NOTES SOCIAL MEDIA: ITS CHALLENGES AND OPPORTUNITIES. Cohasset Associates, Inc Managing Electronic Records Conference 27.1
|
|
- Julian Gardner
- 8 years ago
- Views:
Transcription
1 SOCIAL MEDIA: ITS CHALLENGES AND OPPORTUNITIES Jonathan M. Redgrave, Redgrave LLP Rakesh Madhava, Nextpoint May 21, 2014 SOCIAL MEDIA: UBIQUITOUS & OMNIPRESENT SOCIAL MEDIA: INTERNAL Managing Electronic Records Conference 27.1
2 SOCIAL MEDIA: INTERNAL PROS Ease of communication Business efficiencies Reduced volume CONS People say the darndest things Challenges in monitoring and curating ediscovery Challenges (more later) 4 POLICIES AND PRACTICES: INTERNAL Clear rules on what employees can and should post, keeping in mind First Amendment rights and NLRB rulings Self governed or moderated sites Remind that general codes of conduct and anti harassment policies apply Consequences for failure to comply Constantly revisit and reassess 5 SOCIAL MEDIA: EXTERNAL Managing Electronic Records Conference 27.2
3 SOCIAL MEDIA: EXTERNAL PROS Vast audience Increased visibility Increased customer interaction CONS Questions regarding Possession, Custody & Control Need to monitor non sponsored communication Potential Rouge IT ediscovery Challenges (more later) 7 POLICIES AND PRACTICES: EXTERNAL Make it simple and understandable Which platform(s) is appropriate for business use Who in the business will own the site (dedicated curators) Branding guidelines Content approval process Develop policies regarding factual inaccuracies, negative comments, offensive content but make sure they are in line with emerging law Determine whether a moderator will be required to detect, escalate, and/or respond to issues. In event of customer complaints, consider contacting that customer via another channel (e.g., in app 1:1 messaging) to address issue What third parties will be involved 8 POLICIES AND PRACTICES: EXTERNAL What are the risks and how will those risks be mitigated - Develop and publish community guidelines - Policies on responding to posts and responding to notice Address information management needs - Records management - Data privacy - Crisis management - Regulatory compliance - Legal obligations Managing Electronic Records Conference 27.3
4 EMPLOYERS AND EMPLOYEES State lawmakers began introducing legislation in 2012 to prevent employers from requesting or requiring passwords to personal social media accounts to get or keep a job. Legislation has been enacted in 15 states. Legislation regarding employee protections has been introduced or is pending in at least 28 states. TYPICAL SOCIAL MEDIA PROTECTION LEGISLATION Prohibits employers from requesting or requiring an employee or applicant to disclose social media account login information or allowing observation of a social media account. Some Exceptions: - Employer may review information that is publicly available - Employer may require access to information from devices an employer pays for - Employer may require access to investigate with reasonable cause the alleged transfer of company proprietary or confidential information, among others. May also apply to educational institutions and landlords. NATIONAL LABOR RELATIONS ACT The National Labor Relations Act protect the rights of employees to act together to address unfavorable working conditions, whether or not they are part of a union. Generally, employers social media policies violate the National Labor Relations Act ( NLRA ) if the policy prevents or discourages an employee from engaging in protected concerted activity Managing Electronic Records Conference 27.4
5 THE NLRB ON SOCIAL MEDIA NLRB General Counsel released 3 memos in 2011 and 2012 detailing the results of dozens of social media case investigations. Two takeaways: - Employer policies should not be so broad that they prohibit protected activity. - Employees comments on social media are generally not protected if they are complaint s or gripes not made in relation to group activities. STORED COMMUNICATIONS ACT The Stored Communications Act ( SCA ) protects an individual s right to privacy over electronic communications held in storage by third parties. The SCA prohibits RCS and ECS providers from knowingly divulg[ing] to any person or entity the contents of a communication while in electronic storage by that service... In storage may mean unopened (exception 9th Cir.). The SCA has been interpreted broadly enough to encompass social media content, such as private YouTube videos, wall posts and private messaging on Facebook and MySpace, and restricted electronic bulletin boards. EMPLOYERS AND THE SCA Employers may not access such electronic communications even if log in and password information is discovered on or recovered from company owned devices or computers. Consent to access social media accounts cannot be obtained through coercion, fraud, or when the consenting party is under duress, including when there is fear of an adverse employment action Managing Electronic Records Conference 27.5
