The Honorable Dwight Kay Illinois House of Representatives 401 Stratton Springfield, Illinois 62706. June 10, 2014. Dear Mr. Kay,



Similar documents
PRIVACY IMPACT ASSESSMENT

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

Solving.PST Management Problems in Microsoft Exchange Environments

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

State of Michigan Records Management Services. Guide to E mail Storage Options

for Insurance Claims Professionals

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Electronic Data Retention and Preservation Policy 1

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

Preservation and Production of Electronic Records

Electronic Discovery How can I be prepared? September 2010

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

OVERCOME REGULATORY DATA RETENTION CHALLENGES WITH COMPLIANCE ARCHIVING

ARCHIVING. What it is, what it isn t, and how it can improve your business operations

Overview of E-Discovery and Depositions in U.S. IP Litigation

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

Discovery Technology Group

The E-Discovery Process

What You Should Know About ediscovery

ediscovery and Information Governance Practice Overview

ELECTRONIC DISCOVERY. Dawn M. Curry

WHY DO I NEED DATA PROTECTION SERVICES?

REINHART. Labor & Employment E-News E-NEWSLETTER ATTORNEYS:

How To Find Out What You Know About Esi

REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

Records Management Electronic Records and Electronic Discovery

How To Preserve Records In Mississippi

Best Practices in Electronic Record Retention

Guide to advanced ediscovery solutions

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

Purpose: To ensure that e-discovery Requests and Litigation Hold Notices are received, routed and responded to in a timely and thorough manner.

The Disconnect Between Legal and IT Teams

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Electronic Discovery

Neil Meikle, Associate Director, Forensic Technology, PwC

Library Recovery Center

E-Discovery Perils: The AutoArchive Function Not Gone, But Forgotten?

Exchange Server 2010 & C2C ArchiveOne A Feature Comparison for Archiving

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

Five Steps to Ensure a Technically Accurate Document Production

E-Discovery in Practice: A Roadmap for Financial Institutions

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

A Websense White Paper Websense CloudMerge Ingestion Service

Litigation Support. Learn How to Talk the Talk. solutions. Document management

E-DISCOVERY: A Primer

e-discovery Forensics Incident Response

FAIRFAX CIRCUIT COURT ATTORNEY ISSUED SUBPOENA GUIDELINE PROCEDURES AND FORMS

How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

University of Louisiana System

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

Essential Archive Requirements for E-discovery Facilitating Discovery & Production

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

E-Discovery Toolkit for Educational Institutions

Are Mailboxes Enough?

Archive: Implementing Information Management

Article originally appeared in the Fall 2011 issue of The Professional Engineer

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation

Predictability in E-Discovery

EPA Classification No.: CIO 2155-P-3.0 CIO Approval Date: 04/04/2014 CIO Transmittal No.: Review Date: 04/04/2017

Digital Forensics & e-discovery Services

Case Study: Hiring a licensed Security Provider

Ms. Debbie Davenport Auditor General Office of the Auditor General 2910 North 44 th Street, Suite 410 Phoenix, Arizona Dear Ms.

PAPERLESS IS POSSIBLE: A MODEL FOR IMPLEMENTING THE PAPERLESS LAW FIRM

Archiving: Common Myths and Misconceptions

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

In-House Solutions to the E-Discovery Conundrum

A White Paper from AccessData Group. The Future of Mobile E-Discovery

MTASC Spring Meeting IT Policies, E-Discovery, Records Management & FOIA

A White Paper from AccessData Group. The Future of Mobile E-Discovery

How To Write A Hit Report On A Lawsuit Against A Company

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director

Vancouver Toronto Seattle

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Retention, Archiving and Destruction Procedure v1.2. Records Manager

e-discovery Forensic Services kpmg.ch Advisory

Integration of E-Discovery and FOIA

Solving Key Management Problems in Lotus Notes/Domino Environments

Goodwill South Florida Defends Data Against the Future Threat of Hurricanes with Cloud-Based Data Recovery

# Is ediscovery eating a hole in your companies wallet?

Case 2:14-cv KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Developing an Integrated e-discovery and Corporate Records Management Program. Presented by: Janeine Charpiat Information Security Professional

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Recovering Microsoft Exchange Server Data

Union County. Electronic Records and Document Imaging Policy

City of New Orleans. Records Retention Final Report. April 15, 2010

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

Cloud Computing. What is Cloud Computing?

How To Answer A Question About Your Organization'S History Of Esi

Document Storage Tips: Inside the Vault

Transcription:

PO Box 3954 Decatur, IL 62524 P: (217) 615-1888 E: info@garrettdiscovery.com The Honorable Dwight Kay Illinois House of Representatives 401 Stratton Springfield, Illinois 62706 June 10, 2014 Dear Mr. Kay, On April 16, 2014 you requested that our office assist you in obtaining, reviewing and organizing documents and electronically stored information obtained by the Illinois Auditor General during the Performance Audit of the Illinois Violence Prevention Authority (IPVA) Neighborhood Recovery Initiative (NRI). On May 19, 2014 by your authority I met with Illinois Auditor General Audit Manager Mike Maziarz and discussed the IPVA/NRI Performance Audit. I was given unfettered access to the audit materials absent documents and Electronically Stored Information (ESI) ordered to be redacted. I requested copies of certain materials and subsequently requested that all materials be provided. Thereafter, I received from your office four DVD s containing audit materials in electronic format totaling 14,057 pages provided to you by the Auditor General. I loaded the ESI into an electronic discovery review platform, processed the files for optical character recognition and bates stamped each. You initially asked if I considered the production of emails to be complete. After a cursory review, I reported to you that I had noticed gaps in conversations where emails were sent with no responses and conversations were broken due to missing email chains. The production did not appear complete and needed further analysis. Additionally, the Auditor General Performance Audit stated, according to the former IVPA Director, IVPA selected the communities to be served by NRI based on an analysis performed by the Department of Human Services (DHS) for the Safety Net Works

