Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information.

Slides:



Advertisements
Similar presentations
Williams v. Sprint/United Management Co.
Advertisements

Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Proposed New Federal Rules Meet and Confer Proposed Rule 26(f): –The parties shall confer…to discuss any issues relating to preservation, disclosure or.
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
Ronald J. Shaffer, Esq. Beth L. Weisser, Esq. Lorraine K. Koc, Esq., Vice President and General Counsel, Deb Shops, Inc. © 2010 Fox Rothschild DELVACCA.
E-Discovery in Government Investigations Jeane Thomas, Crowell & Moring LLP February 9, 2009.
Ethical Issues in the Electronic Age Ethical Issues in the Electronic Age Frost Brown Todd LLC Seminar May 24, 2007 Frost Brown.
1 A Practical Guide to eDiscovery in Litigation Presented by: Christopher N. Weiss Aric H. Jarrett Stoel Rives LLP Public Risk Management Association (PRIMA),
5 Vital Components of Every Custodian Interview David Meadows, PMP, Managing Director – Discovery Consulting, Kroll Ontrack Dave Canfield, EJD, Managing.
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.
Evidence Collection & Admissibility Computer Forensics BACS 371.
1 Best Practices in Legal Holds Effectively Managing the e-Discovery Process and Associated Costs.
April 11-13, Session Title Presenters {Name} April 11-13, PRESENTED BY THE Managing E-Discovery in Small to.
Defensible Client File Collections 6 Common Roadblocks and Obstacles.
Guide to Computer Forensics and Investigations, Second Edition
BACS 371 Computer Forensics
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Developing a Records & Information Retention & Disposition Program:
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Electronic Discovery (eDiscovery) Chad Meyer & John Vyhlidal ConAgra Foods.
Data Acquisition Chao-Hsien Chu, Ph.D.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Information Technology & Computer Science E-Discovery Lab Identification and Collection Seminar on E-Discovery, February 9th, 2012, College of Information.
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
* 07/16/96 The production of ESI continues to present challenges in the discovery process even though specific rules have been drafted, commented on, redrafted.
Software CSI -- Effects of Computer-Resident Evidence September 12, 2008 Southern California Software Process Improvement Network (SCSPIN) John Cosgrove,
Records Management Overview. Why? It’s the Law It’s the Law It’s University Policy It’s University Policy Fiscal and Legal Compliance Fiscal and Legal.
The Sedona Principles 1-7
Visual Evidence / E-Discovery LLC Visual Evidence / E-Discovery LLC 60th Annual Meeting of the Ohio Regional Association of Law Libraries E-Discovery &
EDISCOVERY: ARE YOU PREPARED? Dennis P. Ogden Belin McCormick, P.C. 666 Walnut Street, Suite 2000 Des Moines, IA Telephone: (515) Facsimile:
Attorney-Client Privilege and Privacy Considerations Between US Corporations & Foreign Affiliates General Counsel Conference, Washington, D.C. October.
Discovery III Expert Witness Disclosure And Discovery Motions & Sanctions.
EDiscovery, Records Management and Records Retention.
Nathan Walker building an ediscovery framework. armasv.org Objective Present an IT-centric perspective to consider when building an eDiscovery framework.
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
Guide to Computer Forensics and Investigations Fourth Edition
We Must Produce! Presented by: Terrence Coan, CRM – Director, RM Solution Line Lead Baker Robbins & Company Charlene Wacenske – Firmwide Records Manager.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
EDiscovery Preservation, Spoliation, Litigation Holds, Adverse Inferences. September 15, 2008.
Surviving eDiscovery: Technology Firm Perspective  Robert A. Cruz Sr. Director, eDiscovery Solutions, Proofpoint, Inc.
RIM in the Age of E-Discovery RIM in the Age of E-Discovery FIRM Summer Program June 23, 2009 Christina Ayiotis, Esq., CRM Group Counsel– E-Discovery &
537 F. Supp. 2d 14 (D.D.C. 2008). PARTIES Plaintiff: United States – Q-P-Q charges against USDOS employee Michael O’Keefe & VISA applicant STS Jewelers.
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
UNIVERSITY OF HOUSTON SUMMER III 2010 – 5297 E-DISCOVERY Vendors!
Digital Government Summit
PULLING BACK THE CURTAIN ON E-DISCOVERY Gene Blanton.
The Sedona Principles November 16, Background- What is The Sedona Conference The Sedona Conference is an educational institute, established in 1997,
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
Electronic Discovery Guidelines Meet and Confer - General definition. a requirement of courts that before certain types of motions and/or petitions will.
U.S. District Court Southern District of New York 229 F.R.D. 422 (S.D.N.Y. 2004)
RULES. After five years of discussion and public comment the proposed amendments took effect on December 1, 2006…specifically changing language in six.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
U.S. Department of the Interior U.S. Geological Survey Records Management Practices: Doing Right by the Records John Faundeen ASPRS May 1, 2008 Portland,
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
E-Discovery Copyright 2008 Thomas F. Goldman. WHAT HAVE THEY DONE TO US NOW? OH NO, NOT AGAIN!!!!!!!!!! Overview.
Creighton Barrett Dalhousie University Archives
Leveraging the Data Map – A Case Study November 15, 2016
Information Technology & The Amendments to the Federal Rules of Civil Procedure Sonya Naar - DLA Piper US LLP Doug Herman - UHY Advisors FLVS, Inc.
Guide to Computer Forensics and Investigations Fifth Edition
Presentation transcript:

Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information Management

Litigation Hold Readiness Process of learning where everything relevant may be located and who has access to where and what Establishing time frames Determining the need for forensics Identification

When does duty arise through litigation hold Clearly defined, monitored, published process Must allow business to continue to operate, but avoid the spoliation and potential sanctions related to destruction Preservation

Timely Meet and Confers Formalized agreements, preservation notices The “acquisition” of the data Must be comprehensive, maintaining integrity of data content and preserving its format Close attention to metadata and chain of custody Collection

Meet and Confer discussions are required to address how ESI will be handled, as well as written documentation to the court. Collection- Meet and Confer

Traditional method- Acquiring of “all” potentially relevant data and processing it for review. $$$ Interim method- Improved processing tools to dedup and neardup data= a smaller review pool of data. $$ Targeted methods- Collecting only relevant items, using keywords, Boolean and other filtering methods. $ Collection- Data Acquisition

Custodian filtering Time and Date filtering Privilege searching Concept/Context searching Keyword Searching Collection- Targeted Search Methods

Reduced storage needed for review platform. Reduced hosting cost, typically charged by the GB. Reduced attorney review hours. Less (or no) down-time during data acquisition. Metadata preservation is possible. Collection- Targeted Methods- Savings

Must be comprehensive, maintaining integrity of data content and preserving its format. FRCP requires data to be produced in a format that replicates how it was used. Collection- Content and format

Failure to demonstrate a defensible identification, preservation and collection program. Poor collection practices that result in over-collection and other inefficiencies. Under-collection that misses relevant docs. Collection- Risks

AZ Seroquel Coleman v. Morgan Stanley In Re: Fannie Mae Peskoff v. Faber Qualcomm Collection- Caselaw

Under-inclusive- focus is on exactness e.g “car” vs. “Mercedes”, Specialized vocabulary or acronyms are excluded. Over-inclusive- many irrelevant documents may be collected e.g. “car” might bring up car seats, car pools, etc. Caselaw: In Re: Fannie Mae. 400 keywords. TREC project and Verizon tests are demonstrating clear weaknesses in existing search methodologies. Collection- Pitfalls- Keyword Searching weakness

Familiar concept in criminal law, but historically it was rarely an issue in civil litigation. As a result of the ability to change ESI, the requirement to maintain a defensible chain of custody now applies to every stage of the eDiscovery process. This involves: Documenting the acquisition process. Documenting the chain of custody thru the entire process. Collection- Chain of Custody and Authentication

Forensic acquisitions- an exact image that includes everything on the hard drive such as slack space and deleted files not yet overwritten. Forensics tools utilized do not alter any data during the copying process (a bit by bit mirror image is created). Non-forensic acquisitions- Civil litigation requires preservation of data relevant to a litigation, not necessarily forensic acquisition unless there are early issues regarding suspicion of fraud, theft of IP or deliberate concealment of assets or fear of spoliation. However, in all cases a chain of custody will assist in the admission of evidence and s.b. maintained. Chain of Custody –Forensic vs. Non Forensic

An electronic fingerprint. Can be applied to a file, a section of a hard drive, or an entire drive. If any item, even a single character is changed, the hash value will change. Chain of Custody – Hash Values

If opposing party objects to any ESI in a matter, it may be necessary to present an complete foundation for it. If the ESI was collected by someone lacking qualifications or someone who is party to the litigation and potentially biased, it may not satisfy the court and the evidence may be excluded. Chain of Custody – Admissibility

Regardless of whether a forensic or non-forensic collection is made you need to properly maintain the chain of custody, including: A description of devices from which data was copied. A list of folders that were copied. Your process for making the copies. Documentation of any hand-offs e.g. back to a law firm or to a processing company. Chain of Custody – Log

. Write blockers. USB based portable collection tools. Enterprise Collections. Tape Indexing Accessibility Issues are Changing! Collection Tools