6 APPLY EXISTING INFORMATION GOVERNANCE FRAMEWORK Social media simply provides another method to present, share, and collaborate about data. Social media combines existing data sources: - Dynamic web pages - File sharing - Messaging - Versioning Apply lessons learned from these sources to properly govern social media. Don t reinvent the wheel. GENERAL RETENTION CONSIDERATIONS Does the application allow the business to set data retention rules that could be applied to users and/or content? Does the application support the auto classification or tagging of data objects based upon content? Does the application allow for the export of data objects and metadata to other systems for long retention periods? Can the application apply rules to delete content after expiration of retention parameters? Can the application record individual actions and content created, authored, or edited by a user Can the application record usage and the content that an individual had access to (e.g., could have viewed)? PILLARS OF EDISCOVERY RELEVANCE PROPORTIONALITY PRIVACY PRESERVATION 2014 Managing Electronic Records Conference 27.6
7 RELEVANCE Pursuant to FRCP 26(b), requesting party should make a threshold showing that the requested information is reasonably calculated to lead to the discovery of admissible evidence Public postings may be used to show the relevance of private postings Courts have characterized social media as a file containing everything about me, however, that does not mean that the court will grant the requesting party access to rummage through the entire site Requests for social media content should be specifically tailored to target the relevant content, the same as any other request for production 19 PROPORTIONALITY As with all discovery, discovery of social media may be prohibited if it is burdensome or oppressive Social media discovery cannot be used as a fishing expedition Argue against reconstructing a page exactly how it looked at a specific point in time. Social Media pages are by design incredibly dynamic. It may be near impossible to reconstruct the look and feel of a page from 7 months ago (e.g., Facebook page) 20 PRIVACY No reasonable expectation of privacy even if the social site is made private by the user, it may by subject to discovery Some courts have provided for in camera review of sensitive information Friending is not an appropriate way to gain access to private information Corporations do not have a right of personal privacy for purposes of FOIA Managing Electronic Records Conference 27.7
8 PRIVACY Be aware that some general preservation tools may not preserve all metadata or utility of a social media site Record of the capture and export of data for chain of custody purposes 22 ULTIMATE TAKEAWAYS The amount of communication occurring through social media and web 2.0 sites will continue to increase The importance of this information to understand personal and corporate decisions and actions will continue to increase Courts and regulators will demand increased accountability for the management of social media data ediscovery and the duty to preserve information relevant to litigation will continue to drive many RIM and IG policies and practices Emerging domestic and expanding foreign protections regarding personal privacy may impact retention and preservation capabilities and responses ULTIMATE TAKEAWAYS In light of these trends, organizations should: - Be proactive to understand current and future social media endeavors (internal and external) - Be diligent to establish meaningful, practical and enforceable policies and practices to capture manage information on social media including content for records retention - Be knowledgeable regarding the technical aspects of how social media content is stored and the related preservation/collection tools - Be vigilant to recognize and adapt to new regulations, requirements and technologies 2014 Managing Electronic Records Conference 27.8
Want To Be My Friend? Social Networking & Ediscovery
Want To Be My Friend? Social Networking & Ediscovery Michael A. Avalos, Esq., Assistant General Counsel, AIG Jonathan E. Sachs, Esq., Senior Account Executive, Kroll Ontrack July 23, 2014 Discussion Overview
More informationOutline of Session 12/2/2013. Social Media & Government Legal and Ethical Issues. Part 1 - Legal Issues More Questions than Answers?
