GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!



Similar documents
GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!

GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

How E-Discovery Will Affect Your Life as a Storage Professional. David Stevens, Carnegie Mellon University

How E-Discovery Will Impact Your Life as a Storage Professional. David Stevens, Carnegie Mellon University

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

Metadata, Electronic File Management and File Destruction

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

ISO/IEC & ediscovery (ISO/IEC 27050) Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems

ARCHIVING FOR DATA PROTECTION IN THE MODERN DATA CENTER. Tony Walker, Dell, Inc. Molly Rector, Spectra Logic

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

plantemoran.com What School Personnel Administrators Need to know

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski

The Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems

In-House Solutions to the E-Discovery Conundrum

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

3 "C" Words You Need to Know: Custody - Control - Cloud

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

Record Retention, ediscovery, Spoliation: Issues for In-House Counsel

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

Standard: Information Security Incident Management

Cloud Archiving. Paul Field Consultant

Best Practices Series Document Retention and Best Practices

Introduction to Information Assurance. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

Preparing for a Security Audit: Best Practices for Storage Professionals

Practical Storage Security With Key Management. Russ Fellows, Evaluator Group

Using Classification to manage File Servers. Nir Ben-Zvi, Microsoft Corporation

Ethics and ediscovery

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

How To Manage Cloud Data Safely

FEDERAL PRACTICE. In some jurisdictions, understanding the December 1, 2006 Amendments to the Federal Rules of Civil Procedure is only the first step.

New E-Discovery Rules: Is Your Company Prepared?

HIPAA BUSINESS ASSOCIATE AGREEMENT

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

E-Discovery in Practice: A Roadmap for Financial Institutions

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

INFORMATION TECHNOLOGY SECURITY STANDARDS

VMware vcloud Air HIPAA Matrix

Solving Key Management Problems in Lotus Notes/Domino Environments

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

Disclaimer: Template Business Associate Agreement (45 C.F.R )

Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance

Cloud Computing: Legal Risks and Best Practices

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

EHR Contributor Agreement

THIS WEBCAST WILL BEGIN SHORTLY

Corporate Records Management Policy

in the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP

Service Description: Dell Backup and Recovery Cloud Storage

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

Supreme Court Rule 201. General Discovery Provisions. (a) Discovery Methods.

Archive and Preservation in the Cloud - Business Case, Challenges and Best Practices. Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP

Legal Issues of Forensics in the Cloud

ZIMPERIUM, INC. END USER LICENSE TERMS

Best Practices for. Protecting Privacy, Civil Rights & Civil Liberties. Unmanned Aircraft Systems Programs

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

10 Steps to Establishing an Effective Retention Policy

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Cloud Archive & Long Term Preservation Challenges and Best Practices

DATA BREACH COVERAGE

COMPLIANCE PRACTICES:

Assembly Bill No. 5 CHAPTER 5

Discovery Ethics Course Plan

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

Business Associate Agreement

Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1

HIPAA Security Alert

Data Preservation Duties and Protocols

SNIA Storage Security Best Practices

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Iowa Health Information Network (IHIN) Security Incident Response Plan

Understanding ediscovery and Electronically Stored Information (ESI)

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Spoliation of Evidence. Prepared for:

THE IMPACT OF THE ELECTRONIC DISCOVERY RULES ON THE EEOC PROCESS

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY

General Items Of Thought

Jozii LLC WEBSITE TERMS OF SERVICE

BUSINESS ASSOCIATE AGREEMENT

Paychex Accounting Online Terms of Use

WellDyneRxWEST Customer (TPA, Broker, Consultant, Group Health Plan, and other).

for Insurance Claims Professionals

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.

