Future Proof Your ediscovery Practices

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Future Proof Your ediscovery Practices"

Transcription

1 FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica Watts, AGC and Discovery Counsel, HP George T. Tziahanas, VP Strategy, HP SaaS

2 Agenda Introductions Rise of the Machines Information Border Wars Criminal Investigations in a Digital World Model of Discovery in the Future

3 RISE OF THE MACHINES

4 History of Discovery Even with the advent of ediscovery ~20 years ago, a majority of relevant discoverable content has been human generated; that is likely to change. Pierson v. Post, 3 Cai. R. 175, 2 Am. Dec. 264 (N.Y. 1805)

5 Rise of the Machines Gartner Analytics Trends: The Internet of Things Really Matters for Communications Service Providers, December 2014

6 Wikipedia Launch Rise of the Machines Phases of the digital revolution Web 1.0: Destruction Web 2.0: User Creation? A 100 fold multiplication in the amount of data is a 10,000 fold multiplication in the number of patterns we can see in that data Philip Evans: Boston Consulting Group Fellow, Ted Talk

7 Rise of the Machines

8 Rise of the Machines Discovery tomorrow will rely less on what people said, and more on what their machines tell us

9 INFORMATION BORDER WARS

10 Microsoft Case Summary (In re Warrant) Dec 2013 Magistrate issues a warrant under the Stored Communications Act to Microsoft to produce content and non-content information about a user. The customer s were stored in Ireland on Microsoft servers. The non-content information about the (metadata about the account), is stored in the US. MS objected to producing data stored in Ireland, arguing that the warrant would require an extraterritorial search and seizure of data. The Government responded the issue is whether the content is in MS s custody or control. Magistrate rejected the motion to vacate. Found that warrants issued under the SCA are hybrids part warrant and part subpoena. Therefore the extraterritorial limits on warrants are not implicated and the relevant question is whether the data is in the provider s control. Further the search does not occur until the data is reviewed by US law enforcement, which would not happen until the data is in the US. MS appealed. The District Court upheld the Magistrate s ruling. The case is now before the 2 nd Circuit: 28 technology and media companies, 23 trade associations and advocacy groups and 35 professors of computer science filed legal papers in support of MS s opposition to the warrant.

11 Information Border Wars The US government s unilateral use of a search warrant to reach in another country puts both fundamental privacy rights and cordial international relations at risk. -Brad Smith, Microsoft GC It s a question of control, not a question of location of that information. U.S. District Judge Loretta Preska In this case, no such exposure takes place until the information is reviewed in the United States, and consequently no extraterritorial search has occurred. Magistrate's Decision The refusal of the U.S. Attorney to recognize that the account at issue is located in a foreign jurisdiction and subject to foreign data protection rules is not only offensive to the sensitivities of European citizens but also reinforces the already strong sentiment of many EU citizens that their data is not 'safe' when they use IT services offered by U.S. corporations. Jan Phillip Albrecht, EU MP

12 Not entirely new Societe Nationale Industrielle Aerospatiale v U.S Supreme Court held that a litigant must produce information located overseas even if it violates a blocking statute. Five factor test (1) the importance of the documents to the litigation; (2) the degree of specificity of the request; (3) whether the information originated in the United States; (4) the availability of alternative means of obtaining the information; and (5) the extent to which noncompliance with the request would undermine important interests of the United States, or undermine the interests of the state where the information is located.

