Technology Assisted Review Goes Left: Predictive Analytics In Information Governance



Similar documents
Defining and Managing Reputation Risk

Acquisition Transaction Reinsurance: Key Concepts SEAN KEYVAN AND JEREMY WATSON, SIDLEY AUSTIN LLP

Cybersecurity: What In-House Counsel Needs to Know

California Supreme Court Issues Ruling in Brinker Clarifying Employers Duty to Provide Meal and Rest Breaks to Hourly Employees

September Edition of Notable Cases and Events in E-Discovery

ediscovery: Managing Costs & Avoiding Pitfalls

Cloud Computing: Business Benefits, Legal Uncertainties, Risks and Strategies

Cyber Risks in the Boardroom

Director, Value Engineering

Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC

ediscovery: Trends & Challenges

Tim Cowen Sidley Austin LLP. Legal issues, technology risks, and cloud computing.


ediscovery and Information Governance Practice Overview

FINRA and MSRB Issue Guidance on Best Execution Obligations in Equity, Options and Fixed Income Markets

Information Governance in the Cloud

UK OFT Investigation into Health Markets

Government Dimensions of Cloud Computing

Fundamentals of Information Governance:

FTA Releases Final Report on Consumer Privacy

Meaning Based Computing: Managing the Avalanche of Unstructured Data

ACCOUNTANTS LIABILITY UPDATE

Issues in insurance company mergers & acquisitions

FINANCIAL INSTITUTIONS REGULATORY UPDATE

Killing Two Birds With One Stone: Optimizing Information Governance for Easier E- Discovery

INVESTMENT FUNDS. SEC Proposes First Dodd-Frank Investment Advisers Act Rule to Address Family Offices. What Is a Family Office?

2016 SIDLEY PRELAW SCHOLARS PROGRAM

Information Governance: How to Assess Your Status

Background. 9 September Practice Groups: Investment Management, Hedge Funds and Alternative Investments Broker-Dealer Finance

Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures

3 "C" Words You Need to Know: Custody - Control - Cloud

Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

How To Manage Cloud Data Safely

FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies. October 20, 2011

How Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks?

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

February Edition of Notable Cases and Events in E-Discovery

Litigation & Corporate Compliance Survey

From Information Management to Information Governance: The New Paradigm

Credit Default Swaps Insurance or Not? What is a Credit Default Swap? History of CDS. CDS market started in early 1990s

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Information Governance

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

SMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp

Agenda. You are not in the business to manage records

The Importance of Privacy & Data Security in a Changing World

Italian Tax Reform. New legislation on abuse of law and statute of limitations. Abuse of law and tax avoidance. Introduction

EMC SourceOne Management and ediscovery Overview

Predictive Coding and The Return on Investment (ROI) of Advanced Review Strategies in ediscovery

ESI and Predictive Coding

Hong Kong Enacts a Statutory Disclosure Regime

June 22, Gerald S. Sachs, Of Counsel Paul Hastings LLP. (202)

New E-Discovery Rules: Is Your Company Prepared?

Miguel Ortiz, Sr. Systems Engineer. Globanet

SEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites

Information Governance

Sweeping Changes Made to Labor and Employment Whistleblower Protections

Governance from the Cloud. threat protection compliance archiving & governance secure communication

Information Governance, Risk, Compliance

Terrence Coan, CRM - Baker Robbins & Company 1

Payday Loans Under Attack: The CFPB's New Rule Could Dramatically Affect High-Cost, Short-Term Lending

Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Health Care Entities Get Clarity from FCC on Telephone Communications

2H 2015 SHADOW DATA REPORT

SEC s Proposed Rules for Implementing Dodd-Frank Whistleblower Provisions: Important Implications for Employers. November 12, 2010

Alvarez & Marsal Global Forensic and Dispute Services Asia Pacific Regional Meeting (APRM) Tokyo, Japan April 2015

Cyber security Building confidence in your digital future

Vietnam s Insurance Market: An Overview January 2014

SIDLEY PRELAW SCHOLARS INITIATIVE

Real World Strategies for Migrating and Decommissioning Legacy Applications

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

Registration; Amendments or Updates to Registration

EnCase Enterprise For Corporations

Global Services and Capabilities

Cybersecurity Risk Factors: Five Tips to Consider When Any Public Company Might be The Next Target

Records Retention & E-Discovery. Preserving Electronically Stored Information for Litigation

Cloud Computing: Privacy, Security and Other Issues and Obligations

Applying Technology to Information Governance. Bennett Borden, Drinker Biddle Cathleen Peterson, Kroll Ontrack March 26, 2015

Intellectual Property Legal Issues Protecting IP Rights and Mitigating Infringement Risks in Virtual Storage and Applications