Transcription:

Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! David Stevens Dell

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

Abstract Many organizations face the challenge of implementing protection and data security measures necessary to comply with a wide range of regulatory, statutory, and other legal requirements. Because storage systems (actually the data they contain) play an important part in many of these issues, storage managers and administrators may be asked to assist in supporting a variety of legal actions as well as help their organizations guard against data transgressions having legal consequences. Thus, they need to be capable of taking abstract regulatory, statutory and other legal requirements and translating them into implementable solutions. In addition, they must be able to partner with the legal community to ensure these solutions address the organization s compliance requirements and that the support is timely and responsive. This session describes the legal issues storage security professionals are likely to encounter as part of their role as the focal point for securing storage systems. 3

Introduction Many organizations face complying with a wide range of: regulatory, statutory, and other legal requirements. Storage managers and administrators may be asked to: assist in supporting a variety of legal actions take abstract legal requirements and translate them into implementable solutions help their organizations guard against data transgressions having legal consequences 4

Summary of Legal Areas Discovering pertinent stored information or data by parties involved in a legal action or proceeding (Electronic discovery) Protecting the confidentiality of private information (Privacy) Administration, management, and control of information and data related to an event so that it can be used to prove the circumstances of an event (Evidence Management & Forensics) Addressing accountability and responsibility issues Factoring in the geopolitical boundaries and the jurisdictional implications 5

A Few Definition 6

Definitions Authentic For evidence, being found by a jury (or trier of fact) to be what it purports to be and thus being worthy of trust, reliance, or belief. Authentication The act of meeting the threshold level for admissibility, but not necessarily of authenticity of evidence (e.g., ESI). Authenticity The property, condition, or quality of being worthy of trust, reliance, or belief because the proponent (offeror) has shown enough corroborating evidence to a jury (or trier of fact) to warrant such. Care Level of active concern, or lack of negligence, towards avoidance of possible dangers, mistakes, pitfalls, and risks, demanded of a party as a duty or legal obligation. See also due care and duty of care. 7

Definitions (cont.) Chain of custody A process that tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer. Confidentiality The property that data cannot be accessed by unauthorized parties. Digital Forensics The collection, identification, preservation and analysis of digital information for use in legal or administrative proceedings. 8

Definitions (cont.) Due care (Duty of care) Degree of care that an ordinary and reasonable person would normally exercise, over his or her own property or under circumstances like those at issue. The concept of due care is used as a test of liability for negligence. Due diligence Measure of prudence, responsibility, and diligence that is expected from, and ordinarily exercised by, a reasonable and prudent person under the circumstances. Electronic discovery (ediscovery) The pretrial process of discovering pertinent stored information or data by one or both parties involved in a legal action or proceeding. 9

Definitions (cont.) Electronically stored information (ESI) Computer generated data or information of any kind and from any source, whose temporal existence is evidenced by its storage in, or on any electronic medium, wherever located, now existing or developed in the future, and irrespective whether such medium is real, virtual or otherwise. Evidence preservation A process to maintain and safeguard the integrity and/or original condition of the potential digital evidence. Native data format The original, non-derived format and structure of data, together with its associated metadata. Personally identifiable information (PII) Any data about an individual that could, potentially identify that person. 10

Definitions (cont.) Privacy The right of an entity (normally an individual or an organization), acting on its own behalf, to determine the degree to which the confidentiality of their private information is maintained. Privacy breach An event that exploits a vulnerability to reveal PII, or creates a loss of control over PII. Provenance Information regarding an item's source, origin, custody and ownership. Spoliation of evidence The intentional or negligent destruction, hiding, alteration, withholding or concealment of withholding of evidence relevant to a legal action. 11

Electronic Discovery 12

Problem Summary: ediscovery ediscovery has been predominantly U.S. based Federal Rules of Civil Procedure (FRCP) is a set of regulations that specify procedures for civil legal suits within United States District (federal) Courts Many state courts civil procedural rules closely follow or adopt similarly worded rules The standard for discoverability is generally that the discovery must be "reasonably calculated to lead to the discovery of admissible evidence" Rule 26(b)(1) Most or all common law countries have some form of ediscovery regulations and provisions. Several countries have implemented blocking statutes to thwart U.S. discovery requests 13

Electronic Discovery Reference Model Information Management Getting your electronic house in order to mitigate risk & expenses should electronic discovery become an issue, from initial creation of electronically stored information through its final disposition. Identification Locating potential sources of ESI & determining its scope, breadth & depth. 14