Social Media & Government Legal and Ethical Issues Indiana Legal & Ethics Conference December 4, 2013 Presented by: Julie A. Tappendorf Ancel Glink, Chicago Outline of Session Part 1 Legal Issues with
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationLE.201 Employee Privacy Rights in the Electronic/Social Media Age
LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationCorporate Reputation Management Vs. Employee Privacy
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Reputation Management Vs. Employee Privacy
More informationSTI GROUP DISCUSSION WRITTEN PROJECT
STI GROUP DISCUSSION WRITTEN PROJECT ediscovery FOR GIAC ENTERPRISES - DATA CLASSIFICATION, RETENTION, AND LITIGATION POLICIES AND PROCEDURES Version 1.1 September 22, 2007 Team: Russell Meyer, Brad Ruppert
More informationElectronic Data What Does it Include, its Retention and Disclosure
Electronic Data What Does it Include, its Retention and Disclosure Electronic Data What Does it Include, its Retention and Disclosure MML Legal Track Wednesday, September 19, 2007 Karrie Zeits, City Attorney,
More informationReduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY
2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,
More informationE-Discovery in Practice: A Roadmap for Financial Institutions
E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida
More informationEffective Date: Oct. 27, 2009... 1
Policy Title: Office of Information Technology Email Usage and Retention Policy Policy No.: 7010 Rev.: 0 Effective Date: Oct. 27, 2009 Last Revision: Oct. 27, 2009 Responsible Office: Responsible Official:
More informationSecretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor
Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,
More informationDiscovery of Social Media: The Seventh Circuit E-Discovery Pilot Program. Ronald L. Lipinski, Seyfarth Shaw LLP Jay C. Carle, Seyfarth Shaw LLP
Discovery of Social Media: The Seventh Circuit E-Discovery Pilot Program Ronald L. Lipinski, Seyfarth Shaw LLP Jay C. Carle, Seyfarth Shaw LLP 04/05/2013 Before we get started I. Intro a) Definition &
More informationDOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
More informationOFFICE OF EXTERNAL RELATIONS
OFFICE OF EXTERNAL RELATIONS Social Media Policy I. Purpose Social media encompass a wide variety of Internet networking and communication tools, including but not limited to sites such as Facebook and
More informationSocial Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
More informationComputer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
More informationSocial Media in the Workplace. Stacey L. Smiricky Partner, Labor & Employment Group
Social Media in the Workplace Stacey L. Smiricky Partner, Labor & Employment Group Lessons Learned Employee who called in sick later places a status update on his Facebook page announcing sick day at Wrigley
More informationEmployment Law Issues in Social Media
Employment Law Issues in Social Media John Nadolenco Partner, Los Angeles Andrew Rosenman Partner, Chicago (213) 229-5173 (312) 701-8744 jnadolenco@mayerbrown.com arosenman@mayerbrown.com Mayer Brown is
More informationwww.salixdata.com 513-381-2679
Electronic Discovery Presented by: Jonathan Adams www.salixdata.com 513-381-2679 Our Goal Explain E-Discovery in layman s terms Equip you to be able to add value to your organization SALIX is the region
More informationSocial Marketing & Liability
Social Marketing & Liability Fred E. Karlinsky, Esq. Co-Chair, Insurance Regulatory & Transactions Practice Shareholder, Greenberg Traurig Louisiana Insurers Conference Insurance Compliance Seminar August
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
More informationCOUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationTaking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
More informationESI Risk Assessment: Critical in Light of the new E-discovery and notification laws
ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational
More informationHow To Use Social Media To Help Your Business
Ethics of Social Media Marketing for Law Firms Presented by Paul J. Kazaras, Esq. (Philadelphia Bar Association) Gina F. Rubel, Esq., Moderator (Furia Rubel Communications, Inc. ) Apps. Blogs Chat Rooms
More informationELECTRONIC DISCOVERY. Dawn M. Curry
ELECTRONIC DISCOVERY Dawn M. Curry Nutter McClennen & Fish LLP World Trade Center West 155 Seaport Boulevard Boston, Massachusetts 02210 Telephone 617.439.2000 www.nutter.com E-Discovery Facts 93-99% of
More informationMetadata, Electronic File Management and File Destruction
Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information
More informationInformation Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
More informationMaking Sense of E-Discovery: 10 Plain Steps for Producing ESI
Making Sense of E-Discovery: 10 Plain Steps for Producing ESI The following article provides a practical guide to producing electronically stored information (ESI) that lawyers can apply immediately in
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationAny and all documents Meets Electronically Stored Information: Discovery in the Electronic Age
Any and all documents Meets Electronically Stored Information: Discovery in the Electronic Age Panel Members Judge Ronald L. Buch, Moderator Panelists The Honorable Paul W. Grimm U.S. District Court for
More informationHealth Information Privacy Refresher Training. March 2013
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
More informationNightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
More informationUNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia
More informationThe Financial Advisor s Guide to Social Media Regulations
The Financial Advisor s Guide to Social Media Regulations For US, UK and Canada With the right preparation and attention to detail, firms should feel confident about their ability to reach out to customers
More informationSubstitute Senate Bill No. 426. Public Act No. 15-6 AN ACT CONCERNING EMPLOYEE ONLINE PRIVACY.
