GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!
|
|
|
- Briana Anderson
- 10 years ago
- Views:
Transcription
1 Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! David Stevens Dell
2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2
3 Abstract Many organizations face the challenge of implementing protection and data security measures necessary to comply with a wide range of regulatory, statutory, and other legal requirements. Because storage systems (actually the data they contain) play an important part in many of these issues, storage managers and administrators may be asked to assist in supporting a variety of legal actions as well as help their organizations guard against data transgressions having legal consequences. Thus, they need to be capable of taking abstract regulatory, statutory and other legal requirements and translating them into implementable solutions. In addition, they must be able to partner with the legal community to ensure these solutions address the organization s compliance requirements and that the support is timely and responsive. This session describes the legal issues storage security professionals are likely to encounter as part of their role as the focal point for securing storage systems. 3
4 Introduction Many organizations face complying with a wide range of: regulatory, statutory, and other legal requirements. Storage managers and administrators may be asked to: assist in supporting a variety of legal actions take abstract legal requirements and translate them into implementable solutions help their organizations guard against data transgressions having legal consequences 4
5 Summary of Legal Areas Discovering pertinent stored information or data by parties involved in a legal action or proceeding (Electronic discovery) Protecting the confidentiality of private information (Privacy) Administration, management, and control of information and data related to an event so that it can be used to prove the circumstances of an event (Evidence Management & Forensics) Addressing accountability and responsibility issues Factoring in the geopolitical boundaries and the jurisdictional implications 5
6 A Few Definition 6
7 Definitions Authentic For evidence, being found by a jury (or trier of fact) to be what it purports to be and thus being worthy of trust, reliance, or belief. Authentication The act of meeting the threshold level for admissibility, but not necessarily of authenticity of evidence (e.g., ESI). Authenticity The property, condition, or quality of being worthy of trust, reliance, or belief because the proponent (offeror) has shown enough corroborating evidence to a jury (or trier of fact) to warrant such. Care Level of active concern, or lack of negligence, towards avoidance of possible dangers, mistakes, pitfalls, and risks, demanded of a party as a duty or legal obligation. See also due care and duty of care. 7
8 Definitions (cont.) Chain of custody A process that tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer. Confidentiality The property that data cannot be accessed by unauthorized parties. Digital Forensics The collection, identification, preservation and analysis of digital information for use in legal or administrative proceedings. 8
9 Definitions (cont.) Due care (Duty of care) Degree of care that an ordinary and reasonable person would normally exercise, over his or her own property or under circumstances like those at issue. The concept of due care is used as a test of liability for negligence. Due diligence Measure of prudence, responsibility, and diligence that is expected from, and ordinarily exercised by, a reasonable and prudent person under the circumstances. Electronic discovery (ediscovery) The pretrial process of discovering pertinent stored information or data by one or both parties involved in a legal action or proceeding. 9
10 Definitions (cont.) Electronically stored information (ESI) Computer generated data or information of any kind and from any source, whose temporal existence is evidenced by its storage in, or on any electronic medium, wherever located, now existing or developed in the future, and irrespective whether such medium is real, virtual or otherwise. Evidence preservation A process to maintain and safeguard the integrity and/or original condition of the potential digital evidence. Native data format The original, non-derived format and structure of data, together with its associated metadata. Personally identifiable information (PII) Any data about an individual that could, potentially identify that person. 10
11 Definitions (cont.) Privacy The right of an entity (normally an individual or an organization), acting on its own behalf, to determine the degree to which the confidentiality of their private information is maintained. Privacy breach An event that exploits a vulnerability to reveal PII, or creates a loss of control over PII. Provenance Information regarding an item's source, origin, custody and ownership. Spoliation of evidence The intentional or negligent destruction, hiding, alteration, withholding or concealment of withholding of evidence relevant to a legal action. 11
