Future Proof Your ediscovery Practices
|
|
|
- Fay Hodges
- 10 years ago
- Views:
Transcription
1 FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica Watts, AGC and Discovery Counsel, HP George T. Tziahanas, VP Strategy, HP SaaS
2 Agenda Introductions Rise of the Machines Information Border Wars Criminal Investigations in a Digital World Model of Discovery in the Future
3 RISE OF THE MACHINES
4 History of Discovery Even with the advent of ediscovery ~20 years ago, a majority of relevant discoverable content has been human generated; that is likely to change. Pierson v. Post, 3 Cai. R. 175, 2 Am. Dec. 264 (N.Y. 1805)
5 Rise of the Machines Gartner Analytics Trends: The Internet of Things Really Matters for Communications Service Providers, December 2014
6 Wikipedia Launch Rise of the Machines Phases of the digital revolution Web 1.0: Destruction Web 2.0: User Creation? A 100 fold multiplication in the amount of data is a 10,000 fold multiplication in the number of patterns we can see in that data Philip Evans: Boston Consulting Group Fellow, Ted Talk
7 Rise of the Machines
8 Rise of the Machines Discovery tomorrow will rely less on what people said, and more on what their machines tell us
9 INFORMATION BORDER WARS
10 Microsoft Case Summary (In re Warrant) Dec 2013 Magistrate issues a warrant under the Stored Communications Act to Microsoft to produce content and non-content information about a user. The customer s were stored in Ireland on Microsoft servers. The non-content information about the (metadata about the account), is stored in the US. MS objected to producing data stored in Ireland, arguing that the warrant would require an extraterritorial search and seizure of data. The Government responded the issue is whether the content is in MS s custody or control. Magistrate rejected the motion to vacate. Found that warrants issued under the SCA are hybrids part warrant and part subpoena. Therefore the extraterritorial limits on warrants are not implicated and the relevant question is whether the data is in the provider s control. Further the search does not occur until the data is reviewed by US law enforcement, which would not happen until the data is in the US. MS appealed. The District Court upheld the Magistrate s ruling. The case is now before the 2 nd Circuit: 28 technology and media companies, 23 trade associations and advocacy groups and 35 professors of computer science filed legal papers in support of MS s opposition to the warrant.
11 Information Border Wars The US government s unilateral use of a search warrant to reach in another country puts both fundamental privacy rights and cordial international relations at risk. -Brad Smith, Microsoft GC It s a question of control, not a question of location of that information. U.S. District Judge Loretta Preska In this case, no such exposure takes place until the information is reviewed in the United States, and consequently no extraterritorial search has occurred. Magistrate's Decision The refusal of the U.S. Attorney to recognize that the account at issue is located in a foreign jurisdiction and subject to foreign data protection rules is not only offensive to the sensitivities of European citizens but also reinforces the already strong sentiment of many EU citizens that their data is not 'safe' when they use IT services offered by U.S. corporations. Jan Phillip Albrecht, EU MP
12 Not entirely new Societe Nationale Industrielle Aerospatiale v U.S Supreme Court held that a litigant must produce information located overseas even if it violates a blocking statute. Five factor test (1) the importance of the documents to the litigation; (2) the degree of specificity of the request; (3) whether the information originated in the United States; (4) the availability of alternative means of obtaining the information; and (5) the extent to which noncompliance with the request would undermine important interests of the United States, or undermine the interests of the state where the information is located.
13 What is new The Cloud, the WWW, users connected everywhere/ all of the time. Compelling production of someone else s data High sensitivities around the world to privacy concerns
14 Information Border Wars What is location Physical Virtual Access privileges Third-party When will you need information Prior to litigation (broader info. governance) ediscovery Law firm practices
15 Information Border Wars Important Considerations & Questions Companies should have a data map of what is stored in Europe on servers belonging to US cloud providers. Keep it up to date. Does this open demands from foreign countries to US companies that have presence in that country to information kept in the US Contract with cloud providers stipulate that the data must not be accessible from the US. If storing information abroad make it inaccessible in the US? Use partner company so not subject to US law? Encryption of data with customer having only encryption key
16 CRIMINAL INVESTIGATIONS IN THE DIGITAL AGE SEARCH FIRST ASK QUESTIONS LATER
17 Government Right to Corporate Data Government has broad rights to obtain corporate data in connection with criminal matters Rights subject to 4 th Amendment and ECPA Generally require facially valid legal process, which varies depending on type of data sought Government may also request Grand Jury or trial testimony from records custodians
18 Government Requests for Data Requests for Your Data Domestic Abroad (e.g. FCPA investigations) Requests for Third Party Data Your vendors or service partners Your customers or clients Requests to Third Parties for Your Data? Who has your data? Are they obligated to protect it?
