Digital Security. Dr. Gavin W. Manes, Chief Executive Officer
|
|
|
- Karin Gordon
- 10 years ago
- Views:
Transcription
1 Dr. Gavin W. Manes, Chief Executive Officer
2 About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI processing Strong background in academics and research Expert Project Managers Brad Deavers and Meredith Lee Gavin W. Manes, Ph.D. CEO Nationally recognized expert in e-discovery and digital forensics Frequently published in peer-reviewed journals, magazines, and proceedings Presents to attorneys and professional organizations Serves as an expert witness
3 Agenda The Problem The Challenge Solutions
4 The Problem The Unknown Attorneys IT systems Policies and procedures Where s the data? Encryption, passwords Corporations ESI Rules ESI Costs Government Learning to request Natives
5 Communication and Vocabulary Good communication is critical jargon is dangerous Technical terms can be defined MANY different ways
6 Recent Issues Key Decisions Zubulake (the beginning) New decisions every day Technology Cloud [Public/Private] Hacking Encryption Data sizes New Rules ABA Ethics HIPAA Privileges
7 Tools in the Industry No one tool does everything WELL Use a tool for what it s best at best in class Case management tools Litigation hold Evidence management Trial preparation Collection tools Processing tools De-dupe Clustering Exceptions Review tools Redaction Predictive review Production tools
8 Who are the Players? Clients/Corporations Organize and know where data is Continue doing business carefully Law Firm Direct discovery Plan and strategize EARLY Choose technology partners [vendor, in-house, client] Review and redact ESI vendor Communicate well with parties Recommend best course of action based on experience Manage expectations Execute project plan as efficiently as possible
9 E-Discovery Goals Reduce risk and save money Thorough preservation and collection (correct personnel) Thoughtful processing and filtering Review using modern and cost effective review tools (online) Why? Human review time is the most expensive and error-prone part of the process Let the computers filter out unresponsive documents using defensible methods How? Planning ahead, crafting a strategy Carefully selecting exactly the right vendor for the project Using the appropriate team (including vendor)
10 E-Discovery and Security Deepest Darkest Secrets Challenges at every phase of e-discovery Preservation: custody and control Processing: no comingling, secure laboratory at vendor, encryption Review: strong user authentication, auditing and tracking Data storage: insecure file-sharing (Dropbox, etc.) Communication: careful with non-encrypted Each additional layer of security means a reduction in convenience Time Ease of technology use Encryption
11 ESI Processing
12 What is the Cloud? Using a shared pool of configurable computing resources (NIST) Gmail (or any other webmail) DropBox or Google Documents Offsite application hosting Your office network Types Software Common Use someone else s software to perform an operation Software as a Service Hardware Using someone else s processing power IE, animation company rendering graphics
13 Benefits & Challenges Benefits Outsourcing IT Install, update, maintain software Can be cost-effective Challenges Privacy & security Confidentiality issues IT may not know the specific needs of legal professionals Physical and remote access considerations Disposal of data Protective orders may require certified destruction Jurisdiction Cloud facilities may be outside the US
14 Cloud Considerations Evaluate your risks for: Your firm s data Your client s data Opposing party s data Then, balance those risks Continuous litigation hold may be very difficult to use the cloud Dispersed firm and litigation teams may be worth the risk for the added convenience