13 What is new The Cloud, the WWW, users connected everywhere/ all of the time. Compelling production of someone else s data High sensitivities around the world to privacy concerns

14 Information Border Wars What is location Physical Virtual Access privileges Third-party When will you need information Prior to litigation (broader info. governance) ediscovery Law firm practices

15 Information Border Wars Important Considerations & Questions Companies should have a data map of what is stored in Europe on servers belonging to US cloud providers. Keep it up to date. Does this open demands from foreign countries to US companies that have presence in that country to information kept in the US Contract with cloud providers stipulate that the data must not be accessible from the US. If storing information abroad make it inaccessible in the US? Use partner company so not subject to US law? Encryption of data with customer having only encryption key

16 CRIMINAL INVESTIGATIONS IN THE DIGITAL AGE SEARCH FIRST ASK QUESTIONS LATER

17 Government Right to Corporate Data Government has broad rights to obtain corporate data in connection with criminal matters Rights subject to 4 th Amendment and ECPA Generally require facially valid legal process, which varies depending on type of data sought Government may also request Grand Jury or trial testimony from records custodians

18 Government Requests for Data Requests for Your Data Domestic Abroad (e.g. FCPA investigations) Requests for Third Party Data Your vendors or service partners Your customers or clients Requests to Third Parties for Your Data? Who has your data? Are they obligated to protect it?

19 More Data More Problems Government may search first ask questions later Recent circuit court decisions support broad, warrantless access to stored data Govt. using third-parties to conduct searches on their behalf (e.g. In re Microsoft, United States v. Warshak, 631 F.3d 266, 286 (6th Cir. 2010)) Govt. using new technologies with unclear precedent (e.g. cell signal tracking in United States v. Skinner, No (6th Cir. 2012)) But SCOTUS says there are limits The 4 th amendment still matters (Riley v. California, 134 S. Ct. 2473, 189 L. Ed. 2d 430, (2014))

20 Responding to Government Requests Have a process in place Point person Prompt attention/triage Assess facial validity and identify issues Pick Your Battles Consider: PR, Customer Relations, Risk of Poking the Bear Example: Google NSL fight re: notice to user Negotiate to limit scope To contain costs To avoid collateral issues

21 MODEL OF DISCOVERY IN THE FUTURE (AKA NOW)

22 Model of Discovery in the Future Case Study Facts Large multinational corporation engaged in business in the US, Europe and in Asia was the subject of a significant security breach. Hackers accessed and downloaded large volumes of protected information (PII, PHI, HR, confidential, etc.). In many instances, once downloaded, the data was completely wiped from the company systems. The information was not only stolen, but large parts were published on various public websites and in the press. Eventually the corporation secured its environment, but is now subject to several types of actions.

23 Model of Discovery in the Future Case Study Questions Based on high likelihood of civil and potentially criminal action, what data sources should be preserved? Given the case specifics, must we consider additional, less standard data sources? System Security Settings DNS Logs Server Logs Security Logs System/Security Patch and Update Histories Malware and Virus Protection Software Update and Incident Logs Firewall Logs, etc. Given these additional data sources may be large and mostly unstructured text files, how do they impact discovery (preservation, collection, and review)?

24 Model of Discovery in the Future Additional Questions Where is the Network Boundary? Third-Party or Partner Networks? Propagation of Local Risks? Additional Data Sources? Potential Liability? The U.S. DOJ has issued a subpoena to a third-party service provider hosting your communications information under the SCA; do you intervene? An EU sovereign entity has sent you a letter precluding you from sharing any non-public information transmitted under Safe Harbor in any civil or criminal proceeding; how do you respond?

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Barak Cohen, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica

More information

Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants

Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants Covington Webinar Series February 23, 2012 Cross-Border Discovery Issues for U.S. Litigants Marney Cheek Kristen Eichensehr Alex Hastings Ed Rippey Agenda Introduction (Rippey) Key Considerations in Cross-Border

More information

Recent Developments in Cybersurveillance

Recent Developments in Cybersurveillance David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information

More information

BYOD Privacy and Security in Europe

BYOD Privacy and Security in Europe BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice

LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice LSSA 2014 1 Use of Internet-Based Technologies in Legal Practice LSSA Guidelines Version 1.0 November 2014 2 Foreword Please

More information

E-Discovery in Practice: A Roadmap for Financial Institutions

E-Discovery in Practice: A Roadmap for Financial Institutions E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida

More information

WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH

WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH WHAT S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH 1 Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes

More information

TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT

TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of

More information

Updating the Law on Government Access to Your Online Data

Updating the Law on Government Access to Your Online Data SESSION ID: PNG-F02 Updating the Law on Government Access to Your Online Data Richard Salgado Director, Law Enforcement and Information Security Google Jim Dempsey Executive Director Berkeley Center for

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES

US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES May 11, 2012 Bijan E. Eghbal, Paris Browning E. Marean, San Diego Carol A.F. Umhoefer, Paris Agenda I. Overview of US discovery and document

More information

Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie

Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten MHC.ie Rewriting the Past Oisin Tobin otobin@mhc.ie Agenda 1. Background 2. Findings and impact: a) Jurisdiction b) A

More information

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information

More information

DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES

DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES By KYL attorneys Elizabeth P. Beazley and Tara B. Voss California Litigation Volume 25 Number 1 2012 This article was previously

More information

NLRB: NxGen Case Management, E-Government and E-Discovery

NLRB: NxGen Case Management, E-Government and E-Discovery NLRB: NxGen Case Management, By: James G. Paulsen, Assistant General Counsel, OGC and Bryan Burnett, Chief Information Officer, OCIO, National Labor Relations Board A. Next Generation (NxGen) Case Management

More information

(2) For production of public records or hospital medical records. Where the subpoena commands any custodian of public records or any custodian of hosp

(2) For production of public records or hospital medical records. Where the subpoena commands any custodian of public records or any custodian of hosp Rule 45. Subpoena. (a) Form; Issuance. (1) Every subpoena shall state all of the following: a. The title of the action, the name of the court in which the action is pending, the number of the civil action,

More information

Corporate Counsel Beware: Limits Of 'No Contact Rule'

Corporate Counsel Beware: Limits Of 'No Contact Rule' Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Counsel Beware: Limits Of 'No Contact Rule'

More information

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches.

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches. Leland Corky Dwight, Investigator Louisiana State Police ELECTRONIC ADVANCES AND THE LAW J. J. Williams, Jr., Staff Attorney Louisiana District Attorneys Association JJ@LDAA.ORG AGENDA Tangipahoa Case

More information

Cyber, PrivaCy. & Data SeCurity. www.mpplaw.com

Cyber, PrivaCy. & Data SeCurity. www.mpplaw.com Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but

More information

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data

More information

Legal Issues of Forensics in the Cloud

Legal Issues of Forensics in the Cloud Legal Issues of Forensics in the Cloud About Me Owner, Titan Info Security Group, LLC A Risk Management and Cyber Security Law Firm Partner, OnlineIntell, LLC Protecting online brands and reputation while

More information

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication. THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan

More information

STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION

STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION BEFORE THE SUBCOMMITTEE ON THE CONSTITUTION, CIVIL RIGHTS, AND CIVIL LIBERTIES UNITED STATES HOUSE OF REPRESENTATIVES HEARING

More information

Presented by: John Mockler, ITS Kate Dwyer, OLR

Presented by: John Mockler, ITS Kate Dwyer, OLR Presented by: John Mockler, ITS Kate Dwyer, OLR *Cloud: network of servers in different locations where each server has a different function *Three types of cloud service: *Infrastructure as a service

More information

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074 BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the

More information

A Brief Overview of ediscovery in California

A Brief Overview of ediscovery in California What is ediscovery? Electronic discovery ( ediscovery ) is discovery of electronic information in litigation. ediscovery in California is governed generally by the Civil Discovery Act. In 2009, the California

More information

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Preparing For and Responding to Government Investigations. Presented by Jeffrey Coopersmith

Preparing For and Responding to Government Investigations. Presented by Jeffrey Coopersmith Preparing For and Responding to Government Investigations Presented by Jeffrey Coopersmith Substantive Areas of Government Inquiry Areas Where the Gov t Routinely Conducts Investigations: Securities Fraud

More information

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011 E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.

