Unit 9: E-Discovery. What is E-Discovery The term e-discovery refers to electronic discovery (also called e-discovery or ediscovery) refers to any process.

Slides:



Advertisements
Similar presentations
Electronic Discovery Guidelines Meet and Confer - General definition. a requirement of courts that before certain types of motions and/or petitions will.
Advertisements

Williams v. Sprint/United Management Co.
Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Network Systems Sales LLC
Litigation Holds: Don’t Live in Fear of Spoliation Jason CISO – University of Connecticut October 30, 2014 Information Security Office.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
E-Discovery in Government Investigations Jeane Thomas, Crowell & Moring LLP February 9, 2009.
Law and Computer Security E-Discovery Bahareh Rahmani CS - University of Tulsa.
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
LBSC 708X The Record Nature of Electronic Records College of Information Studies.
Data - Information - Knowledge
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Career number 1. E- Discovery Professional  Electronic Discovery- Technology based Identifies, preserves and manages electronically stored information.
Avoiding the Iceberg Sean Regan October 2008.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Records Management: It’s Not Just Paper
Unit 9: E-Discovery.
E-Discovery PA230: Unit 9.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
230 F.R.D. 640 (D. Kan. 2005).  Shirley Williams is a former employee of Sprint/United Management Co.  Her employment was terminated during a Reduction-in-
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
The Sedona Principles 1-7
Information Technology Basics Georgia CTAE Resource Network Curriculum Office, June 2009 To accompany curriculum for the Georgia Peach State Career Pathways.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Unit 9: E-Discovery. Topic for Seminar Assignments due this week E-Discovery Wrap-up.
INFORMATION MANAGEMENT IN THE DISCOVERY PHASE A.HOW TO HANDLE INFORMATION GAINED THROUGH INFORMAL DISCOVERY What is informal discovery and what are the.
Unit 9: E-Discovery. What is E-Discovery The term e-discovery refers to electronic discovery (also called e-discovery or ediscovery) refers to any process.
Presentation Path  Introduction to Ved Consultancy and OpenText  Current Challenges  The Valued Customers and Sectors  Our Solutions  Demo. Together,
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Advanced Civil Litigation Class 11Slide 1 Production of Documents Scope Scope Includes documents of all types, including pictures, graphs, drawings, videos.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Leveraging Web Based Collaborative Project Management Applications- the CM’s perspective Michael Warriner, P.E.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
 AMNESTY WEEK: All outstanding work due this week – only thing you cannot make-up is midterm exam  Check the gradebook  Questions re units 1-7?
Digital Government Summit
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Electronic Discovery Guidelines Meet and Confer - General definition. a requirement of courts that before certain types of motions and/or petitions will.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
Unit 9: E-Discovery. Hey, this is our last time together ahhhhhhhhhhhhhhhhh shucks! Don’t split before you make an appearance in Unit 10
Introduction to Legal Technology Dennis J. Kehm, Jr.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
UNIT 4 Security Protocols. Seminar Topics Assignments this week Metadata – what is it? Security Protocols Next week—no seminar, no discussion—MIDTERM!!!
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Unit 9: E-Discovery. Reminders Office hours will be Friday, from 1pm-3pm EST Participate on the discussion board Read (assigned pages in) chapters 12.
Unit 9: E-Discovery. Topic for Seminar Assignments due this week E-Discovery Wrap-up.
Leveraging the Data Map – A Case Study November 15, 2016
Application Software Chapter 6.
Litigation Holds: Don’t Live in Fear of Spoliation
Chapter 1 Database Systems
Electronic Discovery Sabrina Jones 4/14/2011.
On-Site Investigations
Presentation transcript:

Unit 9: E-Discovery

What is E-Discovery The term e-discovery refers to electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.

What is E-Discovery E-discovery can be carried out offline on a particular computer or it can be done in a network. Court-ordered or government sanctioned hacking for the purpose of obtaining critical evidence is also a type of e-discovery

Why is E-Discovery So Useful? Digital data can be electronically searched with ease, whereas paper documents must be scrutinized manually. Furthermore, digital data is difficult or impossible to completely destroy, particularly if it gets into a network. This is because the data appears on multiple hard drives, and because digital files, even if deleted, can be undeleted. In fact, the only reliable means of destroying data is to physically destroy any hard drive where it is found.

Types of Data In the process of electronic discovery, data of all types can serve as evidence. This can include text, images, calendar files, databases, spreadsheets, audio files, animation, Web sites, and computer programs. Even malware such as viruses, Trojans, and spyware can be secured and investigated. Electronic mail ( ) can be an especially valuable source of evidence in civil or criminal litigation

Computer Forensics Computer forensics, also called cyber forensics, is a specialized form of e-discovery in which an investigation is carried out on the contents of the hard drive of a specific computer. After physically isolating the computer, investigators make a digital copy of the hard drive. Then the original computer is locked in a secure facility to maintain its pristine condition. All investigation is done on the digital copy.

