Copyright © 2013 by K&L Gates LLP. All rights reserved. PROTECTIVE ORDER/CONFIDENTIALITY AGREEMENT CHALLENGES PRESENTED BY EVER-EVOLVING ELECTRONIC DATA.

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Washington Tax Law and Cloud Computing
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Business Technology Applications Computer Basics.
S P I N X  In the beginning was DOS (Disc Operating System).  You might see a little bit of DOS when you first turn the power on to your computer.
Web Fundamentals Training Series All About the Web.
Information Technology, the Internet, and You
1 E-Commerce Introduction Professor Joshua Livnat, Ph.D., CPA 311 Tisch Hall New York University 40 W. 4th St. NY NY Tel. (212) Fax (212)
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
C LIENT /S ERVER AND P EER TO P EER National 4/5 Computing Science.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Introduction to Computers Computer Applications. What is a Computer? An electronic machine that can  Receive data  Process data  Produce results 
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
The Office Procedures and Technology
Item Web 2.0 application relevant to teacher’s work.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
B.A. (Mahayana Studies) Introduction to Computer Science November March Software What is software? What are the main types of software?
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
PIZZA WEB PAGE May 28, FOR TODAY  Review Vocabulary Words (take out your worksheets!)  Pizza Web Page  Research more tags  Turn in your homework!
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Introduction to Computers Computer Applications. What is a Computer? An electronic machine that can  Receive data  Process data  Produce results 
WEB TERMINOLOGIES. Page or web page: a file that can be read over the world wide web Pages or web pages: the global collection of documents associated.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Logistics and Systems Rabby Q. Lavilles. Supply chain is a system of organizations, people, technology, activities, information and resources involved.
Networks QUME 185 Introduction to Computer Applications.
APPLICATION SOFTWARE. EXAMPLE S What’s an application software ? Application software consists of programs designed to make users more productive and/or.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
How computer’s are linked together.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Types of Electronic Infection
Communication, Networks, The internet and the Worldwide Web.
Here are some paper use reduction strategies to consider for your organization: Analyze your largest documents, such as publications and major mailings.
Networking Relationships What is a computer network?
Computer Architecture
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
Productivity Programs What is the use of a Word Processing, Desktop Publishing and Spreadsheet programs? What is the use of a Database and Presentation.
1 Title: Introduction to Computer Instructor: I LTAF M EHDI.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Web Server.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Communications & Networks National 4 & 5 Computing Science.
Introduction TO Network Administration
IS Infrastructure Managing Infrastructure and Services Copyright © 2016 Curt Hill.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
ETERE A Cloud Archive System. Cloud Goals Create a distributed repository of AV content Allows distributed users to access.
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
The Internet & World Wide Web
© 2016 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Application Software Chapter 6.
Chapter 4: Application Software
Components of information systems
Application Layer Honolulu Community College
Information Technology (IT) Department
TYPES OF SERVER. TYPES OF SERVER What is a server.
Introduction to computers
Unit# 5: Internet and Worldwide Web
Chap 2. Computer Fundamentals
Client/Server and Peer to Peer
Presentation transcript:

Copyright © 2013 by K&L Gates LLP. All rights reserved. PROTECTIVE ORDER/CONFIDENTIALITY AGREEMENT CHALLENGES PRESENTED BY EVER-EVOLVING ELECTRONIC DATA STORAGE PRACTICES Louann Cutler Partner

1  Confidentiality Agreements and Protective Orders usually contain language requiring the parties to destroy or return documents at the completion of the transaction or litigation  “Documents” are generally defined broadly to include all manner of electronic as well as hard copy images

2  In the ever expanding world of electronic data storage practices, compliance with the return/destruction requirement goes beyond making sure that all hard copies, disks, thumb drives, the databases in which you have stored electronic images, extranet sites, and documents attached to s are destroyed or disabled.

3 Think expansively. Some examples:  Back up/disaster recovery media   File sharing  Wikipedia defines file sharing as “the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images and video), documents, or electronic books. … Common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking.”removable mediacomputer networksWorld Wide Web hyperlinkedpeer-to-peer networking  Copier hard drives  Fax machine memories  After project over, usually only technicians have access; expensive to destroy outside of routine destruction practices

4  Cloud Computing  According to Wikipedia: “Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user’s data, software and computation.”

5

6  Hyperlinking of citations in briefs or other documents can be done with a cloud  Need to make sure clouds are disabled when complying with return/destruction requirement of PO or CA

7 Bottom line  Think through all unique electronic storage issues when complying with request to return or destroy  Other party has the same issues, so should be able to work through together cooperatively  Consider addressing in advance in the PO and/or CA.

8 DISCUSSION/QUESTIONS/COMMENTS