Public Act No. 15-6 AN ACT CONCERNING EMPLOYEE ONLINE PRIVACY. Be it enacted by the Senate and House of Representatives in General Assembly convened: Section 1. (NEW) (Effective October 1, 2015) (a) For
More informationUnderstanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
More informationAlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
More informationThis is not your grandfather s litigation. BUT. ediscovery Services are not legal services.
This is not your grandfather s litigation. BUT ediscovery Services are not legal services. TYPES OF ETHICAL ISSUES THAT MIGHT ARISE IN THE CONTEXT OF ediscovery: Document collection Privacy issues Inadvertent
More informationA White Paper from AccessData Group. The Future of Mobile E-Discovery
A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+
More informationSocial Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
More informationR U Looking @ My Cookies? Sexual Harassment In The Age Of Technology
R U Looking @ My Cookies? Sexual Harassment In The Age Of Technology R U LOOKING @ MY COOKIES? SEXUAL HARASSMENT IN THE AGE OF TECHNOLOGY MODERATOR: Mercedes Colwin, Esq. - Managing Partner - New York
More informationA White Paper from AccessData Group. The Future of Mobile E-Discovery
A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+
More informationHong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014
CLIENT MEMORANDUM Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014 August 28, 2014 Mandatory application of e-discovery Mandatory application of e-discovery to
More informationSocial Media Privacy Act
Social Media Privacy Act Leadership Council November 19, 2014 Presented By: Luanna Putney, Associate Chancellor & Senior Advisor to the Chancellor Elisabeth Gunther, Campus Counsel Social Media Privacy
More informationInhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie
Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten MHC.ie Rewriting the Past Oisin Tobin otobin@mhc.ie Agenda 1. Background 2. Findings and impact: a) Jurisdiction b) A
More informationQuestions And Answers. Electron ic Monitoring in the Workplace
Questions And Answers Electron ic Monitoring in the Workplace Kevin J. Smith and Rachel J. Tischler Employers and employment attorneys alike have been concerned about the legal limits of electronic monitoring
More informationNow that the program is up and running: Reaching Consumers via Social Media
Now that the program is up and running: Reaching Consumers via Kathy Harman-Stokes, J.D., CIPP, CIPP/G Chief Privacy Officer Commodity Futures Trading Commission Hypothetical: Website and database have
More informationSnapchat Law Enforcement Guide
Snapchat Law Enforcement Guide Last Updated: June 1, 2015 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snapchat, Inc. 63 Market Street
More informationSocial Networking and the Public Employer. Should Governments be in the Social Network Business? Agenda
Social Networking and the Public Employer Should Governments be in the Social Network Business? Jeanine Hummer City Attorney City of Upper Arlington Agenda Should Governments be in the Social Network Business?
