Understanding ediscovery and Electronically Stored Information (ESI)



Similar documents
Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Proactive Data Management for ediscovery

THE IMPACT OF THE ELECTRONIC DISCOVERY RULES ON THE EEOC PROCESS

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

STI GROUP DISCUSSION WRITTEN PROJECT

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

Prosecuting Attorneys Council of Georgia

Electronic Discovery

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

plantemoran.com What School Personnel Administrators Need to know

In-House Solutions to the E-Discovery Conundrum

Preservation and Production of Electronic Records

A Brief Overview of ediscovery in California

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

This article first appeared in the International Technology Law Association s ebulletin, Volume 2, Issue 3, summer 2008.

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Case 2:14-cv KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

How To Write A Hit Report On A Lawsuit Against A Company

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper

E-DISCOVERY IN FEDERAL COURT: SIX CHANGES YOU SHOULD MAKE TO YOUR PRACTICE IN THE DISCOVERY PHASE OF THE CASE By Kary Pratt

10 Steps to Establishing an Effective Retention Policy

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

E-Discovery: Who Bears The Costs? (Part I)

E-DISCOVERY GUIDELINES. Former Reference: Practice Directive #6 issued September 1, 2009

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

Litigation Support. Learn How to Talk the Talk. solutions. Document management

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

Electronic Discovery How can I be prepared? September 2010

The e-discovery edge: Expertise and preparation can save millions *

Best Practices Series Document Retention and Best Practices

ANALYSIS OF ORIGINAL BILL

Information Security Policy

Archiving: Common Myths and Misconceptions

WHITE PAPER Archiving: The Facts Behind The Myths

E-DISCOVERY IN THE US

State of Utah Version of Document E

E-Discovery Technology Considerations

Metadata, Electronic File Management and File Destruction

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

Legal Arguments & Response Strategies for E-Discovery

Recovering Microsoft Exchange Server Data

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

E-Discovery in Practice: A Roadmap for Financial Institutions

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

COURSE DESCRIPTION AND SYLLABUS LITIGATING IN THE DIGITAL AGE: ELECTRONIC CASE MANAGEMENT ( ) Fall 2014

ELECTRONIC DISCOVERY & LITIGATION SUPPORT

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

Niagara County Community College

Strategies for Preparing for E-Discovery

Predictability in E-Discovery

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA WESTERN DIVISION. Case No. 5:07-CV-231-F

REALITY BYTES: A NEW ERA OF ELECTRONIC DISCOVERY

Michigan's New E-Discovery Rules Provide Ways to Reduce the Scope and Burdens of E-Discovery

CIVIL DISCOVERY STANDARDS* AUGUST 1999 [NOVEMBER 2003 DRAFT AMENDMENTS TO ELECTRONIC DISCOVERY STANDARDS]

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Solving Key Management Problems in Lotus Notes/Domino Environments

Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

New E-Discovery Rules: Is Your Company Prepared?

COMING: NEW FEDERAL RULES ON E-DISCOVERY

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

for Insurance Claims Professionals

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES

Overview of E-Discovery and Depositions in U.S. IP Litigation

E-Discovery Best Practices

How To Preserve Records In Mississippi

Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1

How E-Discovery Will Affect Your Life as a Storage Professional. David Stevens, Carnegie Mellon University

Suggested Protocol for Discovery of Electronically Stored Information ( ESI )

The Many Different Types of Electronic Discovery Searches

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

E-Discovery for Paralegals: Definition, Application and FRCP Changes. April 27, 2007 IPE Seminar

CHAPTER 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Does not differentiate among media. The content of the message determines whether the message is a record.

Acceptable Use and Security of UBC Electronic Information and Systems

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Introduction to Audio ediscovery

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

Government records findings--recognition of public policy.

The Intrusive Nature of Discovery in U.S. Patent Litigation

DEFINITIONS. "this web site" means "user" means any person accessing any part of this web site DISCLAIMER

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Chapter RECORDS MANAGEMENT Sections:

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

Successful ediscovery in a Bring Your Own Device Environment

Rackspace Archiving Compliance Overview

REINHART. Labor & Employment E-News E-NEWSLETTER ATTORNEYS:

HOT TIPS ABOUT ESI. Hot Tips From the Coolest Family Law Attorneys Friday, September 27, 2013

Transcription:

Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination or other use of or taking of any action upon this information by persons or entities other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. Proprietary and Confidential Information shall include, but not be limited to, performance, sales, financial, contractual and special marketing information, ideas, technical data and concepts originated by the disclosing party, its subsidiaries and/or affiliates, not previously published or otherwise disclosed to the general public, not previously available without restriction to the receiving party or others, nor normally furnished to others without compensation, and which the disclosing party desires to protect against unrestricted disclosure or competitive use, and which is furnished pursuant to this document and appropriately identified as being proprietary when furnished. Copyright 2011 FishNet Security, Inc. All rights reserved. The FishNet Security logo is a registered trademark of FishNet Security. All other products and company names mentioned herein are trademarks or registered trademarks of their respective owners. Version Control Incident Response Document Issue Number Document Creator 1.0 (Draft) David Buckley Delivery Date 6.21.2011 Data Classification Public

