
More informationThe Keys to the Cloud: The Essentials of Cloud Contracting
The Keys to the Cloud: The Essentials of Cloud Contracting September 30, 2014 Bert Kaminski Assistant General Counsel, Oracle North America Ken Adler Partner, Loeb & Loeb LLP Akiba Stern Partner, Loeb
More informationEDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS
EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS Wednesday, June 25, 2014 Georgetown University Law Center Washington, DC CLE 7.0 CLE credit hours (based on a 60-minute credit hour) including 1.0 ethics
More informationVillage of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures
Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep
More informationWhitepaper: Email archiving and storage management solution for compliance, retention management and electronic discovery
Whitepaper: Email archiving and storage management solution for compliance, retention management and electronic discovery by David Bailey February, 2011 Doc# 022311-01 www.doculex.com Intended Audience
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationExport Controls and Cloud Computing: Legal Risks
Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Legal Risks Complying with ITAR, EAR and Sanctions Laws When Using Cloud Storage and Services TUESDAY, APRIL
More informationKPMG Forensic Technology Services
KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production
More informationC. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.
Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should
More informationAgenda 1) Applicable Disclosure Requirements 2) Records Retention for Email 3) Confidentiality Obligations 4) Email Management Strategies 2
Email Management: A Legal Perspective The Texas A&M University System Office of General Counsel Agenda 1) Applicable Disclosure Requirements 2) Records Retention for Email 3) Confidentiality Obligations
More informationWSBA MEMBER GUIDE TO MCLE
WSBA MEMBER GUIDE TO MCLE TABLE OF CONTENTS General Requirements and Information... 1 Credit Requirements... 1 Carry-over Credits... 1 MCLE Certification Requirement... 2 Seeking Approval for MCLE Credit
More informationCloud Backup GLOSSARY
Cloud Backup GLOSSARY There are a number of confusing terms bandied about in the marketplace today regarding cloud computing, data backup and storage systems so much so that consumers, professionals and
More informationediscovery Solutions
The Radicati Group, Inc. www.radicati.com ediscovery Solutions A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright November 2010, Reproduction Prohibited 9:30 am, PT November 4, 2010
More informationSix Steps to a Successful Email Migration to Exchange 2013. Step 1: Migration Project Assessment, Planning and Design
Six Steps to a Successful Email Migration to Exchange 2013 Six Steps to a Successful Email Migration to Exchange 2013 Migrating your organization s email to Exchange 2013, whether it be on premises or
More informationObjectives. Agenda. Public clouds. A Primer on Moving to the Cloud HIPAA, Encryption, ediscovery, Oh My!
1 Objectives A Primer on Moving to the Cloud HIPAA, Encryption, ediscovery, Oh My! Tatiana Melnik, Attorney April Sage, MHI, CPHIMS Describe the differences between public clouds, private clouds, and hybrid
More informationICT managed services and cloud computing. Patrick Sefton Principal, Brightline Lawyers
ICT managed services and cloud computing Patrick Sefton Principal, Brightline Lawyers ICT a longer view (for context) series of disruptive revolutions 1980s: PC revolution end dominance of centralised
More informationOvercoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More
Presenting a live 90-minute webinar with interactive Q&A Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More TUESDAY, SEPTEMBER 16, 2014
More informationGovernance from the Cloud. threat protection compliance archiving & governance secure communication
Governance from the Cloud threat protection compliance archiving & governance secure communication Speakers Darren Lee Vice-President & GM, Proofpoint 2 Agenda for Today s Discussion Agenda Who is Proofpoint?
More informationESI Discovery in Federal Criminal Cases: Leveraging the New JETWG Recommendations
Presenting a live 90-minute webinar with interactive Q&A ESI Discovery in Federal Criminal Cases: Leveraging the New JETWG Recommendations THURSDAY, APRIL 26, 2012 1pm Eastern 12pm Central 11am Mountain
More informationCloud Computing A Silver Lining or Ethical Thunderstorm for Lawyers?
Consultus Electronica Cloud Computing A Silver Lining or Ethical Thunderstorm for Lawyers? by James M. McCauley, Ethics Counsel, Virginia State Bar Because of the flagging economy, businesses and professionals
More informationInformation Governance in the Cloud
Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and
More informationINTRODUCTION TO CLOUD STORAGE
University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What
More informationEmail Management Trends, Troubles, and Solutions
Email Management Trends, Troubles, and Solutions Kevin O Connor General Manager, Content Management & Archiving 1 Information Challenges Lead to Archiving Data Growth Digital Proliferation Cost Escalating
More informationWhat s the Path? Information Life-cycle part of Vendor Management
Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered
More informationin the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP
Digital PRESENTATION Data Archive TITLE and GOES Preservation HERE in the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP SNIA Legal Notice The material contained
More informationESI Risk Assessment: Critical in Light of the new E-discovery and notification laws
ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational
More informationManaging Legacy Data The Skeletons in the ESI Closet By Sharon D. Nelson, Esq. and John W. Simek 2011 Sensei Enterprises, Inc.
Managing Legacy Data The Skeletons in the ESI Closet By Sharon D. Nelson, Esq. and John W. Simek 2011 Sensei Enterprises, Inc. Lawyers and their clients are looking for expert advice on how to manage legacy
More informationConsiderations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
More informationB. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
More informationEXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015
EXECUTIVE BRIEF Third-Party Archiving Solutions Are Still Needed in Exchange Environments An Osterman Research Executive Brief sponsored by Published April 2015 SPON sponsored by Osterman Research, Inc.