12 Electronic Discovery 12
13 Problem Summary: ediscovery ediscovery has been predominantly U.S. based Federal Rules of Civil Procedure (FRCP) is a set of regulations that specify procedures for civil legal suits within United States District (federal) Courts Many state courts civil procedural rules closely follow or adopt similarly worded rules The standard for discoverability is generally that the discovery must be "reasonably calculated to lead to the discovery of admissible evidence" Rule 26(b)(1) Most or all common law countries have some form of ediscovery regulations and provisions. Several countries have implemented blocking statutes to thwart U.S. discovery requests 13
14 Electronic Discovery Reference Model Information Management Getting your electronic house in order to mitigate risk & expenses should electronic discovery become an issue, from initial creation of electronically stored information through its final disposition. Identification Locating potential sources of ESI & determining its scope, breadth & depth. 14
15 Electronic Discovery Reference Model (cont.) Preservation Ensuring that ESI is protected against inappropriate alteration or destruction. Collection Gathering ESI for further use in the electronic discovery process (processing, review, etc.). Processing Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review & analysis. Review Evaluating ESI for relevance & privilege. Analysis Evaluating ESI for content & context, including key patterns, topics, people & discussion. Production Delivering ESI to others in appropriate forms & using appropriate delivery mechanisms. Presentation Displaying ESI before audiences (at depositions, hearings, trials, etc.), especially in native & near-native forms. 15
16 Storage Relevance: ediscovery ediscovery requirements can present several challenges locating ESI, ESI preservation, identifying relevant ESI, and producing and receiving ESI. Litigation holds on ESI must be honored to avoid evidence spoliation (and possible sanctions). In-house and external counsel must become familiar with ICT infrastructure (i.e., lawyers become ICT literate). Subject matter experts can be subpoenaed to testify about and explain corporate electronic document retention means and methods, policies and procedures. 16
17 Evidence & Forensics 17
18 Problem Summary: Evidence & Forensics Courts are increasingly treating digital evidence in the same way as more traditional documents; they have noted that digital evidence tends to be more voluminous, more difficult to destroy, easily modified, easily duplicated, potentially more expressive, and more readily available. In the digital world, most actions leave traces in the digital record that may be of significance in legal actions. The challenge of digital forensics is to collect these traces as unobtrusively as possible minimize impact to ongoing business operations preserve the ability of these traces to be admitted as evidence in a legal proceeding. 18
19 Storage Relevance: Evidence & Forensics Necessitate an evidence lifecycle management strategy that assists with chain of custody, authenticity, and data authentication. A forensic data collection in a storage environment can be disruptive and present many challenges Procedural (size, sources of information, etc.) Technological (formats, access, virtualization, etc.) Completeness (identifying all relevant information) Services such as encryption and deduplication present their own special challenges that must be addressed during planning for the collection process. 19
20 Privacy 20
21 Problem Summary: Privacy Many countries the U.S. being a notable exception consider privacy to be a fundamental human right. Privacy protection laws have been introduced in a significant number of countries. The types of protected data can vary significantly Privacy violations can include the unlawful storage of personal data, the storage of inaccurate personal data, or the abuse or unauthorized disclosure of such data. 21
22 General Privacy Requirements (ISO/IEC 29101) It must be possible to pull together definitive records of what PII is known/stored about people (including PII recorded in logs and backup); It must be possible to account for all personal information, no matter how it is collected (including internal generation); The real need for routine audit logging that includes or creates PII must be assessed as part of system design; Privacy design must include the security of backed up and archived data when it contains personal information; 22
23 General Privacy Requirements (ISO/IEC 29101) cont. It must be recognized that transaction histories in e-retailing applications creates behavioral PII and may allow other PII to be deduced (e.g. buying herbal remedies and non-prescription medication may indicate consumers' beliefs in their own state of health); The need and capacity to record privacy inquiries (e.g. to resolve disputes) needs to be considered in applications based on databases containing PII; Change management procedures for web applications must protect against inadvertent changes that affect privacy, e.g. ensure that changes to web forms do not change the nature or amount of PII collected; Privacy design must include the management of ephemeral or incidental PII, e.g. help desk or customer service logs. 23