19 More Data More Problems Government may search first ask questions later Recent circuit court decisions support broad, warrantless access to stored data Govt. using third-parties to conduct searches on their behalf (e.g. In re Microsoft, United States v. Warshak, 631 F.3d 266, 286 (6th Cir. 2010)) Govt. using new technologies with unclear precedent (e.g. cell signal tracking in United States v. Skinner, No (6th Cir. 2012)) But SCOTUS says there are limits The 4 th amendment still matters (Riley v. California, 134 S. Ct. 2473, 189 L. Ed. 2d 430, (2014))
20 Responding to Government Requests Have a process in place Point person Prompt attention/triage Assess facial validity and identify issues Pick Your Battles Consider: PR, Customer Relations, Risk of Poking the Bear Example: Google NSL fight re: notice to user Negotiate to limit scope To contain costs To avoid collateral issues
21 MODEL OF DISCOVERY IN THE FUTURE (AKA NOW)
22 Model of Discovery in the Future Case Study Facts Large multinational corporation engaged in business in the US, Europe and in Asia was the subject of a significant security breach. Hackers accessed and downloaded large volumes of protected information (PII, PHI, HR, confidential, etc.). In many instances, once downloaded, the data was completely wiped from the company systems. The information was not only stolen, but large parts were published on various public websites and in the press. Eventually the corporation secured its environment, but is now subject to several types of actions.
23 Model of Discovery in the Future Case Study Questions Based on high likelihood of civil and potentially criminal action, what data sources should be preserved? Given the case specifics, must we consider additional, less standard data sources? System Security Settings DNS Logs Server Logs Security Logs System/Security Patch and Update Histories Malware and Virus Protection Software Update and Incident Logs Firewall Logs, etc. Given these additional data sources may be large and mostly unstructured text files, how do they impact discovery (preservation, collection, and review)?
24 Model of Discovery in the Future Additional Questions Where is the Network Boundary? Third-Party or Partner Networks? Propagation of Local Risks? Additional Data Sources? Potential Liability? The U.S. DOJ has issued a subpoena to a third-party service provider hosting your communications information under the SCA; do you intervene? An EU sovereign entity has sent you a letter precluding you from sharing any non-public information transmitted under Safe Harbor in any civil or criminal proceeding; how do you respond?
Recent Developments in Cybersurveillance
David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information
DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
E-Discovery in Practice: A Roadmap for Financial Institutions
E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida
LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice
LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice LSSA 2014 1 Use of Internet-Based Technologies in Legal Practice LSSA Guidelines Version 1.0 November 2014 2 Foreword Please
(2) For production of public records or hospital medical records. Where the subpoena commands any custodian of public records or any custodian of hosp
Rule 45. Subpoena. (a) Form; Issuance. (1) Every subpoena shall state all of the following: a. The title of the action, the name of the court in which the action is pending, the number of the civil action,
DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES
DISCOVERY ABROAD HOW TO OBTAIN EVIDENCE LOCATED OUTSIDE THE UNITED STATES By KYL attorneys Elizabeth P. Beazley and Tara B. Voss California Litigation Volume 25 Number 1 2012 This article was previously
NLRB: NxGen Case Management, E-Government and E-Discovery
NLRB: NxGen Case Management, By: James G. Paulsen, Assistant General Counsel, OGC and Bryan Burnett, Chief Information Officer, OCIO, National Labor Relations Board A. Next Generation (NxGen) Case Management
BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed
BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of
Corporate Counsel Beware: Limits Of 'No Contact Rule'
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Counsel Beware: Limits Of 'No Contact Rule'
US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES
US DISCOVERY PROCEEDINGS: IMPLICATIONS FOR FRENCH BUSINESSES May 11, 2012 Bijan E. Eghbal, Paris Browning E. Marean, San Diego Carol A.F. Umhoefer, Paris Agenda I. Overview of US discovery and document
BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley [email protected] (503)276-6074
BYOD At Your Own Risk Working in the BYOD Era Shane Swilley [email protected] (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the
A Brief Overview of ediscovery in California
What is ediscovery? Electronic discovery ( ediscovery ) is discovery of electronic information in litigation. ediscovery in California is governed generally by the Civil Discovery Act. In 2009, the California
E-Discovery and EU Data Protection laws
Robert Bond [email protected] Alexander Carter-Silk [email protected] IP, Technology & Data Group E-Discovery and EU Data Protection laws Alex Carter-Silk, Partner, IP, Technology
Preparing For and Responding to Government Investigations. Presented by Jeffrey Coopersmith
Preparing For and Responding to Government Investigations Presented by Jeffrey Coopersmith Substantive Areas of Government Inquiry Areas Where the Gov t Routinely Conducts Investigations: Securities Fraud
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial
ESI in the Criminal Justice System: From Pre-Indictment Investigation to Trial February 10, 2016 The Role of Economics in Antitrust Law February 13, 2008 Copyright 2008, The Sedona Conference 1 1 The Sedona
Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO.