15 Personal Security Number of connected devices be more numerous than computers at least 5 to 1, growing geometrically.
16 Legal Considerations Dropbox, GoogleDocs and WebDAV (Cloud Storage) Used by most apps to move data from an outside source to the ipad Using cloud storage may create risks to your client s confidentiality ABA Commission on Ethics 20/20 Working Group on the Implications of New Technology Issues Paper Concerning Client Confidentiality and Lawyers Use of Technology Limited other solutions
17 Encryption Basics Encoding messages so only authorized parties can read them Does NOT prevent interception Not just password protection Boot from thumb drive/cd Every extra security measure introduces a loss of convenience Additional software, key management, personnel training, IT burden
18 Plain Text Communication
19 Encryption Example Charlie Bad Guy Bob Alice We should settle for $500K but only offer $200K now 4t;93qhg5;l8q3'u9gy7q13941yh4'gq3whrb9'3qh5ge
20 Case Study Malpractice suit against a hospital, so HIPAA applies Lead attorney Contacted the firm s IT to discuss requirements: NIST for data at rest, NIST or for data in motion Requested that any productions from opposing be encrypted Interviewed e-discovery vendors, specifically about encryption Firm IT made changes in hardware, software and procedure to meet these Created secure FTP and ability to encrypt Implemented two factor authentication
21 Case Study Con t Vendor Had experience with data containing PHI Quickly and articulately outlined their procedures Offered an online review tool that met the requirements Project Progression Vendor received the encrypted drive, processed and loaded to review Physically & logically separated this case s data from all others Attorneys reviewed and coded documents Vendor created production, encrypted it, sent to the firm When case was complete, the firm and the vendor destroyed data per NIST
22
23 Ransomeware Hack
24 Cloud and Social Media Data Adds a new dimension to BYOD Mobile devices make access easy Purpose is to freely share information Everybody s doing it Publicly dispersed rather than specifically targeted (i.e., ) Huge amount of personal and corporate information BYOD leads to BYO-CLOUD Most cloud backup services are automatic and use personal accounts icloud Gdrive SkyDrive
25 Conclusion Carefully balance risks and benefits Cloud Social Media Portable Devices Computer Use Consider yourself, your firm and your client Security and privacy are paramount with electronic data Increasing security usually means decreasing convenience
26 avansic.com Corporate Office First Place Tower, Suite E. Fifth St, Tulsa, OK Gavin W. Manes, Ph.D.
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About
Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business
Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013
MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. [email protected] Scott Polus, Director of Forensic Services [email protected] 1 Where Do I Start??
B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. [email protected]
Best Practices in Electronic Record Retention
I. Some Key Considerations In Whether To Engage An E-Discovery Vendor (Or Vendors) A. It is difficult to decide whether to retain a vendor if you don t know what your organization can do and at what cost.
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
Making Sense of E-Discovery: 10 Plain Steps for Producing ESI
Making Sense of E-Discovery: 10 Plain Steps for Producing ESI The following article provides a practical guide to producing electronically stored information (ESI) that lawyers can apply immediately in
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
A Modern Approach for Corporations Facing the Demands of Litigation
A Modern Approach for Corporations Facing the Demands of Litigation The first pure Software-as-a-Service (SaaS) e-discovery technology designed to help in-house legal teams face the increased risk and
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and
Electronic Discovery
Electronic Discovery e-discovery: A Primer Mauricio Perry, CRM, CEDS Mauricio Perry, CEDS, CRM 1 Disclaimer I am not a lawyer The ideas exposed here are not to be construed as legal advice but are educational
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
How to Manage Costs and Expectations for Successful E-Discovery: Best Practices
How to Manage Costs and Expectations for Successful E-Discovery: Best Practices Mukesh Advani, Esq., Advisory Board Member, UBIC North America, Inc. UBIC North America, Inc. 3 Lagoon Dr., Ste. 180, Redwood
Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski
Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University
Faith M. Heikkila, ABD, CIPP Regional Security Services Manager MI InfraGard Board Member
e-discovery Mitigating Security Impacts Faith M. Heikkila, ABD, CIPP Regional Security Services Manager MI InfraGard Board Member Credentials Information security consultant Pivot Group Michigan InfraGard
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation
This Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: [email protected] Thank You! Welcome! Electronic Data
How To Write A Hit Report On A Lawsuit Against A Company
Everything You Wanted to Know About ESI and E-Discovery but Were Afraid to Ask Jason M. Pistacchio Presented By: Gregory S. Johnson Attorney Attorney/Legal Technologist Cosgrave Vergeer Kester LLP Paine
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
a Legal Project Management Consultancy Plan. Resource. Realize.
