Legal Issues Contracts & Electronic Discovery Source: CSA Security Guidance Report v.3 Presented by: Toby Tobkin – 1.

Slides:



Advertisements
Similar presentations
Williams v. Sprint/United Management Co.
Advertisements

Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Responding to Subpoenas Springfield Metropolitan Bar Association Doug Healy March 25, 2013.
Webinar Sponsorship Partner. Jason Velasco Jason Velasco is an electronic discovery industry veteran with more than 15 years of experience in electronic.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
E-Discovery in Government Investigations Jeane Thomas, Crowell & Moring LLP February 9, 2009.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Privilege, Privacy, and Waiver. Privilege Attorney/Client In the law of evidence, a client's privilege to refuse to disclose, and to prevent any other.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Developing a Records & Information Retention & Disposition Program:
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Legal European Aspects of Digital Rights Management © Abdullah Sherbini 2006 بسم الله الرحمن الرحيم.
Chapter 5: The Behavior Analyst’s Responsibility to Clients Guideline 2 Leigh O’Brien Caldwell College.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
EDiscovery and Records Management. Corporate Records Management Historically- Paper was the “Corporate memory”- a visible, physical entity. Original.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Electronic Discovery (eDiscovery) Chad Meyer & John Vyhlidal ConAgra Foods.
LegalTech Asia DATA PRIVACY LAWS UPDATE Edward Chatterton 4 March 2013.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
EDiscovery Privacy Concerns in North America and Abroad ALM Counsel Summit October 24, 2013.
The role of ERE in Costumer Protection Eduard Elezi Albanian Regulatory Authority ERE Conference “Albanian Energy Sector, Challenges and Regulation” Tirana,
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Security and Privacy Strategic Global Partners, LLC.
The Sedona Principles 1-7
EDISCOVERY: ARE YOU PREPARED? Dennis P. Ogden Belin McCormick, P.C. 666 Walnut Street, Suite 2000 Des Moines, IA Telephone: (515) Facsimile:
Attorney-Client Privilege and Privacy Considerations Between US Corporations & Foreign Affiliates General Counsel Conference, Washington, D.C. October.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Information Management in FSS: A Legal Perspective Paul Hinton Ian Mason Barlow Lyde & Gilbert LLP 17 September 2009.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Lecture 11: Law and Ethics
Tackling Preservation Before it Tackles You: A Practical Approach to Data Preservation Joseph A. Venturella Advanced Discovery Solutions Group.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Rambus v. Infineon Technologies AG 22 F.R.D. 280 (E.D. Va. 2004)
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
LEGAL ISSUES IN CLOUD COMPUTING
Compliance August 18, Agenda Outline Status Draft of Answers.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
The Sedona Principles November 16, Background- What is The Sedona Conference The Sedona Conference is an educational institute, established in 1997,
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
International Cloud Symposium October 11, 2011 CLOUD COMPUTING PRIVACY: THE USER PERSPECTIVE Alissa Cooper Chief Computer Scientist, CDT.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Data protection—training materials [Name and details of speaker]
Hot Topics in Technology Transactions Presented by: Robert J. Scott
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Information Management in Government: A Legal Perspective
Surveillance around the world
Leveraging the Data Map – A Case Study November 15, 2016
Participation in lectures - 50%
General Data Protection Regulation
Information Governance and Data Privacy: A World of Risk
Obtaining Electronic Evidence For Use in Litigation
Chapter 3: IRS and FTC Data Security Rules
The General Data Protection Regulation – in short
Current Privacy Issues That May Affect Your Credit Union
Cross Border Data Transfers for Litigation and Investigation
LO1 - Know about aspects of cyber security
Presentation transcript:

Legal Issues Contracts & Electronic Discovery Source: CSA Security Guidance Report v.3 Presented by: Toby Tobkin – 1

Motivation why i chose this topic 2

Privacy Law 3

Data Privacy Data on the Internet is vulnerable  I won’t show a proof for this 4

Data Privacy Data on the Internet is vulnerable  I won’t show a proof for this Burden of protection of personal data is on organizations in some regions 5

Data Privacy Data on the Internet is vulnerable  I won’t show a proof for this Burden of protection of personal data is on organizations in some regions Some regional organizations that mandate this:  OECD: Organization for Economic Cooperation and Development  APEC: Asia Pacific Economic Cooperation  EEA: European Economic Arena 6

Examples of US Privacy Laws Federal  Laws: GLBA, HIPAA, COPPA  FTC orders 7

Examples of US Privacy Laws Federal  Laws: GLBA, HIPAA, COPPA  FTC orders State  Generally: reasonable security measures must be in place  including with subcontractors 8

Privacy by Contract If some aspect of privacy isn’t regulated, it could still be specified by a contract  but you knew that Company using cloud service may  Have a contractual obligation to protect employee data it’s storing  Want to protect their trade secrets stored in the cloud  Have a privacy contract with their customers  Specify that data can only be used for certain purposes 9

Contracts 10

Concepts Data custodian 11

Concepts Data custodian Due diligence 12

Cloud E- Discovery Issues 13

Discovery Phase In litigation, this comes prior to the trial Philosophy: neither party should be able to keep secrets from each other 14

Discovery: Problems Data that may be demanded might not be under a party’s control  Might be on a third party’s backup system  Or something Problem: whose obligation is it to produce requested information? According to this document: it depends 15

Discovery: Problems Standard e-discovery tools may not work 16

Discovery: Problems Standard e-discovery tools may not work Rules on preservation don’t seem to be clear  who pays for storage? client? service provider?  what constitutes “relevant” information to a litigation?  what about programmatically purged data? 17

Discovery: Problems Standard e-discovery tools may not work Rules on preservation don’t seem to be clear  who pays for storage? client? service provider?  what constitutes “relevant” information to a litigation?  what about programmatically purged data? Collection can be difficult  Limited bandwidth  Limited client functionality  Physical forensics could be overly intrusive on something like EC2 18

Discovery: Problems Standard e-discovery tools may not work Rules on preservation don’t seem to be clear  who pays for storage? client? service provider?  what constitutes “relevant” information to a litigation?  what about programmatically purged data? Collection can be difficult  Limited bandwidth  Limited client functionality  Physical forensics could be overly intrusive on something like EC2 Native production 19

Discovery: Solutions Have terms in service agreement about e-discovery  e.g. accessing large amounts of data at once when bandwidth is usually limited 20