Faith M. Heikkila, ABD, CIPP Regional Security Services Manager MI InfraGard Board Member



Similar documents
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

In-House Solutions to the E-Discovery Conundrum

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski

BUSINESS ASSOCIATE AGREEMENT ( BAA )

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Predictability in E-Discovery

Federal Trade Commission Privacy Impact Assessment

HIPAA BUSINESS ASSOCIATE AGREEMENT

plantemoran.com What School Personnel Administrators Need to know

Cloudy Privacy Computing

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS

BUSINESS ASSOCIATE AGREEMENT

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

Syllabus. I410/N485 Electronic Discovery Fall 2013

Michigan's New E-Discovery Rules Provide Ways to Reduce the Scope and Burdens of E-Discovery

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

M E M O R A N D U M. Definitions

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer

HIPAA Privacy Rule Policies

Metadata, Electronic File Management and File Destruction

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Information Security, Privacy and Compliance Convergence

The Law On Discovery and Production of Electronic Evidence: Where Are We Now? Where Are We Going? Glenn A. Smith. June 10, 2009

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

THE IMPACT OF THE ELECTRONIC DISCOVERY RULES ON THE EEOC PROCESS

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

Data Leakage: What You Need to Know

Proactive Data Management for ediscovery

ediscovery and Information Governance Practice Overview

Privacy Impact Assessment

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

HIPAA Security COMPLIANCE Checklist For Employers

Professional Solutions Insurance Company. Business Associate Agreement re HIPAA Rules

Social Media, E-Discovery, & Complex Computer Forensics

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions

HIPAA/HITECH: A Guide for IT Service Providers

E-DISCOVERY GUIDELINES. Former Reference: Practice Directive #6 issued September 1, 2009

BUSINESS ASSOCIATE CONTRACTUAL ADDENDUM

Records Management Electronic Records and Electronic Discovery

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

General Items Of Thought

HIPAA PRIVACY AND SECURITY AWARENESS

E-Discovery Best Practices

PII Compliance Guidelines

Electronic Discovery How can I be prepared? September 2010

Understanding changes to the Trust Services Principles for SOC 2 reporting

HIPAA Security Rule Compliance

what your business needs to do about the new HIPAA rules

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v , rev

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Security Is Everyone s Concern:

Information for Agents and Brokers Regarding the HIPAA Business Associate Agreement

Department of Veterans Affairs VA Directive 6311 VA E-DISCOVERY

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

787 Wye Road, Akron, Ohio P F

COMPLIANCE ALERT 10-12

Privacy and Electronic Communications Regulations

Ethical Considerations for Lawyers Using the Cloud

My Docs Online HIPAA Compliance

STI GROUP DISCUSSION WRITTEN PROJECT

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR Court Reporters and HIPAA

E-Discovery in Michigan. Presented by Angela Boufford

Office 365 Data Processing Agreement with Model Clauses

Privacy and Cloud Computing for Australian Government Agencies

Patent Litigation at the ITC: Views from the Government, In-House Attorneys and Outside Counsel

Understanding ediscovery and Electronically Stored Information (ESI)

Report on Student Data Security in Online Assessment OHIO DEPARTMENT OF EDUCATION DECEMBER 2014

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

PRIVACY IMPACT ASSESSMENT

By Faith M. Heikkila

Preservation and Production of Electronic Records

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

A PRIMER ON THE NEW ELECTRONIC DISCOVERY PROVISIONS IN THE ALABAMA RULES OF CIVIL PROCEDURE

Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014

Record Retention, ediscovery, Spoliation: Issues for In-House Counsel

HIPAA BUSINESS ASSOCIATE AGREEMENT

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

What s New with HIPAA? Policy and Enforcement Update

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

DASSAULT SYSTEMES GROUP HUMAN RESOURCES DATA PRIVACY POLICY

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Data Privacy and Security: A Primer for Law Firms

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION

Book Review THE ELECTRONIC EVIDENCE AND DISCOVERY HANDBOOK: FORMS, CHECKLISTS, AND GUIDELINES

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

WACHA Going Paperless

E-Discovery in Practice: A Roadmap for Financial Institutions

Transcription:

e-discovery Mitigating Security Impacts Faith M. Heikkila, ABD, CIPP Regional Security Services Manager MI InfraGard Board Member Credentials Information security consultant Pivot Group Michigan InfraGard Board Member ConnecTech Greater Kalamazoo Board Member Michigan Critical Infrastructure Protection Certified Information Privacy Professional (CIPP) Previous Work Experience: Complex Litigation Paralegal for 16 years Law firm IT Project Manager for 2 years CIS Chairperson and Assistant Professor for 5 years PhD Candidate in Information Systems, specializing in information assurance at Nova Southeastern University Published and presented a number of articles on security and e-discovery I am not a lawyer and I do not even play one on TV. This presentation is: merely my opinion and does not constitute legal advice. Please contact your attorney for legal advice relevant to your e-discovery e needs. 2 Faith M. Heikkila, Pivot Group 1

Agenda This presentation will discuss e-discovery preparedness best practices, including the steps every organization must take regarding: 3 E-Discovery Compliance in Litigation Readiness: 4 Faith M. Heikkila, Pivot Group 2

E-Discovery Compliance in Litigation Readiness: Contextual Differences E-Discovery Compliance in Litigation Readiness: 6 Faith M. Heikkila, Pivot Group 3

E-Discovery Risks And Dangers: 7 Example: Scott v. Beth Israel Medical Center E-Discovery Risks And Dangers: Protect against Inadvertent Disclosure during Production Sensitive intellectual property Personally Identifiable Information (PII) Credit card information Medical information 8 Vendor Management of Third Parties Web Portals used by litigation support companies and attorneys Security of third party personnel Security clearance background checks Security of data while in control of third parties Authentication of data unchanged while in hands of third party Last vulnerability assessment results Secure transmission of data Incident response plan of third party Disposal methods Faith M. Heikkila, Pivot Group 4

Creating an Effective Legal (Litigation) Hold Policy Whenever litigation is anticipated, legal hold policy goes into effect 9 E-Discovery Plan Faith M. Heikkila, Pivot Group 5

E-Discovery Plan 11 Litigation Readiness: Best Practices Mitigating Security Impacts IT security is very relevant in readiness: Establish rules for security Sensitive documents must be protected E-discovery policies and document management Litigation hold policy Protective order Discloses how documents are handled Outline PII production safeguards Inadvertent disclosure of PII Destruction of produced ESI after case Third-party security Vendors and experts Opposing party Includes backup and recovery Contractual obligations Programs and Assessments Information Security Management System Program Risk Assessments Vendor Management Program Data Privacy and Protection Programs 13 Faith M. Heikkila, Pivot Group 6

E-Discovery Resources E-Discovery: Identifying and Mitigating Security Risks during Litigation, IT Professional, July/August 2008, p. 20-25 http://www.pivotgroup.net/whitepapers.html Amended Federal Rules of Civil Procedure (with Notes): http://www.uscourts.gov/rules/ediscovery_w_notes.pdf MI Court Rules : http://coa.courts.mi.gov/rules/ The Sedona Conference http://www.thesedonaconference.org/ 14 Contact Information Faith M. Heikkila Pivot Group, LLC Regional Security Services Manager Great Lakes 5955 West Main Kalamazoo, Michigan 49009 Office: (269) 544-0030 Cell: (616) 430-8056 fheikkila@pivotgroup.net 15 Faith M. Heikkila, Pivot Group 7