a Legal Project Consultancy Plan. Resource. Realize. Disclaimer Information is Not Legal Advice Alice E Burns of Eleventh Hour provides information regarding businesses, compliance and litigation trends
Data Storage Options for Research
Research IT Office Data Storage Options for Research By Ashok Mudgapalli Director of Research IT Agenda Current Research Data Storage Current Data Backup Strategies Available Storage Solution: Enterprise
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Meeting E-Discovery Challenges with Confidence
Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS
Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS KYLE ALEXANDER, and DYLAN SYMINGTON, on behalf of themselves and all those
August 6, 2015. Technology 101 for the Corporate Lawyer
August 6, 2015 Technology 101 for the Corporate Lawyer The Presenters Scott Plichta Chief Information Security Officer Corporation Service Company Jennifer K. Mailander Associate General Counsel Corporation
Department of Veterans Affairs VA Directive 6311 VA E-DISCOVERY
Department of Veterans Affairs VA Directive 6311 Washington, DC 20420 Transmittal Sheet June 15, 2012 VA E-DISCOVERY 1. REASON FOR ISSUE: To establish policy concerning the care and handling of documents
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, [email protected] Reference
Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.
THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the
e-discovery Forensic Services kpmg.ch Advisory
e-discovery Advisory Forensic Services kpmg.ch e-discovery You or your client are involved in a dispute, investigation, regulatory or internal review. You need to review evidence and may need to disclose
The Portcullis Guide to Disclosing Electronically Stored Information (ESI)
The Portcullis Guide to Disclosing Electronically Stored Information (ESI) Portcullis Computer Security Limited www.portcullis-security.com http://labs.portcullis.co.uk/ Tel: +44 (0)20 8868 0098 Email:
LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA
Corporations Take Control of E-Discovery
Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review
In-House Solutions to the E-Discovery Conundrum
125 In-House Solutions to the E-Discovery Conundrum Retta A. Miller Carl C. Butzer Jackson Walker L.L.P. April 21, 2007 www.pointmm.com I. OVERVIEW OF THE RULES GOVERNING ELECTRONICALLY- STORED INFORMATION
AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products
AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The
Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division
Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division Jason R. Baron Director of Litigation National Archives and Records Administration 1 Overview Cloud Computing Defined
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys
Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys By Ronald S. Allen, Esq. As technology has evolved, the federal courts have
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.
How to Win the Battle Over Electronic Discovery in Employment Cases By Philip L. Gordon, Esq. IMPORTANT NOTICE This publication is not a do-it-yourself guide to resolving employment disputes or handling
EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.
TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery
Best Practices: Cloud ediscovery Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure
Using On-Demand Technology and Workflows to Speed Discovery and Reduce Expenditure June 11, 2015 Stu Van Dusen Lexbe LC ediscovery Webinar Series Info Future Takes Place Monthly Cover a Variety of Relevant
Predictability in E-Discovery
Predictability in E-Discovery Presented by: John G. Roman, Jr. National Manager, Practice Group Technology Services Nixon Peabody LLP Tom Barce Assistant Director of Practice Support Fulbright & Jaworski
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
Proactive Data Management for ediscovery
Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Records Management Electronic Records and Electronic Discovery
Records Management Electronic Records and Electronic Discovery Office of the Secretary of the Commonwealth Division of Public Records 617-727-2832 www.sec.state.ma.us/pre/predix.htim Agenda Records Management
Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC [email protected]
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC [email protected] What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
In the Cloud. Scoville Memorial Library February, 2013 [email protected]
In the Cloud Scoville Memorial Library February, 2013 [email protected] What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the
Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns
Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the
2015 USER GROUP CONFERENCE
2015 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
IT Roles in Loss Prevention. Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP
IT Roles in Loss Prevention Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP What is Loss Prevention (Risk Management)? Mitigate risk Protect the Firm s assets Departments
Cloud Computing Questions to Ask
Cloud Computing Questions to Ask Pursuant to the Federal Cloud Computing Strategy 1 and the Cloud First policy, agencies are required to evaluate safe, secure cloud computing options before making any
www.istdiscover-e.com
www.istdiscover-e.com who is IST? IST ediscovery provides a full range of on-site litigation support and off-site ediscovery services that will take you from Early Case Assessment (ECA) through hosted
Discovery Data Management
Discovery Data Management in Practice Introductions Reveal Derick Roselli 949-280-3519 [email protected] www.revealdata.com Program Outline Pre-Planning Stages Workflow Management Project Management