24 Storage Relevance: Privacy The use of some form of data classification can help identify the data that need protection as well as the nature of the protection Encryption, when used correctly, can be an important tool to protect data confidentiality Breach notification requirements for protected data may necessitate data monitoring to help identify suspected data breaches Data movements (like data replication associated with DR/BC solutions) must respect geopolitical boundaries to avoid privacy violations 24
25 Accountability & Responsibility 25
26 Problem Summary: Accountability & Responsibility Increasingly, government officials and corporate executives are being held personally accountable for their actions or lack of action Inappropriate data handling or malicious attacks on data can cause individuals and organizations to incur liabilities (civil litigation) Unauthorized possession or access of regulated data can result in penalties and force costly breach notifications Adherence (or lack thereof) to organizational policy can be an important factor in determining negligence 26
27 Storage Relevance: Accountability & Responsibility Protections may be necessary in the storage infrastructure to guard against unauthorized, accidental or intentional corruption, modification, or destruction of data The risks associated with data breaches can be significant for some organizations, so prudence dictates the use of reasonable measures (like following best practices) to guard against these breaches Proper data preservation and disposal activities are necessary for an organization to meet its legal obligations Policies are important administrative controls to facilitate proper data handling 27
28 Jurisdiction & Cross Border Data Transfers 28
29 Problem Summary: Jurisdiction & Cross Border Data Transfers Many countries regulate the handling and storage of certain types of data Some governments are also struggling to deal with Critical questions about the limits of their jurisdiction over the Internet. Regulating their citizens' (and organizations ) activities on the Internet. Organizations have adopted computing models that allow data to reside in many locations Complicates the matter of who has authority or jurisdiction over this data when it is in flight Jurisdiction is less complicated for data when it is at rest; however, there may be multiple entities asserting their authority. 29
30 Storage Relevance: Jurisdiction & Cross Border The use of some form of data classification can help identify the data that have geopolitical restrictions Data movements (like data replication associated with DR/BC solutions) must respect geopolitical boundaries to avoid violations Multiple, overlapping jurisdictions can result in an untenable position (like U.S. discovery requests for data residing in France) Data breaches on foreign soil can be considered illegal technology transfers 30
31 Final Thoughts 31
32 Final Thoughts Legal issues and requirements are beginning to impact storage infrastructures and personnel, and this trend is expect to continue. Several of the topics addressed in this session represent emerging areas of the law, so expect changes and further developments. When dealing with the legal community, expect answers like it depends when seeking clarity. Compliance is often cited as a driver for security, but a close inspection will often show that compliance is being driven by legal elements. 32
33 Other SNIA Security Tutorials Backup and Archiving in the Cloud Track: Monday 4:05 pm: A Hype-free Stroll Through Cloud Storage Security Data Encryption Track: Thursday 8:30 am: Implementing Stored-Data Encryption Thursday 11:15 am: Practical Secure Storage: A Vendor Agnostic Overview 33
34 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: [email protected] Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee Eric A. Hibbard, CISSP, CISA Steven Teppler, Esq. Dave Stevens SNIA Security TWG 34
35 For More Information 35
36 Useful Web Resources ABA E-Discovery & Digital Evidence (EDDE) Committee, The Sedona Conference, Wikipedia Common Law, 36
37 Useful Printed Resources Books Foundations of Digital Evidence, Paul, 2008, ISBN-13: Real Digital Forensics: Computer Security and Incident Response, Jones, Bejtlich, Rose, 2006, ISBN-13: Electronic Discovery and Digital Evidence in a Nutshell, Scheindlin, Capra, The Sedona Conference, 2009, ISBN-13: Electronic Discovery and Digital Evidence: Cases and Materials, Scheindlin, Capra, The Sedona Conference, 2008, ISBN-13: Electronic Evidence: Law and Practice, Second Edition, Rice, 2009, ABA, ISBN-13: Electronic Evidence and Discovery: What Every Lawyer Should Know Now, Second Edition, Lange, Nimsger, 2009, ISBN-13: ISO/IEC Information Technology -- Security techniques standards: (including drafts) ISO/IEC Guidelines for identification, collection and/or acquisition and preservation of digital evidence ISO/IEC Privacy framework ISO/IEC Privacy reference architecture 37