Electronic Discovery Reference Model (cont.) Preservation Ensuring that ESI is protected against inappropriate alteration or destruction. Collection Gathering ESI for further use in the electronic discovery process (processing, review, etc.). Processing Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review & analysis. Review Evaluating ESI for relevance & privilege. Analysis Evaluating ESI for content & context, including key patterns, topics, people & discussion. Production Delivering ESI to others in appropriate forms & using appropriate delivery mechanisms. Presentation Displaying ESI before audiences (at depositions, hearings, trials, etc.), especially in native & near-native forms. 15

Storage Relevance: ediscovery ediscovery requirements can present several challenges locating ESI, ESI preservation, identifying relevant ESI, and producing and receiving ESI. Litigation holds on ESI must be honored to avoid evidence spoliation (and possible sanctions). In-house and external counsel must become familiar with ICT infrastructure (i.e., lawyers become ICT literate). Subject matter experts can be subpoenaed to testify about and explain corporate electronic document retention means and methods, policies and procedures. 16

Evidence & Forensics 17

Problem Summary: Evidence & Forensics Courts are increasingly treating digital evidence in the same way as more traditional documents; they have noted that digital evidence tends to be more voluminous, more difficult to destroy, easily modified, easily duplicated, potentially more expressive, and more readily available. In the digital world, most actions leave traces in the digital record that may be of significance in legal actions. The challenge of digital forensics is to collect these traces as unobtrusively as possible minimize impact to ongoing business operations preserve the ability of these traces to be admitted as evidence in a legal proceeding. 18

Storage Relevance: Evidence & Forensics Necessitate an evidence lifecycle management strategy that assists with chain of custody, authenticity, and data authentication. A forensic data collection in a storage environment can be disruptive and present many challenges Procedural (size, sources of information, etc.) Technological (formats, access, virtualization, etc.) Completeness (identifying all relevant information) Services such as encryption and deduplication present their own special challenges that must be addressed during planning for the collection process. 19

Privacy 20

Problem Summary: Privacy Many countries the U.S. being a notable exception consider privacy to be a fundamental human right. Privacy protection laws have been introduced in a significant number of countries. The types of protected data can vary significantly Privacy violations can include the unlawful storage of personal data, the storage of inaccurate personal data, or the abuse or unauthorized disclosure of such data. 21

General Privacy Requirements (ISO/IEC 29101) It must be possible to pull together definitive records of what PII is known/stored about people (including PII recorded in logs and backup); It must be possible to account for all personal information, no matter how it is collected (including internal generation); The real need for routine audit logging that includes or creates PII must be assessed as part of system design; Privacy design must include the security of backed up and archived data when it contains personal information; 22

General Privacy Requirements (ISO/IEC 29101) cont. It must be recognized that transaction histories in e-retailing applications creates behavioral PII and may allow other PII to be deduced (e.g. buying herbal remedies and non-prescription medication may indicate consumers' beliefs in their own state of health); The need and capacity to record privacy inquiries (e.g. to resolve disputes) needs to be considered in applications based on databases containing PII; Change management procedures for web applications must protect against inadvertent changes that affect privacy, e.g. ensure that changes to web forms do not change the nature or amount of PII collected; Privacy design must include the management of ephemeral or incidental PII, e.g. help desk or customer service logs. 23

Storage Relevance: Privacy The use of some form of data classification can help identify the data that need protection as well as the nature of the protection Encryption, when used correctly, can be an important tool to protect data confidentiality Breach notification requirements for protected data may necessitate data monitoring to help identify suspected data breaches Data movements (like data replication associated with DR/BC solutions) must respect geopolitical boundaries to avoid privacy violations 24

Accountability & Responsibility 25

Problem Summary: Accountability & Responsibility Increasingly, government officials and corporate executives are being held personally accountable for their actions or lack of action Inappropriate data handling or malicious attacks on data can cause individuals and organizations to incur liabilities (civil litigation) Unauthorized possession or access of regulated data can result in penalties and force costly breach notifications Adherence (or lack thereof) to organizational policy can be an important factor in determining negligence 26