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationFitCause Privacy Policy
FitCause Privacy Policy EFFECTIVE DATE: June 19, 2013 FuelGooder Inc. d/b/a FitCause ( FitCause ) values your privacy. FitCause is a social fundraising platform empowering individuals to turn their exercising
More informationMiguel Ortiz, Sr. Systems Engineer. Globanet
Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely
More informationADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide
More informationHow To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationRequirements made under the Intermediaries Byelaw
Chapter 2 Requirements made under the Intermediaries Byelaw Section 1 Delegated Underwriting Registers of coverholders and registered binding authorities Part B of the Intermediaries Byelaw Format and
More informationArticle originally appeared in the Fall 2011 issue of The Professional Engineer
Article originally appeared in the Fall 2011 issue of The Professional Engineer Electronic Discovery in Litigation By Douglas P. Jeremiah, P.E., Esq. Your firm is involved in litigation and you get the
More informationSENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen
SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill
More informationA Privacy and Data Security Checklist for All
July 2015 Many companies know they have to follow privacy and data security rules. Companies in the health care industry know about Health Insurance Portability and Accountability Act (HIPAA). Financial
More informationSocial Networking Risks and Rewards
Social Networking Risks and Rewards Presented By: Amber Richard, Director of Interactive Marketing, YMCA of the Greater Twin Cities Natalie Lenz, Human Resources Generalist, YMCA, of the Greater Twin Cities
More informationCase Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
More informationHagan Barrett & Langley PLLC Lawyers for Leaders
Hagan Barrett & Langley PLLC OUR FIRM Whether they are already at the top of their industry, company, or organization, or have strong aspirations to achieve a higher level of success, our clients are all
More informationSolution Brief. Archiving from Office 365 for Compliance and ediscovery. 1) Capture Everything
Solution Brief Archiving from Office 365 for Compliance and ediscovery Barracuda Message Archiver enhances Office 365 with the additional functionality needed to support sound information governance practices.
More informationSocial Networking Policy
Insert Academy Logo Here Social Networking Policy March 2014 Consultation Period: 7 th October 2013 16 th December 2013 Date Approved by NET: 18 th December 2013 Next Review Date: January 2015 1 Social
More informationE-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers
MARCH 7, 2007 E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers By Tara Daub and Christopher Gegwich News of the recent amendments to the Federal Rules of Civil Procedure
More informationINFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
More informationThe E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
More informationHP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act
PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the
More informationNiagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
More informationInformation Governance
Information Governance The New Records Management Rudy Moliere Director, Information Goverance & Records Management Terrence J. Coan, CRM Senior Director Information Management Practice Agenda Introductions
More information51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013
SENATE BILL 1ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, INTRODUCED BY Joseph Cervantes 1 ENDORSED BY THE COURTS, CORRECTIONS AND JUSTICE COMMITTEE AN ACT RELATING TO CIVIL ACTIONS; CLARIFYING
More informationNEW YORK CITY FALSE CLAIMS ACT Administrative Code 7-801 through 7-810 *
NEW YORK CITY FALSE CLAIMS ACT Administrative Code 7-801 through 7-810 * 7-801. Short title. This chapter shall be known as the "New York city false claims act." 7-802. Definitions. For purposes of this
More informationE-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.
