Key Social Media Considerations It is no longer a question of whether a social media policy is needed, it is more a matter of what that policy proscribes.

Slides:



Advertisements
Similar presentations
The Evolving Law of E-Discovery Joseph J. Ortego, Esq. Nixon Peabody LLP New York, NY Jericho, NY.
Advertisements

EMS Checklist (ISO model)
United States District Court for the Southern District of New York, 2004 District Justice Scheindlin Zubulake v. UBS Warburg LLC Zubulake V.
Considerations for Records and Information Management Programs in Light of the Pension Committee and Rimkus Consulting 2010 Decisions.
1 Policy Webinar Series: Organizational Structure, Governance and Insurance Jessica Brodey April 22, 2008.
BUSINESS B2 Ethics.
Responding to Subpoenas Springfield Metropolitan Bar Association Doug Healy March 25, 2013.
Environmental Management System (EMS)
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
Cache La Poudre Feeds, LLC v. Land O’Lakes, Inc.  Motion Hearing before a Magistrate Judge in Federal Court  District of Colorado  Decided in 2007.
A PROACTIVE APPROACH TO E-DISCOVERY March 4, 2009 Presented to the Corporate Counsel Section of the Tarrant County Bar Association Carl C. Butzer Jackson.
E-Discovery LIMITS ON E-DISCOVERY. No New Preservation Rule When does duty to preserve attach? Reasonably anticipated litigation. Audio sanctions.
Litigation Hold Overview Tom O’Connor Gulf Coast Legal Technology Center
Heartland Surgical Specialty Hospital, LLC v. Midwest Division, Inc. (D. Kan. Apr. 9, 2007) Andrew S. Lo E-Discovery 10/6/09.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Developing a Records & Information Retention & Disposition Program:
1 © Copyright 2008 EMC Corporation. All rights reserved. Litigation Response Planning: eDiscovery Best Practices Stephen O’Leary Sr. eDiscovery and Compliance.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Purpose of the Standards
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
Ship Recycling Facility Management System IMO Guideline A.962
Electronic Records Management: What Management Needs to Know May 2009.
FHF McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
The Sedona Principles 1-7
ISO 14001:2004, Environmental Management System
Introduction to Internal Control Systems
Emerging Technologies and Guideline 1. Subsequent screens do not need basewave or logo Font must be Gill Sans.
Internal Control in a Financial Statement Audit
E-Discovery in Health Care Litigation By Tracy Vigness Kolb.
EDiscovery, Records Management and Records Retention.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Eliza de Guzman HTM 520 Health Information Exchange.
Hazards Identification and Risk Assessment
Rambus v. Infineon Technologies AG 22 F.R.D. 280 (E.D. Va. 2004)
Cache La Poudre Feeds, LLC v. Land O’Lakes, Inc. 224 F.R.D. 614 (D. Colo. 2007) By: Sara Alsaleh Case starts on page 136 of the book!
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
ISO DOCUMENTATION. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to:  Name.
Chapter 10 Trustees, Examiners & Creditors Committees.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
E-Discovery – Practical Experience from an Agency Perspective Robert Wright Former Chief, Plans and Program Management Unit FBI.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
Government Data Practices and the Open Meeting Law August 2014.
ISO/IEC 27001:2013 Annex A.8 Asset management
The Sedona Principles November 16, Background- What is The Sedona Conference The Sedona Conference is an educational institute, established in 1997,
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
ISO Most Common Problems May 25, 2000 Underwriters Laboratories Inc. May 25, 2000 Underwriters Laboratories Inc.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Heartland Surgical Specialty Hospital, LLC v. Midwest Division, Inc 2007 WL (D. Kan. Apr. 9, 2007)
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
#16PACE Preparing For The Inevitable... How To Be Ready When The Lawsuit Comes And Steps To Proactively Limit Corporate Inconvenience And Liability Mitchell.
Health & Safety Management “and a few other things for your consideration”
Every employer must ensure, as far as is reasonable practicable, the health, safety and welfare of all his employees More specifically, employers must.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XI)
TAIEX-REGIO Workshop on Applying the Partnership Principle in the European Structural and Investment Funds Bratislava, 20/05/2016 Involvement of Partners.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Data Minimization Framework
Prop 106 (End-of-Life Options Act) and Hospital Implications
Safety Accountabilities
All data occupies physical space, even if we don't think of it as such.
Employee Privacy and Privacy of Employee Information
Chapter 8 Developing an Effective Ethics Program
Information Governance Part 2
Student Data Privacy: National Trends and Wyoming’s Role
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Key Social Media Considerations It is no longer a question of whether a social media policy is needed, it is more a matter of what that policy proscribes and how the risks associated with social media are to be managed. Do you have presently have a document retention and governance policy that includes social media? Consider that they should be part of the same document. Do you have a plan for preservation and the collection of social media from a technical perspective? Basic key considerations for constructing that policy are: –Short and long term data storage strategies- what is being retained that does not need to be? –Audit processes- Is there a system to monitor social media, internal and external facing? –Enforcement Protocols- Is the appropriate access being granted or denied to websites, users and certain functionality? –Litigation Response Plans- When the duty to preserve kicks in is there a plan to deploy litigation hold “in place” and to collect the data? How will it be reviewed? –Employee Education and Training Programs- Are employees aware of the guidelines surrounding social media use and have they been properly trained? 1

Important Social Media Cases Crispin v. Christian Audigier, Inc. United States District Court, C.D. California. May 26, F.Supp.2d 965 E.E.O.C. v. Simply Storage Management, LLC United States District Court, S.D. Indiana, Indianapolis Division. May 11, F.R.D Fair Empl.Prac.Cas. (BNA) 49 Ledbetter v. Wal-Mart Stores, Inc. United States District Court, D. Colorado. April 21,

Discovering non-party hosted ESI FRCP require that materials be produced in litigation that are in the party’s, “possession, custody or control.” Control” references the legal power a producing party has over ESI held by a non- party. Under Rule 45, non-parties can be served with a subpoena, which has the authority of a court order- litigation hold is necessary at this point and most likely preservation was required prior if there was “reasonable anticipation of litigation.” 2 basic scenarios: 1)ESI belongs to or directly relates to the producing party but is held by a non-party or 2)ESI belongs and relates solely to the non-party, but is relevant to the matter, referred to as non-party information. Very common in the social media data collection for “consent” to be the method upon which the information is accessed. If no consent, then a motion to compel may be in order 3

Emerging Trends in Social Media Understand the impact of the social media technology on the organization for each site in technical terms Consider the full capability of the site and account for the risk in policies by evaluating the potential legal exposure associated with its use Training, Education and Interviewing of employees to ensure they understand policies and to keep in touch with how they are or should be using social media at work Testing to make sure policies are being enforced, nothing worse than having a policy and not following it, must keep it current More social media cases will occur outside of simply HR/Employment realm as Corporations themselves adopt social media personas 4

Helpful Resources This site describes the procedures and requirements to subpoena information from various social media services. Terrific guidelines and advisory writing on social media and its implications Interesting proposed legislation in California. Social Media Guideline Example. 5

SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2008 Symantec Corporation. All rights reserved. Thank You! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2008 Symantec Corporation. All rights reserved. Thank You! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2008 Symantec Corporation. All rights reserved. Thank You!