Issues Associated with E-Discovery E-discovery is an evolving field that goes far beyond mere technology. It gives rise to multiple legal, constitutional, political, security, and personal privacy issues, many of which have yet to be resolved. What issues do you think should be considered? Source: ci ,00.html

Avoiding Hidden E-Discovery Hazards In a courtroom, a judge’s order for a party to produce its relevant and corporate information may seem straightforward and unambiguous. However, responding to that demand forces a party to avoid getting snagged by any number of pitfalls that could contribute to incomplete discovery responses, improper data processing, and the wrath of the requesting party and Court. Complicated challenges hide just beneath the surface of a simple request to “identify and produce relevant electronically stored information (ESI).”

The Amount of Reviewable Data When dealing with compressed archives, the only way to determine the actual amount of data that must be processed and reviewed is to open all archives and extract the individual files that they contain. messages are also a notorious source of creating ambiguity regarding the amount of relevant information that must be reviewed or produced (attachments, multiple duplicative s).

Producing the Right Amount of Information ESI that has been collected in the format in which it was stored in the ordinary course of business may be unsuited for production. Disputes about proprietary or non-standard file formats have diminished, but particularly in the production of messages, potential for conflict still remains.

Format Requesting parties that seek messages produced in “native format” may not fully understand exactly what they are seeking. However, converting messages in another format into a.PST archive often drops one or more metadata fields that may have been populated in the original message. In addition, custom.PST files containing only responsive documents may bear little or no relationship to the way that these messages were actually stored in the ordinary course of business

E-Discovery Consultants To the extent that a legal team lacks the resources or expertise to address these issues head-on, working with one or more e- discovery specialists can help the team understand specific dangers—and take appropriate preventative action. Qualified consultants and e-discovery service bureaus can’t remove all the complications involved with successfully working through the e-discovery portion of a case, but their insight can keep projects on track while letting the core legal team focus on developing the rest of the client’s case. source: articles/avoiding-hidden-e-discovery-hazards/

Square D Co. v. Scott Elec. Co., 2008 WL (W.D. Pa. July 15, 2008) In June 2007, the court had ordered, among other things, that defendant Globe Electric Supply Co. “submit to a forensic inspection of its computer systems which record its purchases and sales of Square D products and its inventory of such products, with such inspection to be incurred at Globe's sole expense and cost."

Square D Co. v. Scott Elec. Co., 2008 WL (W.D. Pa. July 15, 2008) Counsel for Globe asserted that "there is one server and two work stations that have any connection whatsoever with Square D product." Globe argued that plaintiff’s expert should not be allowed to examine the remaining 11 workstations. The court did not accept Globe’s argument primarily because Globe had 4 times refused to comply with the discovery request. source: summaries/court-issues-fourth-order-regarding-forensic-inspection- of-defendants-computer-systems-finds-defendants-behavior-fell- just-shy-of-conduct-befitting-default-judgment/

E-Discovery Services Lexis Applied Discovery Services: Data Gathering Media Restoration Data Processing Online Review Document Production and Reporting

Data Gathering Guidance for internal IT resources or on-site, professional assistance to collect data from clients’ computers, including network servers, desktop PCs, laptops, backup tapes, handheld devices, and any other storage medium. Cost effective strategies for identifying, gathering, and preparing only necessary information for review.

Media Restoration Retrieval of information from backup tapes or legacy systems, from standard and word processing programs to arcane systems and uncommon file types. Cost-effective strategies for narrowing the set of potentially responsive documents.

Data Processing Electronic documents processed in industry-standard PDF format, with complete text and meta data preserved and indexed for search accuracy. 5 million pages per day allow for documents to be available in days, not weeks or months. Flexibility to process more than 200 electronic file types from a variety of storage media.

Online Review Display of disparate file types in a uniform PDF format. Capabilities include annotations, redaction, customizable document folders, and automated Bates number and document branding Sophisticated search functionality to enable logical review of documents.

Online Review Intuitive interface with “point and click” functionality, enabling even the least technical lawyer to become an electronic discovery pro! Multi-party or multi-site collaboration with access to comprehensive Web-based repository. No hardware or software to purchase State of the art security.

Document Production and Reporting Production of responsive documents according to client specification in electronic or paper format. Privilege log reports or user-defined custom reporting to suit the needs of the case.

Final Project For your Final Project, you will refer back to your Midterm Project, the hardware and software proposal. You will review and revise your proposal to incorporate the knowledge you have gained in the second half of the class. Include recommendations for specific specialty software applications (if justified) and more typical technology tools and applications.

Final Project Whereas for the Midterm Project, you were to develop a proposal for a generic law office or firm, for the Final Project, you will revise the proposal for a specific type of firm, such as one that specializes in litigation or family law, and for a specific legal environment, such as a non-profit vs. private corporate practice.

Final Project In your proposal, be sure to address the ethical and security concerns inherent with the widespread use of electronic communications tools. Once you have revised and refined your proposal, you will prepare a PowerPoint presentation of key points (bulleted summary) in preparation for presenting your proposal to “the boss”.

Final Project What questions do you have on what you will submit this week?