More informationCloud Archiving. Paul Field Consultant
Paul Field Consultant SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature
More informationGames Cloud Vendors Play
International Municipal Lawyers Association, 2012 Mid Year Seminar, Washington, DC. Ethics Section Workshop 10:30 am 11:30 am, Sunday, April 22, 2012 Games Cloud Vendors Play From City of Los Angeles Agreement
More informationCalifornia Counties Information Security Programs A look into the progress and future plans across counties
CCISDA California Counties Information Services Directors Association California Counties Information Security Programs A look into the progress and future plans across counties 2010 Progress Report April
More informationHow To Answer A Question About Your Organization'S History Of Esi
Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.
More informationCloud Computing Questions to Ask
Cloud Computing Questions to Ask Pursuant to the Federal Cloud Computing Strategy 1 and the Cloud First policy, agencies are required to evaluate safe, secure cloud computing options before making any
More informationPredictability in E-Discovery
Predictability in E-Discovery Presented by: John G. Roman, Jr. National Manager, Practice Group Technology Services Nixon Peabody LLP Tom Barce Assistant Director of Practice Support Fulbright & Jaworski
More informationCloud computing. Examples
Cloud computing Cloud computing Web Systems and Algorithms Cloud Computing Chris Brooks Department of Computer Science University of San Francisco What is cloud computing? What separates it from: grid
More informationEthics in Technology and ediscovery Stuff You Know, But Aren t Thinking About
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business
More informationFederal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald
Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:
More informationDavid Smith, Chair State Bar MCLE Committee
On Jan. 28, the State Bar of Texas Board of Directors approved changes to the Texas Minimum Continuing Legal Education Regulations and Accreditation Standards proposed by the State Bar MCLE Committee.
More informationPractice Resource. Cloud computing checklist. Introduction
Practice Resource Cloud computing checklist Cloud computing offers many benefits to lawyers including the ability to access an exploding array of new software services and applications, the offloading
More informationInformation-centric Policy Management. Edgar StPierre, EMC
Information-centric Policy Management Edgar StPierre, EMC SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationTable 1 Question Answer Explanation Next Question 1. Sensitive data?
The decision tree shown in Figure 1 is useful to facilitate the decision making process of a cloud deployment model. For each question in Figure 1, refer to the explanation in Table 1. While there are
More informationIntroduction to Cloud Storage GOOGLE DRIVE
Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,
More informationA Hands-On Understanding of Cloud Services. Presented by: PMPA IT Committee
A Hands-On Understanding of Cloud Services Presented by: PMPA IT Committee Today s Agenda Introduction / Overview Benefits Risks of using Cloud Services Cloud Apps Overview/Preview Shop Example Hands-On
More informationStudy on Cloud security in Japan
Study on Cloud security in Japan 2011/February Professor Yonosuke HARADA INSTITUTE of INFORMATION SECURITY (C) ITGI Japan Content 1 Background 2 Survey 2.1 Respondents 2.2 User on cloud services 2.3 Risk
More informationEmail archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.
Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Data Sheet: Symantec.cloud Email Compliance Redefined Our new and improved version of redefines
More informationCopyright 2015 EMC Corporation. All rights reserved. 1
Copyright 2015 EMC Corporation. All rights reserved. 1 ROADMAP INFORMATION DISCLAIMER EMC makes no representation and undertakes no obligations with regard to product planning information, anticipated
More informationTitle: Number: Responsible Office: Last Revision:
Title: Number: Responsible Office: Last Revision: Cloud Computing: Opportunities Used Safely G4 004D Information Security and Privacy Office July 2011 The following guidance was developed and published
More informationAAT webinars what they are and how to take part
AAT webinars what they are and how to take part There are two stages you need to complete to take part in an AAT webinar. Registering Register for the event First you ll need to register with WebEx (the
More informationWith Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
More informationLive Chat User Guide. www.ctlawhelp.org
Live Chat User Guide www.ctlawhelp.org Welcome to Live Chat! Thank you for volunteering as a Live Chat Operator! Your work as an operator will help improve our service in providing free, understandable
More informationAdapting to the E-world
Adapting to the E-world In-House News: Adapting to the E-world By Amy E. Wong Need to find evidence? If you are an attorney, you will not likely be scouring through file cabinets to get the information
More informationinto HIPAA Ian Campbell and The information a service to Short Act, HIPAA "Administrative use to host contract with an Documentation regulations.
7 Things all Law Firms (and their IT staff) ) need to know about HIPAA Ian Campbell and Gavin W. Manes, Ph.D. The information contained herein is for informational purposes only as the public, and is not
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationSmart & Secure Technology Options for Cities
Smart & Secure Technology Options for Cities What comes to mind when you think of smart??? Me I am not an attorney I am a technology enthusiast I am paranoid I have trust issues I see the best intentions
More informationOnline/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
More informationHow To Manage Records In A Cloud
Retention & Disposition of Records Residing in a Public Cloud: A Risk Management Approach Patricia C. Franks, PhD, IGP, CA, CRM International Symposium October 17, 2014 to mitigate risk Not all information
More informationReview of Cloud Risks: What if
Review of Cloud Risks: What if Availability of Data Ownership of Data Security of Information Privacy Controls there is no way to prevent Twitter from sharing your data (like when & where you tweeted from)
More informationWhy can you trust Google?
Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of
More informationChapter 1. Getting to Know Email Archiving Systems
Chapter 1 Email Archiving Basics In This Chapter Understanding basic email archiving systems Choosing between on-premise, hosted, and hybrid solutions Understanding the storage benefits of email archiving
More information4/23/2014. E-Discovery. What is ESI? Discovery. Electronically Stored Information. The downside. Discovery generally. E-Discovery
E-Discovery Emily Keimig Lori Philips 303.299.8240 404.567.4377 ekeimig@shermanhoward.com lphillips@shermanhoward.com What is ESI? Electronically Stored Information The downside Discovery Discovery generally
More information