Mitigating Discovery within Government Investigations

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

Health Records Management Practitioner
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
Clean-up Days!.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
William P. Butterfield February 16, Part 1: Why Can’t We Cooperate?
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Litigation and Procedure Discovery: Overview and Interrogatories Litigation and Procedure.
E-Discovery LIMITS ON E-DISCOVERY. No New Preservation Rule When does duty to preserve attach? Reasonably anticipated litigation. Audio sanctions.
Records Management What to Keep and What to Toss.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Plenary I: Overview of Anti-Cartel Enforcement Manual Chapters – Best Practices Searches, Raids and Inspections A South African perspective 2012 ICN Cartel.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
1 © Copyright 2008 EMC Corporation. All rights reserved. Litigation Response Planning: eDiscovery Best Practices Stephen O’Leary Sr. eDiscovery and Compliance.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Sexual Exploitation and Abuse Management of Investigations Workshop.
SharePoint at SRP Perry Bellaire Content Management Salt River Project 2/9/2010.
Avoiding the Iceberg Sean Regan October 2008.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
 needs to be met  existing resources  content outline  contributor team  contract details  timeline.
By Helen Streck President/CEO Kaizen InfoSource LLC Litigation Readiness: Information Manager’s Role.
Basic Records Management. What we’ll cover Virginia Public Records Act Definitions Understanding and using the LVA General Schedules The schedule cover.
Using Proper Methods/ Importance of Chain of Custodies- Maria Ortiz, City West Palm Beach Maria Ortiz, City West Palm Beach.
Bringing Control to FBI Files Nationwide John Charles Krysa Chief, Records Automation Section Records Management Division, FBI.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
The Sedona Principles 1-7
Disaster planning and management Small public offices information briefing December 2004.
ACCESS for VALIDITY ACCESS for INNOVATION. Starting January 2011 for NEW proposals Not voluntary – “integral part” of proposal and FastLane Required for.
Marco Nasca Senior Director, Client Solutions TRANSFORMING DISCOVERY THROUGH DATA MANAGEMENT.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
EDiscovery, Records Management and Records Retention.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
FILE NUMBER Kent Grey, Partner 1 June 2012 Technology in Governance Risk-intelligent approach to the use of technology “in the Boardroom”
Rambus v. Infineon Technologies AG 22 F.R.D. 280 (E.D. Va. 2004)
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
E-discovery Discussion. 2 Policies and Procedures Do you have a set of e-discovery policies and procedures? – Who is the lead for e-discovery efforts.
August 13, 2013 Michael Carlson, NARA Lynn Stewart, NARA 2014 Annual Move: Tips on the Agency Review List 1.
ITCC / IT Retreat Data Access Procedure December 10, 2009 Karl F. Lutzen Information Security Officer.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
The PL&B Insurance Solution Risk Counselling EPL Education Service Review Safety Wellness Return to Work Legal Compliance Continuity Planning Cyber Liability.
#16PACE Preparing For The Inevitable... How To Be Ready When The Lawsuit Comes And Steps To Proactively Limit Corporate Inconvenience And Liability Mitchell.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
Liability of Accountants and Other Professionals
Leveraging the Data Map – A Case Study November 15, 2016
Data Minimization Framework
ILTA – Insight 2007 E-Disclosure Preparedness --A New Frontier--
Policy & Procedure Writing
Module 1: Introduction to Designing Security
Lawsuits What Happens and Best Practices
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
Records Management Basics
MDNC/WDNC CJA/FPD Training April 27, 2018 Presented By
SCD Grants & Contracts Policy & Procedure 670.
Archiving Legal eDiscovery Lotus Notes Domino
Records Destruction presented by Records Management
The Digital Revolution in Medical Records
IT Preservation Holds and Public Information Requests
Lawsuits What Happens and Best Practices
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
The Journalist’s Toolbox
Managing Privacy Risk in Your Commercial Practices
The Digital Revolution in Medical Records
Make it real: Help your customers comply with the GDPR
The Hidden Costs of E-Discovery and Proven Strategies for Cost Cutting
Presentation transcript:

Mitigating Discovery within Government Investigations Aaron Vick, Chief Strategy Officer Aaron@cicayda.com Michael Tanji, Cyber Security Expert Mike@cicayda.com

Prior to a Government Investigation Policies and Procedures Document/Email Retention (Paper and Digital) Data Accessibility On-Premise Offsite Cloud Existing Manuals, Written Policies, etc

When the Request Arrives

When the Request Arrives

When the Request Arrives Identify & index the requests for data

When the Request Arrives Identify & index the requests for data Identify any overlapping litigation

When the Request Arrives Identify & index the requests for data Identify any overlapping litigation Establish procedure for documenting

When the Request Arrives Identify & index the requests for data

Issuing Legal Hold Issue hold throughout entire company? What is currently being investigated? What should be identified? Multiple questionnaires needed?

Who, What, When, Where Who What When Where Who are the custodians? What format is the data stored? When What date range is in question? Where Where is the data stored?

Analyze Why is there an investigation? What data sources do you have? What information can you cull down? What parameters can you put on the data to get to a more manageable amount?

Protecting Privilege & Work Product Draft a protocol outlining initial criteria for privileged material Would you produce any requested data in civil litigation? Request for FOIA Exemption under 5 U.S.C. § 552(b)(4)

Review What is responsive based upon review requests? Is the volume of data too large for an adequate review based on the request deadline? Preparing for rolling productions

Experts Helping Experts Corporate Threat Detection Managing Large Scale Litigations (MDL) Government Investigations Request