More informationPitfalls of Social Media in the Workplace
Pitfalls of Social Media in the Workplace Presented by Michael C. Terrell Taft Stettinius & Hollister LLP 1 Overview of Social Media Popular Sites: Facebook Twitter LinkedIn Pinterest Google Tumblr Instagram
More informationCounty of Orange County Executive Office Information and Technology PURPOSE. County Social Media Use Policy and Procedure SOCIAL MEDIA USE
County of Orange County Executive Office Information and Technology PURPOSE SOCIAL MEDIA USE County Social Media Use Policy and Procedure Subject: Number: County Social Media Use Policy SM-001 Approved
More informationImmigration and Customs Enforcement Forensic Analysis of Electronic Media
for the Immigration and Customs Enforcement Forensic Analysis of Electronic Media DHS/ICE/PIA-042 May 11, 2015 Contact Point Peter T. Edge Executive Assistant Director Homeland Security Investigations
More informationTop Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities
Top Issues for Safeguarding Brand Reputation When Engaging In Social Media By: Alan L. Friel, Akash Sachdeva, Jesse Brody and Jatinder Bahra Social media has changed the way people communicate, and enabled
More informationCase 2:06-cv-03669-DRH-ETB Document 26 Filed 11/30/2006 Page 1 of 9 CV 06-3669 (DRH) (ETB)
Case 2:06-cv-03669-DRH-ETB Document 26 Filed 11/30/2006 Page 1 of 9 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK -------------------------------------------------------------------------X
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
More informationRPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE. EFFECTIVE AS OF: August 12, 2015
RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE EFFECTIVE AS OF: August 12, 2015 This Notice sets forth the principles followed by RPM International Inc.,
More informationOVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor astorey@rudman-winchell.com I. USE OF INFORMATION DURING HIRING PROCESS
More informationElectronic Discovery How can I be prepared? September 2010
Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic
More informationSocial Media in the Workplace: Avoiding Legal Pitfalls
Social Media in the Workplace: Avoiding Legal Pitfalls Todd F. Palmer & Timothy J. Connors Calfee, Halter & Griswold LLP February 13, 2013 Social Media: The Basics Social Media: The Basics Social Media:
More information3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
More informationFacebook E-Discovery Ruling Only Tip Of The Iceberg
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@portfoliomedia.com Facebook E-Discovery Ruling Only Tip Of The
More informationTODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
More informationPolicies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
More informationChief Clerk of the Assembly. Secretary of the Senate. Private Secretary of the Governor
Assembly Bill No. 22 Passed the Assembly September 8, 2011 Chief Clerk of the Assembly Passed the Senate September 8, 2011 Secretary of the Senate This bill was received by the Governor this day of, 2011,
More informationHealth Care & Social Media. Best Practice Marketing Strategies
Health Care & Social Media Best Practice Marketing Strategies Speakers Jennifer R. Breuer Partner Drinker Biddle & Reath, LLP Jennifer.Breuer@dbr.com (312) 569-1256 Darren S. Cahr Partner Drinker Biddle
More informationUNITED STATES COMMODITY FUNDS LLC CODE OF BUSINESS CONDUCT AND ETHICS
UNITED STATES COMMODITY FUNDS LLC CODE OF BUSINESS CONDUCT AND ETHICS TABLE OF CONTENTS Page Introduction... 1 Purpose of the Code... 1 Conflicts of Interest... 1 Corporate Opportunities... 2 Public Disclosure...
More informationWhistleblower Policies Under the Nonprofit Revitalization Act of 2013. Attorney General Eric Schneiderman Charities Bureau www.charitiesnys.
Whistleblower Policies Under the Nonprofit Revitalization Act of 2013 Attorney General Eric Schneiderman Charities Bureau www.charitiesnys.com Guidance Document 2015-5, V. 1.0 Issue date: April 13, 2015
More information10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
More informationKalispell Social Media Use Policy
This policy approved by Council as an amendment to the City of Kalispell Personnel Handbook on April 20, 2015 (Resolution 5716). Purpose The purpose of this policy is to guide city employees in the proper,
More informationTESTIMONY OLIVER IRELAND
TESTIMONY OF OLIVER IRELAND BEFORE THE SUBCOMMITTEE ON FINANCIAL INSTITUTIONS AND CONSUMER CREDIT OF THE UNITED STATES HOUSE OF REPRESENTATIVES COMMITTEE ON FINANCIAL SERVICES EXAMINING LEGISLATIVE PROPOSALS
More informationOutlaw v. Willow Oral Argument Motions for Sanctions
William Mitchell E-Discovery Symposium Outlaw v. Willow Oral Argument Motions for Sanctions Mary T. Novacheck, Esq. Partner Bowman and Brooke LLP Outlaw's Motion: Cost Shift Vendor Fees to Willow Prior
More informationEnCase Enterprise For Corporations
TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,
More informationBDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
More informationJPMorgan Chase Supplier Code of Conduct
PMorgan Chase Supplier Code of Conduct Purpose This Code sets out the minimum principles that we expect You to follow in Your provision of products and services to PMorgan Chase Bank & Co. and any of our
More information