Case 1:05-cr-10037-GAO Document 459 Filed 09/24/14 Page 1 of 6 UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS CRIMINAL NO. 05-10037-GAO-1 UNITED STATES OF AMERICA v. GRANT BOYD, Defendant. O TOOLE,
Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery
Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data
Legal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP Presented by Frank H. Gassler, Esq. Written by Jeffrey M. James, Esq. Over the last few years,
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.
An Investigator Appears: Are You Ready? Presentation Slides
Chapter 1 An Investigator Appears: Are You Ready? Presentation Slides Tom E. Lindley Perkins Coie LLP Portland, Oregon Managing Environmental Enforcement Risk 1 ii An Investigator Appears: Are You Ready?
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION BRIAN Z. FRANCE, v. MEGAN P. FRANCE, Plaintiff, Defendant. Case No. 3:11-CV-00186 PLAINTIFF S MEMORANDUM OF LAW IN SUPPORT
Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
Drafting and Issuing Subpoenas: New Jersey
View the online version at http://us.practicallaw.com/6-569-5426 Drafting and Issuing Subpoenas: New Jersey EZRA ROSENBERG, MICHELLE HART YEARY AND THOMAS J. MILLER, DECHERT LLP, WITH PRACTICAL LAW LITIGATION
TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.
Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for
Large Law Firm structure
Large Law Firm structure Senior Partners ultimate control over the firm Junior Partners all the partners own the firm together Although, how they divide profits depends on their agreement, which factors
Information For Tenants. About Evictions. And the Court Process
Information For Tenants About Evictions And the Court Process Prepared By: APPALACHIAN LEGAL SERVICES Page 2 "Information About Evictions" 1-800-834-0598 "Information About Evictions" Page 3 If you have
Digital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION
Case 2:11-cv-01174-TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION SALT LAKE CITY CORPORATION, a Utah municipal corporation;
Assembly Bill No. 5 CHAPTER 5
Assembly Bill No. 5 CHAPTER 5 An act to amend Sections 2016.020, 2031.010, 2031.020, 2031.030, 2031.040, 2031.050, 2031.060, 2031.210, 2031.220, 2031.230, 2031.240, 2031.250, 2031.260, 2031.270, 2031.280,
Friday 31st October, 2008.
Friday 31st October, 2008. It is ordered that the Rules heretofore adopted and promulgated by this Court and now in effect be and they hereby are amended to become effective January 1, 2009. Amend Rules
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT. Presenting the results from BDO s inaugural Inside E-Discovery Survey
WHAT MATTERS MOST TO CORPORATE COUNSEL IN E-DISCOVERY MANAGEMENT Presenting the results from BDO s inaugural Inside E-Discovery Survey 1 ACEDS Membership Benefits Training, Resources and Networking for
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business
THE NEW WORLD OF E-DISCOVERY
THE NEW WORLD OF E-DISCOVERY Ralph Losey: partner and National e-discovery Counsel of Jackson Lewis LLP, a labor & employment firm with 700 lawyers and 46 offices nationwide. JacksonLewis.com author of
Department, Board, Or Commission Author Bill Number
BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
E-Discovery: New to California 1
E-Discovery: New to California 1 Patrick O Donnell and Martin Dean 2 Introduction The New Electronic Discovery Act The new Electronic Discovery Act, Assembly Bill 5 (Evans), has modernized California law
NC General Statutes - Chapter 15A Article 17 1
SUBCHAPTER III. CRIMINAL PROCESS. Article 17. Criminal Process. 15A-301. Criminal process generally. (a) Formal Requirements. (1) A record of each criminal process issued in the trial division of the General
Guilford Medical Associates, P.A.
Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON ) ) ) ) ) ) ) ) ) ) STIPULATION
1 1 1 1 1 BOURNE INTERNATIONAL, INC., v. UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON Plaintiff, CHET STOLER; SOUTH SEAS TRADING CO., Defendants. STIPULATION NO. C0-0RJB PROTECTIVE ORDER
HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates [email protected]
HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates [email protected] Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Fairfax County Circuit Court Preferred Criminal Law Practices
Page 1 Fairfax County Circuit Court Preferred Criminal Law Practices I. Objectives 1. To expedite the efficient resolution of criminal cases. 2. To reduce the number of unnecessary continuances while providing
Bring Your Own Device Security and Privacy Legal Risks
Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications
Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications Varun Badhwar Co-Founder; VP of Products & Solution Engineering 1 2013 CipherCloud All rights reserved. Agenda Introduction
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia
Counsel must be fully familiar with the Uniform Civil Rules for the Supreme Court 22 NYCRR Part 202.
JUSTICE GERALD E. LOEHR, J.S.C. Rockland County Supreme Court 1 South Main Street New City, New York 10956 Courtroom 1 Tel: (845) 483-8343 Fax: (845) 708-7236 Staff Bruce J. Pearl, Principal Law Secretary
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
The need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
Labor and Employment 2015 Conference
Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ
An Introduction to the Federal Public Defender=s Office and the Federal Court System
Some Things You Should Know An Introduction to the Federal Public Defender=s Office and the Federal Court System Office of the Federal Public Defender Southern District of West Virginia 300 Virginia Street
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
The False Claims Act: A Primer
The False Claims Act: A Primer The False Claims Act (FCA), 31 U.S.C. 3729-3733 was enacted in 1863 by a Congress concerned that suppliers of goods to the Union Army during the Civil War were defrauding
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.
Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity Amy Mushahwar, Esq. What s New? Not That Much. Some have their heads in the cloud we prefer to stay down in the weeds and know
Case 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 FOR THE DISTRICT OF ARIZONA
Case 3:12-cv-08123-HRH Document 521 Filed 10/27/14 Page 1 of 7 WO IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) ) TOWN OF COLORADO CITY,
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
Employee Relations. Howard S. Lavin and Elizabeth E. DiMichele
VOL. 34, NO. 4 SPRING 2009 Employee Relations L A W J O U R N A L Split Circuits Does Charging Party s Receipt of a Right-to-Sue Letter and Commencement of a Lawsuit Divest the EEOC of its Investigative
ANALYSIS OF ORIGINAL BILL
Franchise Tax Board ANALYSIS OF ORIGINAL BILL Author: Evans Analyst: Deborah Barrett Bill Number: AB 5 See Legislative Related Bills: History Telephone: 845-4301 Introduced Date: December 1, 2008 Attorney:
Electronic Discovery Rules & Social Media
Electronic Discovery Rules & Social Media What is ESI? ESI is any information stored in electronic form All ESI is discoverable if relevant and reasonably accessible Privileges and other exceptions to
Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys
Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys By Ronald S. Allen, Esq. As technology has evolved, the federal courts have
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Regents of the University of Colorado, The v. Allergan, Inc. et al Doc. 69 Civil Action No. 1:14-cv-01562-MSK-NYW IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO THE REGENTS OF THE UNIVERSITY
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)
CHAPTER 13 RULES FOR INVOLUNTARY COMMITMENT OR TREATMENT OF CHRONIC SUBSTANCE ABUSERS
July 2009 CHRONIC SUBSTANCE ABUSERS Ch 13, p.i CHAPTER 13 RULES FOR INVOLUNTARY COMMITMENT OR TREATMENT OF CHRONIC SUBSTANCE ABUSERS Rule 13.1 Rule 13.2 Rule 13.3 Rule 13.4 Rule 13.5 Rule 13.6 Rule 13.7
United States Attorney s Office for the District of Oregon. Criminal Discovery Policy
United States Attorney s Office for the District of Oregon Criminal Discovery Policy The discovery obligations of federal prosecutors are generally established by Federal Rules of Criminal Procedure 16