More information

2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013

2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013 1 2013 E-DISCOVERY AMENDMENTS TO THE MASSACHUSETTS RULES OF CIVIL PROCEDURE BOSTON E-DISCOVERY SUMMIT 2013 DECEMBER 3, 2013 CONTEXT 2006 FEDERAL COURT E-DISCOVERY AMENDMENTS The 2006 Federal E-Discovery

More information

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Varun Badhwar Co-Founder; VP of Products & Solution Engineering 1 2013 CipherCloud All rights reserved. Agenda Introduction

More information

E-Discovery and EU Data Protection laws

E-Discovery and EU Data Protection laws Robert Bond robert.bond@speechlys.com Alexander Carter-Silk alexander.carter-silk@speechlys.com IP, Technology & Data Group E-Discovery and EU Data Protection laws Alex Carter-Silk, Partner, IP, Technology

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information

ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial

ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial February 10, 2016 The Role of Economics in Antitrust Law February 13, 2008 Copyright 2008, The Sedona Conference 1 1 The Sedona

More information

The Duke Conference: Bench-Bar-Academy Distinguished Lawyers Series Protected-Privacy Data Conference

The Duke Conference: Bench-Bar-Academy Distinguished Lawyers Series Protected-Privacy Data Conference CURRENT APPROACHES TAKEN IN U.S. LITIGATION TO COMPLY WITH POTENTIALLY CONFLICTING U.S. DISCOVERY OBLIGATIONS AND EU AND OTHER FOREIGN DATA PRIVACY STATUTES David W. Ichel, Simpson Thacher & Bartlett Peter

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)

More information

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP Presented by Frank H. Gassler, Esq. Written by Jeffrey M. James, Esq. Over the last few years,

More information

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business

More information

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act. Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for

More information

Drafting and Issuing Subpoenas: New Jersey

Drafting and Issuing Subpoenas: New Jersey View the online version at http://us.practicallaw.com/6-569-5426 Drafting and Issuing Subpoenas: New Jersey EZRA ROSENBERG, MICHELLE HART YEARY AND THOMAS J. MILLER, DECHERT LLP, WITH PRACTICAL LAW LITIGATION

More information

Cloudy Privacy Computing

Cloudy Privacy Computing Cloudy Privacy Computing Rebecca Herold, CIPP, CISSP, CISA, CISM, FLMI Final Draft for December 2008 CSI Alert Is cloud computing cumulous or cirrus? At Thanksgiving dinner, some of my relatives (none

More information

Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO.

Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO. Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO. 05-10037-GAO-1 UNITED STATES OF AMERICA v. GRANT BOYD, Defendant. O TOOLE,

More information

PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015

PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015 PROPOSED MINIMUM STANDARDS SET 1 FOR DISTRIBUTION June 22, 2015 Introduction The statute creating the Michigan Indigent Defense Commission (MIDC) provides: The MIDC shall implement minimum standards, rules,

More information

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use

More information

3 "C" Words You Need to Know: Custody - Control - Cloud

3 C Words You Need to Know: Custody - Control - Cloud 3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session

More information

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

Information For Tenants. About Evictions. And the Court Process

Information For Tenants. About Evictions. And the Court Process Information For Tenants About Evictions And the Court Process Prepared By: APPALACHIAN LEGAL SERVICES Page 2 "Information About Evictions" 1-800-834-0598 "Information About Evictions" Page 3 If you have

More information

Assembly Bill No. 5 CHAPTER 5

Assembly Bill No. 5 CHAPTER 5 Assembly Bill No. 5 CHAPTER 5 An act to amend Sections 2016.020, 2031.010, 2031.020, 2031.030, 2031.040, 2031.050, 2031.060, 2031.210, 2031.220, 2031.230, 2031.240, 2031.250, 2031.260, 2031.270, 2031.280,

More information

Cross-border Challenges for e-discovery

Cross-border Challenges for e-discovery 123 Cross-border Challenges for e-discovery Seth Berman* Cross-border electronic discovery (or disclosure as it s called in the UK context) is becoming increasingly common and increasingly fraught with

