Information Security and Electronic Discovery

Slides:



Advertisements
Similar presentations
Dino Tsibouris Mehmet Munur (614) (614) Information Security: Changes in the Law, Cost,
Advertisements

Zubulake v. UBS Warburg LLC “Zubulake IV”
The Evolving Law of E-Discovery Joseph J. Ortego, Esq. Nixon Peabody LLP New York, NY Jericho, NY.
United States District Court for the Southern District of New York, 2004 District Justice Scheindlin Zubulake v. UBS Warburg LLC Zubulake V.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Considerations for Records and Information Management Programs in Light of the Pension Committee and Rimkus Consulting 2010 Decisions.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Litigation Holds: Don’t Live in Fear of Spoliation Jason CISO – University of Connecticut October 30, 2014 Information Security Office.
HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Dino Tsibouris (614) Information Security – Changes in the Law, Cost, and Complexity of Responding to Breaches.
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Privacy, Security, Confidentiality, and Legal Issues
Ronald J. Shaffer, Esq. Beth L. Weisser, Esq. Lorraine K. Koc, Esq., Vice President and General Counsel, Deb Shops, Inc. © 2010 Fox Rothschild DELVACCA.
Cache La Poudre Feeds, LLC v. Land O’Lakes, Inc.  Motion Hearing before a Magistrate Judge in Federal Court  District of Colorado  Decided in 2007.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Ethical Issues in the Electronic Age Ethical Issues in the Electronic Age Frost Brown Todd LLC Seminar May 24, 2007 Frost Brown.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
OCR HITECH Enforcement Tips: Prevent, Detect and Quickly Correct HIPAA COW 2010 Spring Conference Privacy/Security Session 1 HIPAA Privacy Best Practices:
W W W. D I N S L A W. C O M E-Discovery and Document Retention Patrick W. Michael, Esq. Dinsmore & Shohl LLP 101 South Fifth Street Louisville, KY
Dino Tsibouris (614) Information Security – What’s New In the Law?
Developing a Records & Information Retention & Disposition Program:
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
©2011 Office of Massachusetts Attorney General Martha Coakley E-DISCOVERY Hélène Kazanjian Anne Sterman Trial Division.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
The Sedona Principles 1-7
EDISCOVERY: ARE YOU PREPARED? Dennis P. Ogden Belin McCormick, P.C. 666 Walnut Street, Suite 2000 Des Moines, IA Telephone: (515) Facsimile:
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
E-Discovery in Health Care Litigation By Tracy Vigness Kolb.
Discussion Peggy Beeley, MD 2/11/14 Mitigating Medical Malpractice Risks Through Documentation.
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
DOE V. NORWALK COMMUNITY COLLEGE, 248 F.R.D. 372 (D. CONN. 2007) Decided July 16, 2002.
Against: The Liberal Definition and use of Litigation Holds Team 9.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Rambus v. Infineon Technologies AG 22 F.R.D. 280 (E.D. Va. 2004)
EDiscovery Preservation, Spoliation, Litigation Holds, Adverse Inferences. September 15, 2008.
© Copyright 2010 Hemenway & Barnes LLP H&B
Defensible Records Retention and Preservation Linda Starek-McKinley Director, Records and Information Management Edward Jones
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Emerging Case Law and Recent eDiscovery Decisions.
Zubulake IV [Trigger Date]
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Privacy Act United States Army (Managerial Training)
U.S. District Court Southern District of New York 229 F.R.D. 422 (S.D.N.Y. 2004)
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Residential Funding Corp. v. DeGeorge Financial Corp., 306 F.3d 99 (2d. Cir. 2002).
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
Morgan Stanley Team 2. Background Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., 2005 LEXIS 94 (Fla. Cir. Ct. March 23, 2005.) The jury returned.
Patient Privacy for the Life Sciences Industry: 2012 Update Drew Gantt and David Sclar Cooley LLP 1.
HIPAA.
By: Eamon Callahan and Wilston Johnston
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
Litigation Holds: Don’t Live in Fear of Spoliation
Disability Services Agencies Briefing On HIPAA
Presentation transcript:

Information Security and Electronic Discovery Mehmet Munur Dino Tsibouris (614) 360-2065 (614) 360-1160 Mehmet.Munur@tsibouris.com Dino@Tsibouris.com

Trends for 2010 Increased federal and state regulation of information security Increased enforcement Increased costs to resolve a breach Increased “compliance complexity” as technology changes

Examples HITECH Act - Amendments to HIPAA by the Stimulus Act Increased business associate requirements Enforcement Actions under HITECH Managing protected health information in the cloud

HITECH ACT Amends HIPAA New breach notification rules New penalties Increased levels of minimum security State AG enforcement Business associates must comply

HITECH ACT Amends HIPAA Covered entity must notify persons if a breach occurs Must notify DHS for publication if over 500 persons Vendors of PHR must notify individuals if breached

HITECH ACT Business Associate Requirements Must comply with Security Rule regarding administrative, physical, and technical safeguards Develop policies Designate a security official Enforcement

HITECH ACT Business Associate Requirements If your covered entity violates your BAA, you are violating HIPAA Must cure breach, terminate, or report to DHHS

HITECH ACT Business Associate Requirements Does your contract allow for amendment to comply with changes in the law? Sample DHHS OCR contractual clause requires parties to amend to address changes in law

HITECH ACT Business Associate Requirements If you have a breach, must notify HIPAA-covered entity Covered entity must then notify individuals