38 SNIA Security Organizations SNIA Security Technical Work Group (TWG) Focus: Requirements, architectures, interfaces, practices, technology, educational materials, and terminology for storage networking. Storage Security Industry Forum (SSIF) Focus: Educational materials, customer needs, whitepapers, and best practices for storage security. 38
How E-Discovery Will Affect Your Life as a Storage Professional. David Stevens, Carnegie Mellon University
How E-Discovery Will Affect Your Life as a Storage Professional David Stevens, Carnegie Mellon University SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY
Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY Subhash Sankuratripati NetApp SNIA Legal Notice The material contained in
Metadata, Electronic File Management and File Destruction
Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information
Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Data Breaches and the Encryption Safe Harbor Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
ISO/IEC & ediscovery (ISO/IEC 27050) Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems
ISO/IEC & ediscovery (ISO/IEC 27050) Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems 1 Standardizing ediscovery ISO/IEC JTC 1/SC 27 Information technology Security
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski
Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University
In-House Solutions to the E-Discovery Conundrum
125 In-House Solutions to the E-Discovery Conundrum Retta A. Miller Carl C. Butzer Jackson Walker L.L.P. April 21, 2007 www.pointmm.com I. OVERVIEW OF THE RULES GOVERNING ELECTRONICALLY- STORED INFORMATION
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
Record Retention, ediscovery, Spoliation: Issues for In-House Counsel
Record Retention, ediscovery, Spoliation: Issues for In-House Counsel CCCA Webinar April 1, 2015 Presenters: Gavin Tighe, Partner (Certified Specialist in Litigation) Stephen Thiele, Partner, Director
Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys
Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys By Ronald S. Allen, Esq. As technology has evolved, the federal courts have
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Introduction to Information Assurance. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems
Introduction to Information Assurance Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP Presented by Frank H. Gassler, Esq. Written by Jeffrey M. James, Esq. Over the last few years,
Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013
MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. [email protected] Scott Polus, Director of Forensic Services [email protected] 1 Where Do I Start??
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
New E-Discovery Rules: Is Your Company Prepared?
November 2006 New E-Discovery Rules: Is Your Company Prepared? By Maureen O Neill, Kirby Behre and Anne Nergaard On December 1, 2006, amendments to the Federal Rules of Civil Procedure ( FRCP ) concerning
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University
E-Discovery in Practice: A Roadmap for Financial Institutions
E-Discovery in Practice: A Roadmap for Financial Institutions Martha R. Mora Martha R. Mora, Esq. ARHM&F Avila Rodriguez Hernandez Mena & Ferri LLP 2525 Ponce de Leon Blvd., Suite 1225, Coral Gables, Florida
Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY
2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,
Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Solving Key Management Problems in Lotus Notes/Domino Environments
Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION
GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION Experience increasingly demonstrates that discovery of electronically stored information ( ESI poses challenges
Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)
HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.
EHR Contributor Agreement
This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal
Corporate Records Management Policy
Corporate Records Management Policy Introduction Part 1 Records Management Policy Statement. February 2011 Part 2 Records Management Strategy. February 2011 Norfolk County Council Information Management
Service Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers
MARCH 7, 2007 E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers By Tara Daub and Christopher Gegwich News of the recent amendments to the Federal Rules of Civil Procedure
Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents
Amendments to Federal Rules of Civil Procedure Electronic Discovery effective Dec. 1, 2006 Copyright David A. Devine GROH EGGERS, LLC Rules amended: 16, 26, 33, 34, 37 & 45 Sources of information: Rules
Supreme Court Rule 201. General Discovery Provisions. (a) Discovery Methods.
