Managing the Litigation Risk Ian MacLean MBA Solicitor / Master Mariner.

Slides:



Advertisements
Similar presentations
Charting with a Jury in Mind. Objectives Identify common charting errors that can make you legally vulnerable Describe proper charting techniques to show.
Advertisements

INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
Change Management (with an IT perspective). MBA Statement of Objective The object of undergoing this study-project is to develop an understanding.
Completing the Audit Chapter 16 Professor Juan M. Garcia.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Litigation and Procedure Discovery: Overview and Interrogatories Litigation and Procedure.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Strategies for Preserving the Attorney-Client Privilege in the World of Electronic Discovery Beth Rose Ford Motor Company.
Donna Monk MAPPA Co-ordinator.  Understand the purpose and function of MAPPA  Understand the language and terminology of MAPPA  Explore the framework.
W W W. D I N S L A W. C O M E-Discovery and Document Retention Patrick W. Michael, Esq. Dinsmore & Shohl LLP 101 South Fifth Street Louisville, KY
Conversation on the Chemical Facility Anti-Terrorism Standards (CFATS) and Critical Infrastructure Protection Chemical-Terrorism Vulnerability Information.
Costs Budgeting Webinar Professor Dominic Regan Teresa Aitken, Costs Lawyer Deborah Burke, Costs Lawyer.
Emergency Plan GENERAL AWARENESS TRAINING. Aim To provide staff with an overview of the school emergency plan.
Audit Planning and Documentation
Internal Control and Internal Audit
Attorney-Client Privilege in International Disputes “Groundhog Day – Episode III” Ian Meredith Partner, International Arbitration Practice Group Co-ordinator,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 17-1 Chapter Seventeen Completing the Engagement Chapter Seventeen.
EXPERT EVIDENCE UNDER THE NEW RULES OF CIVIL PROCEDURE ARTHUR ROBERT CAMPORESE Camporese Sullivan Di Gregorio.
Business Acquisition Process Implementation & transition Closing Negotiation of the transaction Due Diligence Engagement TargetIdentification.
CAMPUT 2015 Energy Regulation Course Donald Gordon Conference Centre Queen's University, Kingston, Ontario Role of Tribunal Staff, Interveners and Independent.
Bend, OR | Eugene, OR | Portland, OR | Salem, OR | Seattle, WA | Vancouver, WA | Washington D.C. Subchapter M Towing Vessel Safety Management.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Getting Involved in Your Claims A Lawyer’s Perspective Matt Cook, Esquire.
7 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 7 Audit Planning and Documentation.
Planning an Audit The Audit Process consists of the following phases:
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Discovery III Expert Witness Disclosure And Discovery Motions & Sanctions.
Presented by: Meg Boyd The Blue Mountains Drinking Water System: DWQMS Overview.
Pre-action Procedure for Financial Cases. Pre-action Procedure- Financial Cases  Rule 1.05(1)- each prospective party to the case must comply with the.
MBA Mock Trial Program. What is a Mock Trial?  Trial before a real judge (or lawyer)  Held in real courtroom (State Court)  Examination of witnesses.
MBA Mock Trial Program Mock Trial Basics Presentation by Jim and Josh McGuire Permission granted for any education use in connection with MBA Mock Trial.
Understanding English Litigation and Arbitration: getting the best results Gillie Belsham Ince and Co International Law Firm.
Software Project Management
Elspeth Horner – Partner PROVING THE CASE: Evidence for Court.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
Mon. Nov. 26. Work Product “Privilege” A witness, X, who is friendly to the D was interviewed by P’s attorney and a statement was drawn up Is there any.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
DEPARTMENT OF DEFENCE Briefing on Audit Outcomes Year ended 31 March 2010 AGSA AUDIT TEAM.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Copyright © 2007 Pearson Education Canada 1 Chapter 21: Completing the Audit.
The English Legal System Civil Litigation Disclosure and Inspection Part 36 Offers High Court and County Court Final Overview.
OHS Seminar DO THE TIME – avoid the crime! Miles Crawley 8 June 2007.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Investigating Shipping Pollution Violations Pacific Module 14: Post investigation and collation of evidence.
Business Insight Series – Chapter 6 Recovering a Debt.
Report Writing Intro to Law Enforcement ROP Instructor: G Uppal.
Fool me twice… Shame on Me Metro Toronto Convention Centre February 2, 2010.
Completing the Audit and Post Audit Responsibilities
Chapter 8 Auditing in an E-commerce Environment
Semaan, Gholam & Co1 SUBSEQUENT EVENTS INTERNATIONAL STANDARD ON AUDITING 560.
Statement of Auditing Standard No. 94 The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement.
Effective Casualty Management 20 th October 2006 Stephen Kirkpatrick Partner, Richards Butler.
Chapter 3 The Audit Process. Overview of Audit Process Developing an Understanding with the Client Financial statement engagements Audits Compilations.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Predictive Writing: Legal Memos Professor Virginia McRae Winter 2013 Civil Procedure classes.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Effective Expert Witnessing. Qualities that help Meet Daubert standards Credentials Solid Methodology Current w/ literature Employment history/experience.
Chapter 17 Completing the Audit Engagement McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Pre-action Procedure for Financial Cases
Compliance with Technical Standards
CHAPTER 7 Audit Planning and Documentation
MBA Mock Trial Program Mock Trial Basics
MBA Mock Trial Program Mock Trial Basics
Overview of the Disclosure Working Group Reform Proposals
The Stages of Litigation
MBA Mock Trial Program Mock Trial Basics
Presentation transcript:

Managing the Litigation Risk Ian MacLean MBA Solicitor / Master Mariner

Introduction The technical operator’s perspective Identification and management of risk Disclosure Documents created post incident Post incident management Preparing to combat litigation risk

Disclosure A litigant must disclose the documents: On which he relies Which adversely affect his own case Which adversely affect another’s case Support another’s case

Disclosure The obligation to disclose is subject to: Proportionality Reasonableness Relevance Privilege

Disclosure Considerations Duty is continuous Previous incidents SMS Umbrella vessels

Documents created post incident The Protest The Statement of Facts Communications with owner/client Superintendents ISM mandated documents Personnel records

Documents created post incident (cont) Charterers, (OCIMF/SIRE) Repair tenders Lawyer’s reports / lawyer drafted witness statements Experts & Surveyors Communications with opponents –The approving judge test

Preparing a Statement of Facts Simple, short sentences Do not: –Embellish or Speculate –Offer analysis –Apportion blame –Be defensive Limit information, if possible, to existing time stamps Chronological Consider short numbered paragraphs Approximation is acceptable

Post Incident Risk Overview Jurisdiction and security Control flow of information Identify and preserve evidence The legal adviser as part of the emergency response Early expert involvement

The expert/surveyor Duty to the court Ensure privilege Forensic robustness Record the factual position post-incident Reconstruct events up to incident –Collect data for modelling Consider causation/defences Assess/monitor opponent’s repair costs Time is of the essence

Post Incident Management Preservation of evidence -Download data -Contemporaneous evidence -Scraps of paper count too Calibrate and log / recording errors Limit document creation / document lock down Continue recording

Post Incident Preparation Expand contingency training - Collection of documents & data – including scraps - Calibrate & log Audit contingency training Prepare for document lock down Identify & educate the “Mitigation Chain” Adopt team culture - Emergency response team - Post incident management / claims team

In Summary Adopt risk management techniques –Risk awareness –Mitigation Educate the mitigation chain Prioritize collection/securing of evidence Assess and manage impact of post-incident documents Manage recording errors Prepare now – not afterwards The Ince e-letter