As IDC looks back on ediscovery corporate technology priorities among the highly litigated industries in 2009, the following takeaways emerge:

Global Headquarters: 5 Speen Street Framingham, MA USA P F

April Edition of Notable Cases and Events in E-Discovery

NAVIGATING THE MAZE LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona CIO Roundtable Retreat

Removal of Credit Ratings References

Outsourcing has become a critical component of financial institutions management

White Paper on Financial Institution Vendor Management

A 6-POINT FRAMEWORK BUSINESS TECHNOLOGY GROUP

International ediscovery. When Cyber Workspaces Collide with U.S. Litigation. May 1, 2012

Beyond Credit Reporting: The Extension of Potential Class Action Liability to Employers under the Fair Credit Reporting Act

Client Alert. Accountants and Auditors as SEC Whistleblowers. Categories of Persons Eligible or Not Eligible for SEC Whistleblower Awards

Information Governance Challenges and Solutions

Global ediscovery Document Review. Managed technology for the global legal profession

New York Court of Appeals Announces New Rules Governing Practice in New York by Attorneys Not Admitted in the State

NAIC REINSURANCE COLLATERAL REFORM

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Due Diligence in Regulation D Offerings

March 2, 2015 Page 2. If you have any questions or need further information regarding this incident, please do not hesitate to contact me.

Insights into Cloud Computing

Transcription:

BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review Goes Left: Predictive Analytics In Information Governance Jeffrey C. Sharer November 11, 2014 This presentation has been prepared by Sidley Austin LLP for informational and training purposes only and does not constitute legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.

Agenda I. Why Are We Here? II. What Is Predictive Analytics? III.Modernizing Information Governance A. Modernizing Records Retention B. Information Classification C. Defensible Deletion IV.Moving Forward 2

Why Are We Here? Gartner predicts that, by 2017, 33 percent of Fortune 100 organizations will experience an information crisis, due to their inability to effectively value, govern and trust their enterprise information. Press Release, Gartner, Inc., Gartner Says One-Third of Fortune 100 Organizations Will Face an Information Crisis by 2017 (Feb. 27, 2014)

Consequences of Increased Data Volumes Increased IT infrastructure costs 78% Cannot find information when needed 73% Increased regulatory compliance risk 67% Increased e-discovery costs 59% Need to recreate information previously created Increased risk of data leakage Increased complexity of protecting intellectual property or trade secrets 41% 49% 47% No serious consequences 2% Source: Council for Information Auto-Classification, The Information Explosion: How Organizations are Dealing With It (Oct 2011) (available at http://www.infoautoclassification.org/survey.php). 4

Litigation and Regulatory Risks Risk of sanctions for failures to identify, preserve, or collect relevant data Risk of missed deadlines and sanctions resulting from inability to respond timely and effectively to discovery requests Risk that cost-prohibitive e- discovery influences settlement dynamic Risk of cross-border conflicts between U.S. discovery obligations and foreign privacy laws 5

Data Privacy and Security Risks Risks of violating data privacy laws, for example: 6 Improper (unsecure) handling of protected information, such as social security numbers, financial accounts, etc. Data leakage to locations outside company s environment (e.g., personal devices, Dropbox, Google) Retention of information past required destruction (e.g., upon expiration of purpose) Inadvertently transferring protected data out of jurisdiction Risk of losing protected or sensitive information in data breach, potentially resulting in notification obligations, regulatory or civil exposure, damage to reputation, and other harm to company Risk of audit failures (internal or external) exposed to customers, clients, or regulators, or publicly through discovery in litigation

Data Security Challenges Safeguarding data and protecting information security systems is increasingly complicated International consumer base accessing sites online Cloud computing / third-party service providers The human component Persistent, coordinated cyberattacks Corporations face significant risks: Loss of intellectual property and operational disruption Customer litigation, regulatory enforcement, or shareholder lawsuits 7

Compliance Risks Accelerating global regulations FCPA, Dodd-Frank, GLBA, SOX, Basel III, AML, ABC, PCI, etc. Compliance violations more difficult to detect where offending data obscured by millions of other grains of sand Noise created by debris hinders performance of predictive analytics and other tools and processes that otherwise might detect violations Less sensitive data potentially to land in insecure storage

Risks In Dark Data o o o o Risk of legal liabilities, compliance violations, smoking guns, and other unpleasant surprises lurking in dark data Clogged systems can obscure legal liabilities and compliance issues and make identification difficult even upon search and inquiry Unknown liabilities may be identified, or known liabilities may increase in severity, through due diligence in connection with business transactions or other sensitive negotiations Expired data produced in litigation or regulatory proceedings can trigger additional lawsuits or investigations 9