Supreme Court Rule 201. General Discovery Provisions (a) Discovery Methods. Information is obtainable as provided in these rules through any of the following discovery methods: depositions upon oral examination
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Best Practices for. Protecting Privacy, Civil Rights & Civil Liberties. Unmanned Aircraft Systems Programs
U.S. Department of Homeland Security Best Practices for Protecting Privacy, Civil Rights & Civil Liberties In Unmanned Aircraft Systems Programs U.S. Department of Homeland Security Privacy, Civil Rights
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York 10016 www.devoredemarco.com
UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE 1 What is ESI? Information that exists in a medium that can only be read through the use of computers Examples E-mail Word Documents Databases Spreadsheets Multimedia
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business
Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Privacy vs Data Protection PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Introduction The terms privacy and data protection are often used interchangeable In reality they
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
DATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
Assembly Bill No. 5 CHAPTER 5
Assembly Bill No. 5 CHAPTER 5 An act to amend Sections 2016.020, 2031.010, 2031.020, 2031.030, 2031.040, 2031.050, 2031.060, 2031.210, 2031.220, 2031.230, 2031.240, 2031.250, 2031.260, 2031.270, 2031.280,
Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel
Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (this "Agreement") is made as of, 201_ (the Effective Date ), and is entered into between ( Covered Entity ) and Delta Business System, Inc.
Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1
Corporate Governance - The Importance of a Compliant Record Retention Program by Christopher N. Weiss 1 A. Rationale for a Sound Record Retention Policy Record retention is crucial to disciplined corporate
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Data Preservation Duties and Protocols
Data Preservation Duties and Protocols November 2008 HOU:2858612.3 Discussion Outline I. The Differences Between Electronic and Paper Discovery II. The Parameters of Electronic Discovery III. Rule 37(e)
SNIA Storage Security Best Practices
Author: Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Storage Security Best Practices Presented by Gordon Arnold Senior Technical Staff, IBM Chair Storage Security Industry
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
Iowa Health Information Network (IHIN) Security Incident Response Plan
Iowa Health Information Network (IHIN) Security Incident Response Plan I. Scope This plan identifies the responsible parties and action steps to be taken in response to Security Incidents. IHIN Security
Understanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Spoliation of Evidence. Prepared for:
Spoliation of Evidence Prepared for: Spoliation Nationwide anti-spoliation trend Cases can be thrown out of court Insurers can be denied subrogation claims An insured who destroys evidence of a claim can
THE IMPACT OF THE ELECTRONIC DISCOVERY RULES ON THE EEOC PROCESS
THE IMPACT OF THE ELECTRONIC DISCOVERY RULES ON THE EEOC PROCESS Cynthia L. Gibson, Esq. Katz, Teller, Brant & Hild 255 East Fifth Street Suite 2400 Cincinnati, OH 45202 (513) 977-3418 [email protected]
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY Federal Trade Commission, Plaintiff, v. Wyndham Worldwide
General Items Of Thought
ESI PROTOCOLS & CASE LONG BUDGETS General Items Of Thought What s a GB =??? What Are Sources Of Stored Data? What s BYOD mean??? The Human Factor Is At Play! Litigation Hold Duty Arises When? Zubulake
Jozii LLC WEBSITE TERMS OF SERVICE
Jozii LLC WEBSITE TERMS OF SERVICE 1. Acceptance of Terms. Welcome to Jozii. By using our Internet website, you indicate your unconditional acceptance of the following Terms of Service. Please read them
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (this Agreement ), effective as of May 1, 2014 (the Effective Date ), by and between ( Covered Entity ) and Orchard Software Corporation,
Paychex Accounting Online Terms of Use
Paychex Accounting Online Terms of Use Paychex recommends that Client read the Terms of Use prior to using the Paychex Accounting Online Software ( Software ). If Client does not accept and agree with
WellDyneRxWEST Customer (TPA, Broker, Consultant, Group Health Plan, and other).
WellDyneRxWEST Customer (TPA, Broker, Consultant, Group Health Plan, and other). RE: HIPAA Business Associate Agreement Effective 4/14/04 Business Associate: WellDyneRxWEST, Inc., a Colorado Corporation
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation
Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.
Software Maintenance & Support Agreement This agreement ( Support Agreement, Software Assurance, Agreement ) is for the purpose of defining the terms and conditions under which Technical Support, Maintenance