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015

More information

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key

More information

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys By Ronald S. Allen, Esq. As technology has evolved, the federal courts have

More information

Cross-Border EDiscovery

Cross-Border EDiscovery Cross-Border EDiscovery Machine translation use cases Given the increasing rate of globalization and risk of regulatory action, the likelihood that organizations will have to contend with cross-border

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON ) ) ) ) ) ) ) ) ) ) STIPULATION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON ) ) ) ) ) ) ) ) ) ) STIPULATION 1 1 1 1 1 BOURNE INTERNATIONAL, INC., v. UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON Plaintiff, CHET STOLER; SOUTH SEAS TRADING CO., Defendants. STIPULATION NO. C0-0RJB PROTECTIVE ORDER

More information

Department, Board, Or Commission Author Bill Number

Department, Board, Or Commission Author Bill Number BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION BRIAN Z. FRANCE, v. MEGAN P. FRANCE, Plaintiff, Defendant. Case No. 3:11-CV-00186 PLAINTIFF S MEMORANDUM OF LAW IN SUPPORT

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

HIDDEN CHALLENGES WITH CLOUD COMPUTING

HIDDEN CHALLENGES WITH CLOUD COMPUTING HIDDEN CHALLENGES WITH CLOUD COMPUTING When legal and forensic technology meet clouds TABLE OF CONTENTS Section 1: Introduction Section 2: Cloud Complexities Section 3: Cloud Access Section 4: Cloud Response

More information

E-Discovery: New to California 1

E-Discovery: New to California 1 E-Discovery: New to California 1 Patrick O Donnell and Martin Dean 2 Introduction The New Electronic Discovery Act The new Electronic Discovery Act, Assembly Bill 5 (Evans), has modernized California law

More information

Large Law Firm structure

Large Law Firm structure Large Law Firm structure Senior Partners ultimate control over the firm Junior Partners all the partners own the firm together Although, how they divide profits depends on their agreement, which factors

More information

Scholarship @ GEORGETOWN LAW. Georgetown University Law Center

Scholarship @ GEORGETOWN LAW. Georgetown University Law Center Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2010 Electronic Communications Privacy Act and the Revolution in Cloud Computing : Hearing Before the Subcomm. on the Constitution, Civil Rights,

More information

Information Security Handbook

Information Security Handbook Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...

More information

Bring Your Own Device Security and Privacy Legal Risks

Bring Your Own Device Security and Privacy Legal Risks Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,

More information

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law

More information

Outline to HIPAA presentation

Outline to HIPAA presentation Outline to HIPAA presentation I) Overview of the HIPAA Privacy Rule regulations that relate to obtaining a person s medical records for court proceedings and law enforcement purposes. A) Entities covered

More information

An Investigator Appears: Are You Ready? Presentation Slides

An Investigator Appears: Are You Ready? Presentation Slides Chapter 1 An Investigator Appears: Are You Ready? Presentation Slides Tom E. Lindley Perkins Coie LLP Portland, Oregon Managing Environmental Enforcement Risk 1 ii An Investigator Appears: Are You Ready?

More information

HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com

HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates scates@vormetric.com Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide

More information

You've Been Served: A Guide For Accountants

You've Been Served: A Guide For Accountants Portfolio Media. Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com You've Been Served: A Guide For Accountants

More information

The Effect of Product Safety Regulatory Compliance

The Effect of Product Safety Regulatory Compliance PRODUCT LIABILITY Product Liability Litigation The Effect of Product Safety Regulatory Compliance By Kenneth Ross Product liability litigation and product safety regulatory activities in the U.S. and elsewhere

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

Fairfax County Circuit Court Preferred Criminal Law Practices

Fairfax County Circuit Court Preferred Criminal Law Practices Page 1 Fairfax County Circuit Court Preferred Criminal Law Practices I. Objectives 1. To expedite the efficient resolution of criminal cases. 2. To reduce the number of unnecessary continuances while providing

More information

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia

More information

WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT. Presenting the results from BDO s inaugural Inside E-Discovery Survey

WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT. Presenting the results from BDO s inaugural Inside E-Discovery Survey WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT Presenting the results from BDO s inaugural Inside E-Discovery Survey 1 ACEDS Membership Benefits Training, Resources and Networking for

More information

Guilford Medical Associates, P.A.