The Internet of Things Digitization of the Physical World: Physical objects are equipped with unique identifiers that can be digitally tracked RFID tags used to identify and inventory objects (and by proxy, people) Smartphone control: sensors embedded in object send data to smartphone, informing user s actions Currently focused on home systems and appliances (home security, smart appliances, thermostats)

And The Challenges Are Not Going Away 50-fold growth in the digital universe from the beginning of 2010 through the end of 2020 40 Zettabytes in 2020 will be equivalent of: 57 times the amount of all of the grains of sand on all the beaches on earth Saved on Blu-ray discs, without sleeves or cases, would weigh as much as 424 Nimitz-class aircraft carriers 5,247 GB of data for every person in the world And the Internet of Things (Exabytes) 2014 40,000 35,000 30,000 25,000 20,000 15,000 10,000 5,000-11 Source: IDC, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East (Dec. 2012)

12 What Is Predictive Analytics?

What Is Predictive Analytics?

Predictive Analytics Is Everywhere

15 The Electronic Discovery Reference Model

16 The Electronic Discovery Reference Model

Predictive Analytics In IG Leverages technology to backstop humans Even low tech auto-classification can be very effective at identifying certain sensitive information types Policy rule engines Word indexes and metadata Complex and challenging to maintain Difficult to scale Machine learning tools

Classification Through Machine Learning Applying lessons learned in e-discovery, earlier in information lifecycle Growing body of research showing computer-assisted classification to be as or more effective than human classification Question is not whether any approach is perfect; question is whether it s more effective than alternatives Solid acceptance by courts and regulators in litigation and enforcement contexts Effective for early warning systems Not an easy button requires significant up-front work and ongoing maintenance, but potential to be more effective and efficient over long run

How Does Auto-Classification Work? Training Classification Validation Application Humans teach machine classification from sample documents Machine applies learning to other documents and classifies them Humans QC machine output and provide further training if needed Machine classification becomes one aspect of overall IG process 19

20 Modernizing Information Governance

Modernizing Information Governance Looking forward, looking back Leveraging technology to break down traditional information silos Key issues to address: Types of records Variety of storage media Regulatory sprawl Data protection laws International considerations Accessibility to end users Legacy data stores

Looking Forward Active and newly created records Integration of IG, business, legal, and compliance Potential compliance functions: Enhancing security of sensitive data Segregation Access controls by user, content type, or other criteria specific to individual records Anonymization, redaction, and expungement Surveillance and early warning systems Automated legal holds, disposition upon expiration, and other handling

Automating Information Governance Tired but true: People, process, and technology. Identifying and capturing records Classification through content templates Classification through user-selected folders Hybrid classification: User-based but analytics provides defaults, performs QC, etc. Machine-based: Analytics-based using rules and algorithms to identify and classify records Data security Machine-powered security classification, redaction and/or expungement

Further Applications Managing records Assign retention periods based on machine classification Ability to manage-in-place, and know what s being managed Accessing records Search on steroids using text- and concept-based search Automated disposition according to retention schedule Used properly, powerful means of driving compliance Process requires necessary checks and approvals

Looking Back Classification of existing records Identify and secure sensitive information already dispersed throughout organization Remediation of expired data, a/k/a, defensible deletion Reduce unnecessary retention Reduce storage and litigation costs Reduce legal and compliance risks Create business value

Benefits of Defensible Data Reduction Reduce legal and compliance risks Data privacy and security Elimination of dark data mitigates surprise smoking guns Organization knows what it has and what its risks are Save money Hard and soft costs associated with data storage and maintenance E-discovery and regulatory response Create business value Operating efficiencies, e.g., IT staffing and infrastructure Employees better able to find information when needed Business better able to extract value from data that remains 26

27 Moving Forward

It Takes A Village Internal several stakeholders, including: Records Management Information Technology In-House Counsel Data Privacy and Security Business Units External resources may include one or more of: 28 Outside counsel, to advise on legal and regulatory requirements and defense of process Consulting firm, to assist with planning and execution of workflows, sampling protocols, and validation of results Technology provider, for technology needed to index, collect, and analyze data across relevant sources

Action Plan Information Governance Next 7 days Consider maturity of information governance within your enterprise think strategically, focus on value propositions Next 90 days Identify starting point Assemble steering committee Set project milestones and goals Next 18 months Measure progress against milestones Measure results against goals Consider additional opportunities Stay the course 29

Questions? Jeffrey Sharer Sidley Austin LLP One South Dearborn Street Chicago, Illinois 60603 (312) 853-7028 jsharer@sidley.com 30

BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review Goes Left: Predictive Analytics In Information Governance Jeffrey C. Sharer November 11, 2014 This presentation has been prepared by Sidley Austin LLP for informational and training purposes only and does not constitute legal advice. This information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this without seeking advice from professional advisers.