Table of Contents...1 What is ESI?...1 Major Types of ESI Include...1 ESI and the FRCP...2 ESI Changes the FRCP...2 Data Retention and Written Policies...3

What is ESI? is defined by the Federal Rules of Civil Procedure (FRCP) as information created, manipulated, communicated, stored and or best utilized in digital format. For something to be considered ESI, it requires the use of computer hardware and software. In 2006, the term ESI became a legally defined phrase for use with the FRCP. When ESI is requested in litigation, a form of discovery known as Electronic Discovery (ediscovery) is used to access and collect the data requested. In its most basic form, ediscovery is the collection of electronically stored information that can be used in civil litigation. It is important to understand what both ESI and ediscovery are and the distinctions between the two. Individuals who are typically involved with ediscovery and ESI are IT employees and managers, lawyers, forensics investigators and law enforcement officers. Major Types of ESI The major types of ESI are as follows: Voicemail and voice recordings Email Instant messages MP3 files Web pages Databases Internet or phone logs Deleted Files Cached Files Internet Stored Cookies

ESI and the FRCP In 2006, several high-profile lawsuits mandated changes within the FRCP regarding the way ESI is discovered and admitted into court, and how the costs of such discovery is to be controlled by the parties involved. ESI is admitted into court on the basis of its level of accessibility and monetary cost. The level of recoverable and presentable ESI falls into five major categories: 1. Online Data, including hard disks 2. Near Line Data, including optical disks 3. Offline Storage, such as magnetic tapes 4. Backup Tapes 5. Fragmented, Erased and Deleted data Of these five categories, only the first three are considered to be easily and cheaply produced or presented in court. In simple terms, the courts have decided that if the cost of restoring the data outweighs its worth as evidence, then it will most likely not need to be recovered. However, depending on the type of case that is in litigation, digital forensics may be required or requested to recover fragmented or lost data. This form of ESI falls into the fifth level of data accessibility, which is fragmented, erased and deleted data. Since it is the most difficult, costly and time- consuming form of evidence to reproduce or recover, it is only used when absolutely necessary. ESI Changes the FRCP In 2006, there were several major changes to the FRCP in regards to ESI and ediscovery. Understanding and recognizing these changes is important because it affects how future litigation will be handled and how it will be admitted into court. In summary, the changes have to do with the acceptance of ESI and the time it takes for ediscovery to be completed. Below is a list of the rules that were recently altered: Rule 16 - Establishes the processes for the parties and court to address early issues pertaining to the disclosure and discovery of ESI. Rule 26 - Requires parties to discuss issues of electronic evidence at the discovery and planning conference, including an inadvertent waiver of privilege, preservation of evidence, and the form of production required. Rule 33 - Calls for a search of ESI in answer to interrogatories involving review of business records. Rule 34 - Adds a new category of discoverable information called electronically stored information and gives options for the form of production. Rule 37 - Creates a safe harbor for ESI, should electronic evidence be lost because of routine operation of a company s computer systems. Rule 45 - Outlines conditions for non-party production of ESI.

Data Retention and Written Policies In this day and age it is nearly impossible to not store data electronically. Electronic data can be stored automatically or manually by corporations or individuals who wish to retain the data for future use, archiving, or duplication; this is referred to as static data. Logical (active) data is present on all electronic devices people use, such as computers, cell phones, MP3 players and GPS units. Many other types of devices store both active and static data. IT managers and lawyers must understand what types of data retention policies are implemented by their company and how those policies are controlled. Established data retention policies should exist in every business and are incredibly important documents to have. The policy should define what types of information are stored, how they are stored, where they are stored, and for how long before they are overwritten or deleted. This type of document may be the best defense a company has against claims of deleting data in opposition to prosecution. If data is called into litigation but has been deleted, there must be an established reason why. A data retention policy is excellent proof as to why data was deleted. It is imperative that a data retention policy be kept up-to-date and referenced as a standard operating procedure. As the storage and acceptance of electronic data continues to grow, there will be additional changes made to documents like the FRCP, as well as changes in the litigation of ediscovery and acceptance of ESI in the court room. Technology is still growing by leaps and bounds, so it is important to follow the trends in technology and be prepared for the changes that they may bring. As people continue to incorporate technology into their everyday lives, it will likewise be incorporated into our society and legal system. Individuals, such as IT managers, lawyers, forensic investigators and even law enforcement officers must be aware of the ever-changing laws surrounding technology. Now is the optimal time to gain knowledge in this field, as it is arguably still in its infancy. About FishNet Security We focus on the threat so you can focus on the opportunity. Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology, services, support, and training. FishNet Security solutions have enabled 5,000 clients to better manage risk, meet compliance requirements, and reduce cost while maximizing security effectiveness and operational efficiency. For more information on FishNet Security, Inc., visit www.fishnetsecurity.com