Guilford Medical Associates, P.A. Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE

More information

Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION

Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION SALT LAKE CITY CORPORATION, a Utah municipal corporation;

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Electronic Discovery: Litigation Holds, Data Preservation and Production

Electronic Discovery: Litigation Holds, Data Preservation and Production Electronic Discovery: Litigation Holds, Data Preservation and Production April 27, 2010 Daniel Munsch, Assistant General Counsel John Lerchey, Coordinator for Incident Response 0 E-Discovery Rules Federal

More information

Placing the Attorney-Client Privilege at Risk in Employment Disputes: How to Avoid a Waiver. Presented By: Matt Sheldon Wayne Stansfield

Placing the Attorney-Client Privilege at Risk in Employment Disputes: How to Avoid a Waiver. Presented By: Matt Sheldon Wayne Stansfield Placing the Attorney-Client Privilege at Risk in Employment Disputes: How to Avoid a Waiver Presented By: Matt Sheldon Wayne Stansfield Overview General rules regarding privilege Common problems associated

More information

Digital Evidence Collection and Use. CS 585 Fall 2009

Digital Evidence Collection and Use. CS 585 Fall 2009 Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers

More information

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, Sabrina.segal@usitc.gov Reference

More information

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq. Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity Amy Mushahwar, Esq. What s New? Not That Much. Some have their heads in the cloud we prefer to stay down in the weeds and know

More information

THE NEW WORLD OF E-DISCOVERY

THE NEW WORLD OF E-DISCOVERY THE NEW WORLD OF E-DISCOVERY Ralph Losey: partner and National e-discovery Counsel of Jackson Lewis LLP, a labor & employment firm with 700 lawyers and 46 offices nationwide. JacksonLewis.com author of

More information

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric

More information

Friday 31st October, 2008.

Friday 31st October, 2008. Friday 31st October, 2008. It is ordered that the Rules heretofore adopted and promulgated by this Court and now in effect be and they hereby are amended to become effective January 1, 2009. Amend Rules

More information

General District Courts

General District Courts General District Courts To Understand Your Visit to Court You Should Know: It is the courts wish that you know your rights and duties. We want every person who comes here to receive fair treatment in accordance

More information

Stored Wire and Electronic Communication and Transactional Records Access. Table of Contents

Stored Wire and Electronic Communication and Transactional Records Access. Table of Contents United States Secret Service Directives System Stored Wire and Electronic Communication and Transactional Records Access Table of Contents Introduction 1 Definition 1 Disclosure of Communication or Records

More information

Employee Relations. Howard S. Lavin and Elizabeth E. DiMichele

Employee Relations. Howard S. Lavin and Elizabeth E. DiMichele VOL. 34, NO. 4 SPRING 2009 Employee Relations L A W J O U R N A L Split Circuits Does Charging Party s Receipt of a Right-to-Sue Letter and Commencement of a Lawsuit Divest the EEOC of its Investigative

More information

GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!

GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems Author: Eric A. Hibbard, Hitachi Data Systems SNIA Legal Notice

More information

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,

More information

Vehicle Black Boxes. With every aviation accident involving an aircraft of sufficient

Vehicle Black Boxes. With every aviation accident involving an aircraft of sufficient Mary Ellen Morris Miller & Martin PLLC 1200 One Nashville Place 150 Fourth Avenue, North Nashville, Tennessee 37219-2433 Vehicle Black Boxes With every aviation accident involving an aircraft of sufficient

More information