Obtaining Electronic Evidence For Use in Litigation

Slides:



Advertisements
Similar presentations
REFINING YOUR DISCOVERY TACTICS: A PLAINTIFF PERSPECTIVE Amanda A. Farahany Barrett & Farahany, LLP 1401 Peachtree Street, Suite 101 Atlanta, GA
Advertisements

Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Responding to Subpoenas Springfield Metropolitan Bar Association Doug Healy March 25, 2013.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
10/13/08JULIA KRIPKE - CONFIDENTIAL STAMPS1 The CONFIDENTIAL Stamp In litigation, each side produces* documents* in response to the other side’s discovery*
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Ethical Issues in the Electronic Age Ethical Issues in the Electronic Age Frost Brown Todd LLC Seminar May 24, 2007 Frost Brown.
Developing a Records & Information Retention & Disposition Program:
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Advanced Civil Litigation Class 9Slide 1 Advantages of a Deposition You can ask specific follow-up questions based on the answers you get You can ask specific.
Advanced Civil Litigation Class 11Slide 1 Production of Documents Scope Scope Includes documents of all types, including pictures, graphs, drawings, videos.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Legal Document Preparation Class 12Slide 1 Functions of the Discovery Process Narrow the issues –After investigation, you can more easily determine which.
CIVIL PROCEDURE CLASS 20 Professor Fischer Columbus School of Law The Catholic University of America October 11, 2002.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
HIPAA Privacy Rule Implementation Status Report Richard M. Campanelli, J.D. Director, Office for Civil Rights Before the The Tenth National HIPAA Summit.
Electronic Discovery Guidelines Meet and Confer - General definition. a requirement of courts that before certain types of motions and/or petitions will.
Legal Issues Contracts & Electronic Discovery Source: CSA Security Guidance Report v.3 Presented by: Toby Tobkin – 1.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
Data protection—training materials [Name and details of speaker]
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
E-Discovery Copyright 2008 Thomas F. Goldman. WHAT HAVE THEY DONE TO US NOW? OH NO, NOT AGAIN!!!!!!!!!! Overview.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
Forms of Pretrial Discovery in the Auto Property Damage Case Mark Demian and Jeffrey Dubin Javitch, Block & Rathbone LLP.
Records Management Reality
Sensitive Data Redaction
An Attorney’s duty of Technical Competence
Indiana Access to Public Records Act (APRA) Training
Leveraging the Data Map – A Case Study November 15, 2016
Student Privacy in an Ever-Changing Digital World
Tues., Nov. 11.
Intellectual Property Owner’s Manual
PRE-SUIT CONSIDERATIONS
Civil Litigation: Before The Trial
The Ethics of Technology
General Data Protection Regulation
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
E-Discovery: An Introduction to Digital Evidence
The European Union General Data Protection Regulation (GDPR)
Privacy & Access to Information
MODULE C - LEGAL SUBMODULES C1. Conflict Of Interest/Code Of Ethics
Litigation Holds: Don’t Live in Fear of Spoliation
Current Privacy Issues That May Affect Your Credit Union
Texas Secretary of State Elections Division
ICN Cartel Working Group SG-1
General Data Protection Regulation
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Health Care: Privacy in a Digital Age
Patrick Sefton | Principal, Brightline Lawyers
Legal Ethics of Information Governance Presented by Sean Monahan
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
GDPR Session
Sadi R. Antonmattei-Goitia Sullo & Sullo, LLP February 16, 2019
Dana Neacsu, Secondary Sources II Dana Neacsu,
Presentation transcript:

Obtaining Electronic Evidence For Use in Litigation Presented by Brian Sniffen and Tara O’Hanlon Miller Nash Graham & Dunn LLP

Background/Experience Brian Sniffen – former litigator, and he’s OK with that. Data Privacy and Data Security Intellectual Property (trademarks and copyright work) General Business/Corporate Counsel Tara O’Hanlon – current litigator, she loves it. General commercial litigation Construction litigation and contract drafting Condemnation litigation Employment litigation

Discussion Topics Brian will provide an overview of things to consider from the perspective of a recipient of a subpoena or other information request. (Opportunity to reach out before it’s an issue.) Tara will discuss some of the nuts and bolts, along with some examples, of how to obtain and use electronic evidence in litigation.

The Recipient’s Perspective When your client receives a subpoena or other document request, do your litigation thing (read, analyze with client, respond/object, confer, seek protective order if necessary). Then ask: Do you and your client have a continuing obligation to make sure the data produced is protected (or redacted before production)? Does your client have a duty to notify the data owner (and if so, how soon)? What else might your client have said about how it would protect the data? Ideally, your client will know the answers to these already.

Continuing Obligation? Short answer: yes. Certain sensitive data is subject to administrative, technical, and physical safeguards. See, e.g., ORS 646A.622. There may be litigation exceptions. Turning over sensitive data can result in a “data incident.” See ABA and Bloomberg Law articles for discussion. Whether an “incident” is a “breach” requiring notification is subject to an “appropriate investigation” standard. See, e.g., ORS 646A.604(7); FRCP 5.2. Your client may have contractual obligations. Best practice is to consider these issues on the front end. You (the lawyer) may have ethical obligations. See, e.g., ORPC 1.6.

Duty to Notify? If there has been a “data breach,” yes. See, e.g., ORS 646A.604. You may have contractual obligations. Timing can vary. Obligations to investigate and remediate can vary.

What Else? What’s in your client’s privacy policy? What else is on your client’s website? What’s in your client’s contracts? See Oregon’s recent H.B. 2090.

Electronic Data and the Civil Rules FRCP 34 and state equivalents: Electronically stored information (“ESI”) discoverable FRCP 26: Required to identify categories and types of ESI Limitation on discovery for undue burden and cost Pre-discovery conferences (FRCP 26(f))

ESI Sources Email – standard Texts Social Media Facebook Twitter LinkedIn Reddit/YouTube Keeping up with the latest – WhatsApp/Vine/Snapchat Internet searches/browsing history

How to Request ESI Requests for Production Interrogatories Define ESI Specify format for collection Identify other devices Interrogatories Devices used Social Media/Data Platforms used

Third-party Subpoenas FRCP 45 and state equivalent Identifying the source of ESI Identifying the form of production of ESI Requesting access to devices Accessing devices during depositions Privacy/confidentiality issues Affidavit of deponent authenticating ESI

Collection Methods Third-party Vendor v. Attorney v. Client Forensically Sound – no change in metadata Case law disfavoring client collection Collection software: iMazing, AirDroid Data privacy issues Cost considerations Testimony/Authentication

Authentication Proposed changes to FRE 902: authentication by certification (13) Certified Records Generated by an Electronic Process or System. A record generated by an electronic process or system that produces an accurate result, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent must also meet the notice requirements of Rule 902(11). (14) Certified Data Copied from an Electronic Device, Storage Medium, or File. Data copied from an electronic device, storage medium, or file, if authenticated by a process of digital identification, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent also must meet the notice requirements of Rule 902(11).

Advancing your Case with ESI People are more careful with email, less so with texts/social media Hard to dispute witness/party’s own words Possibility for “smoking gun” evidence Thinking outside the box for sources of ESI

Thank You Brian Sniffen 111 S.W. Fifth Avenue Suite 3400 Portland, OR 97204 brian.sniffen@millernash.com 503.205.2443 Tara O’Hanlon Pier 70 2801 Alaskan Way, Suite 300 Seattle, WA 98121 tara.ohanlon@millernash.com 206.777.7442