program. However, IVPA and DHS could not locate the analysis used nor could IVPA provide any other documentation to auditors showing how Chicago communities were selected to participate in NRI. I considered this quote curious and would have expected to find emails involving the selection of grantees. On June 3, 2014 you asked that I review the ESI and documents in order to answer three questions: 1. Did Central Management Services (CMS) provide all of the emails requested by the Auditor General? 2. What other sources of Electronically Stored Information (ESI) may have been relevant to the Auditor General s Performance Audit? 3. What methods of discovery are normally used when there is a lack of trust? On June 10, 2014 I completed my analysis of the ESI and documents provided by the Auditor General. I have the following to report in response to your questions: *Note Background information is given below in order to enhance your understanding of my answers to your questions. 1. Did Central Management Services provide all of the emails requested by the Auditor General? The Electronic Discovery System at Central Management Services In 2005, the State of Illinois began an Information Technology (IT) Rationalization and Consolidation initiative to improve state IT systems and efficiencies. As part of this IT effort most state agencies were converted to a @illinois.gov email address allowing the Illinois Department of Central Management Services to control and maintain a single email system. The solution included an enterprise email vaulting/archiving service and full electronic discovery capabilities costing the taxpayers 2.4 million dollars. An off-site disaster recovery (DR) component for selected email users, supporting both email and mobile messaging (Blackberry) was established to back-up the entire solution. Page 2 of 5

In 2008, enterprise email vaulting/archiving service and full electronic discovery capabilities were enabled for all @illinois.gov email accounts. Prior to this system, an electronic discovery search would routinely take days and weeks to accomplish. Most requests can now be handled in minutes. IVPA and CMS employees have had @illinois.gov email accounts since 2010 and those emails are stored on the Central Management Services email servers and can be searched using the Electronic Discovery System. Reference: https://www.illinois.gov/bccs/policies/documents/esi_retention_policy.pdf http://www.nascio.org/awards/nominations/2010/2010il5- BCCS%20PIM2010%20final%20submission.pdf The policies governing use of the Electronic Discovery System CMS provides electronic discovery services to all state agencies who have @illinois.gov email addresses. State of Illinois email users and administration personnel do not have the authority, expertise and software necessary to search CMS email servers for deleted or archived mail. Only the CMS Personal Information Management (PIM) group has such authority, expertise and software necessary to search CMS email servers for live, deleted and archived mail. Only state agency executives have the authority to request that the CMS PIM group search their own agency employee emails for relevant information. There is a high probability the requestor may not receive all of the Electronically Stored Information CMS PIM staff will only search and respond to inquiries from agency executives. The requestor of emails must provide a detailed request. In recent Illinois Circuit Court cases the CMS PIM has proven to only search for ESI exactly as they are asked. For instance, if a request was made for all emails the response from CMS would not include backed up, archived, deleted or draft emails regardless of the subpoena or FOIA request using plain language such as all emails. I have Page 3 of 5

seen this strategy used in civil cases in both state and federal courts in order to hide documents from discovery. This is why the courts assign special masters or electronic discovery experts to oversee the discovery process. The electronic discovery system was under direct control of one of the subpoenaed witnesses before the Audit Commission Malcolm Weems was the Director of CMS and was in control of the very system that contained the ESI requested by the Auditor General. The Auditor General requested from the IVPA attorney access to employee emails, but was unable to verify whether or not all emails were provided. If Mr. Weems had been involved in wrongdoing it would be highly unlikely that he or his staff would be willing to deliver materials to the Auditor General showing any wrongdoing. Archived vs Deleted Emails Central Management Services maintains two software programs that aid in the storage, search and production of emails. The Symantec Enterprise Vault (EV) is a sophisticated software program that saves all emails to comply with the Illinois State Records Act. The second is the Electronic Discovery Accelerator program managed by the PIM group that can search for live, archived and deleted emails including those emails no longer available to the email program user. To date, no one has been able to answer whether or not the emails provided to the Auditor General for use in the Performance Audit included all emails from the backup tapes or the EV. Based on the information above, it is my opinion the Auditor General was not given all of the emails requested to conduct the Performance Audit. 2. What other sources of Electronically Stored Information (ESI) may have been relevant to the Auditor General s Performance Audit? Central Management Services provides laptops, desktops and mobile phones (Blackberry) to some employees. A few select employees are allowed to use Page 4 of 5

personal devices to connect to the state s networks. The use of personal devices has created a situation in which the data and or device may not be subject to discovery requests from the court or FOIA. Additionally, deleted files can be recovered with forensic tools from laptops and mobile devices. It is my opinion that relevant data may exist on state and personally owned mobile devices, laptops and servers. 3. What methods of discovery are normally used when there is a lack of trust? I have worked on cases in which opposing counsel has expressed trust issues in discovery. Often courts will assign a special master (often an attorney) or an Electronic Discovery Expert to navigate the technology and write an unbiased opinion of whether or not the parties have complied with all aspects of the court ordered discovery. I highly suggest that an independent Electronic Discovery Expert search the state s network and return the collected ESI and documents to the Commission. Andrew Garrett ediscovery / Computer Forensic Expert June 10, 2014 Signature Date Page 5 of 5