Storage Relevance: Accountability & Responsibility Protections may be necessary in the storage infrastructure to guard against unauthorized, accidental or intentional corruption, modification, or destruction of data The risks associated with data breaches can be significant for some organizations, so prudence dictates the use of reasonable measures (like following best practices) to guard against these breaches Proper data preservation and disposal activities are necessary for an organization to meet its legal obligations Policies are important administrative controls to facilitate proper data handling 27

Jurisdiction & Cross Border Data Transfers 28

Problem Summary: Jurisdiction & Cross Border Data Transfers Many countries regulate the handling and storage of certain types of data Some governments are also struggling to deal with Critical questions about the limits of their jurisdiction over the Internet. Regulating their citizens' (and organizations ) activities on the Internet. Organizations have adopted computing models that allow data to reside in many locations Complicates the matter of who has authority or jurisdiction over this data when it is in flight Jurisdiction is less complicated for data when it is at rest; however, there may be multiple entities asserting their authority. 29

Storage Relevance: Jurisdiction & Cross Border The use of some form of data classification can help identify the data that have geopolitical restrictions Data movements (like data replication associated with DR/BC solutions) must respect geopolitical boundaries to avoid violations Multiple, overlapping jurisdictions can result in an untenable position (like U.S. discovery requests for data residing in France) Data breaches on foreign soil can be considered illegal technology transfers 30

Final Thoughts 31

Final Thoughts Legal issues and requirements are beginning to impact storage infrastructures and personnel, and this trend is expect to continue. Several of the topics addressed in this session represent emerging areas of the law, so expect changes and further developments. When dealing with the legal community, expect answers like it depends when seeking clarity. Compliance is often cited as a driver for security, but a close inspection will often show that compliance is being driven by legal elements. 32

Other SNIA Security Tutorials Backup and Archiving in the Cloud Track: Monday 4:05 pm: A Hype-free Stroll Through Cloud Storage Security Data Encryption Track: Thursday 8:30 am: Implementing Stored-Data Encryption Thursday 11:15 am: Practical Secure Storage: A Vendor Agnostic Overview 33

Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracktutorials@snia.org Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee Eric A. Hibbard, CISSP, CISA Steven Teppler, Esq. Dave Stevens SNIA Security TWG 34

For More Information 35

Useful Web Resources ABA E-Discovery & Digital Evidence (EDDE) Committee, http://new.abanet.org/sections/scitech/st203001/pages/default.aspx The Sedona Conference, http://www.thesedonaconference.org/ Wikipedia Common Law, http://en.wikipedia.org/wiki/common_law 36

Useful Printed Resources Books Foundations of Digital Evidence, Paul, 2008, ISBN-13: 978-1604421040 Real Digital Forensics: Computer Security and Incident Response, Jones, Bejtlich, Rose, 2006, ISBN-13: 978-0321240699 Electronic Discovery and Digital Evidence in a Nutshell, Scheindlin, Capra, The Sedona Conference, 2009, ISBN-13: 978-0314204486 Electronic Discovery and Digital Evidence: Cases and Materials, Scheindlin, Capra, The Sedona Conference, 2008, ISBN-13: 978-0314191311 Electronic Evidence: Law and Practice, Second Edition, Rice, 2009, ABA, ISBN-13: 978-1604420845 Electronic Evidence and Discovery: What Every Lawyer Should Know Now, Second Edition, Lange, Nimsger, 2009, ISBN-13: 978-1604423822 ISO/IEC Information Technology -- Security techniques standards: (including drafts) ISO/IEC 27037 Guidelines for identification, collection and/or acquisition and preservation of digital evidence ISO/IEC 29100 Privacy framework ISO/IEC 29101 Privacy reference architecture 37

SNIA Security Organizations SNIA Security Technical Work Group (TWG) Focus: Requirements, architectures, interfaces, practices, technology, educational materials, and terminology for storage networking. http://www.snia.org/tech_activities/workgroups/security/ Storage Security Industry Forum (SSIF) Focus: Educational materials, customer needs, whitepapers, and best practices for storage security. http://www.snia.org/ssif 38