HITECH ACT Penalties Tier A – inadvertent - $100 per violation up to $25,000/yr Tier B – reasonable cause, not “willful neglect” - $1,000 per violation up to $100,000/yr

HITECH ACT Penalties Tier C – “willful neglect” ultimately corrected - $10,000 per violation up to $250,000/yr Tier D - “willful neglect” uncorrected - $50,000 per violation up to $1.5 M/yr

Connecticut Health Net Enforcement Connecticut Attorney General - HIPAA Lost portable computer disk drive Involves privacy of 446,000 Connecticut enrollees Health information, social security numbers, and bank account numbers Failed to notify on time

Connecticut Health Net Enforcement Health Net failed to Ensure the confidentiality and integrity of electronic protected health information Implement technical policies and procedures for electronic information systems Implement policies and procedures that govern the receipt and removal of hardware and electronic media

Connecticut Health Net Enforcement Health Net failed to Implement policies and procedures to prevent, detect, contain, and correct security violations Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents Effectively train all members of its workforce

Medical Data in the Cloud Data stored in the cloud more and more frequently Third-party contractors more common Security and background checks for companies a necessity Conduct audits or obtain results Ownership of data Prohibiting sales to others Return in appropriate format

HIPAA - Employee Snooping UCLA employee Accesses system 323 times in 3 weeks Snoops on celebrity medical records Similar incident in 2008 UCLA reveals that 165 employees improperly viewed files in 13 years 15 fired for viewing octuplet mom’s records

Countrywide Breach Countrywide Financial Services Former employees Downloaded and sold customer data Every week for 2 years 19,000 individuals notified of breach Class action settles for over $10 million

Massachusetts Data Security Regulations Creates duty to protect personal data Applies to the personal information of MA residents Sophistication of safeguards increases with size and scope of business Requires encryption for transmission of personal data over public networks Effective date March 1, 2010

Electronic Discovery Overview of Electronic Discovery Sanctions Requirements for Compliance Zubulake Revisited Case Examples

Electronic Discovery Basics of Electronic Discovery Electronically Stored Information (ESI) is potentially discoverable Proportionality test Obligation to preserve Pending or threatened litigation Primary source should be active data Costs usually borne by producing party

Electronic Discovery Sanctions usually require: Clear duty to preserve Culpable failure to Produce and Preserve Relevant ESI Reasonable Probability of Material Prejudice Due to Loss of ESI

E-Discovery Sanctions Monetary Sanctions Shifting or Awarding Discovery Costs, Fines Adverse Inference or Inability to use Affirmative Defense Terminating Sanctions or Default Judgment

Electronic Discovery Compliance requires: Records Retention Policies and Procedures Litigation Hold Procedures IT Policies, Procedures, and Systems for Preservation and Collection Search Production Destruction

Zubulake Revisited When the duty to preserve has attached, the following failures constitute gross negligence to Issue a written litigation hold Identify all of the key players and to ensure that their electronic and paper records are preserved

Zubulake Revisited Cease the deletion of email or to preserve the records of former employees that are in a party's possession, custody, or control Preserve backup tapes when they are the sole source of relevant information or when they relate to key players, if the relevant information maintained by those players is not obtainable from readily accessible sources

Pinstripe Inc. v. Manpower Inc. Defendant failed to distribute litigation hold notice Possibly relevant emails destroyed 700 emails recovered from recipients Significant cost to defendant + $30K to outside vendor Court finds lack of intentional conduct Court awards sanctions of $2,500

Southeastern Mechanical Services v. Brody Plaintiff SMS alleges spoliation for deleted laptop and Blackberry data Defendant argues that laptop emails were stored on server Blackberries wiped Blackberries contained data other than emails Blackberries contained data before being synchronized with the server

Southeastern Mechanical Services v. Brody Court finds bad faith in deletion of Blackberry data Lack of email, text messages, telephone records was suspicious Court finds employees, not the corporations culpable Court issues adverse inference

Arista Records v. Usenet Copyright Infringement Case 7 hard-drives wiped Employees sent abroad on vacations Employees allowed to take laptops with them Failing to preserve email Court finds bad faith, but declines to award default judgment Instead, court takes away affirmative defense

Lawson v. Sun Microsystems Defendant produces hard-drive ESI includes privileged documents and password protected documents Plaintiff accesses privileged, password protected documents Plaintiff’s behavior mitigated by both parties actions Sanctions of $54K , 25% to attorney

Starbucks v. ADT Starbucks seeks archived emails ADT argues that emails are not accessible Archived emails stored in a Plasmon System Exaggerates production costs at $834K Starbucks obtains two estimates at $17K and $26K

Starbucks v. ADT Court ordered an immediate plan to make copies of the archived discs to an appropriate searchable storage medium Court ordered the production of relevant emails Court ordered the parties to confer and agree on fees

Doppes v. Bentley Motors Foul odor from $214K Bentley Arnage Bentley fails at numerous times to produce documents Destroys relevant emails Fails to provide court ordered access Trial court only issues monetary fines, jury instructions Appeals court reverses, issues terminating instructions

Conclusion Proper record retention policies Identify all key people and documents Preserve all relevant ESI IT Policies, Procedures, and Systems Proper and searchable archive technology Written litigation holds

Questions & Answers Mehmet Munur Dino Tsibouris (614) 360-2065 (614) 360-1160 Mehmet.Munur@tsibouris.com Dino@Tsibouris.com