tag:blogger.com,1999:blog-15474354076827903912024-02-18T23:09:47.586-08:00Guidance on E-DiscoveryAnonymoushttp://www.blogger.com/profile/05219056359611084358noreply@blogger.comBlogger132125tag:blogger.com,1999:blog-1547435407682790391.post-20304774840633659562016-05-20T17:28:00.000-07:002016-05-20T17:28:59.916-07:00We've Moved! Visit Our New Blog<div class="p1">
<span class="s1">We’ve got a fresh new look! </span></div>
<div class="p1">
<br /></div>
<div class="p1">
Please visit us at our NEW blog: <span class="s2"><a href="https://www.guidancesoftware.com/resources/blogs">https://www.guidancesoftware.com/resources/blogs</a></span></div>
guidancesoftware101http://www.blogger.com/profile/13513583878393331499noreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-62324598148784602492016-02-12T14:04:00.000-08:002016-02-12T14:06:15.179-08:00Legaltech Super Session Panel Recap: Adam Isles, Ed McAndrew, Scott Carlson and Chris Dale Discussed Data Security and Risk<p>High-profile breaches have thrust security and risk into the spotlight. Despite this, many organizations are failing to prioritize risks and take a proactive approach to information governance, ensuring that sensitive data is identified, classified and remediated. According to the 2015 Data Breach Investigations Report, 99.9 percent of exploited vulnerabilities were compromised more than a year after they were published.</P>
<p>Risk was top of mind for panelists in our Super Session at Legaltech New York. “Time is Not on Your Side When it Comes to Data Security” was moderated by Chris Dale and featured Adam Isles, principal at the Chertoff Group; Ed McAndrew, partner at Ballard Spahr; and Scott Carlson, partner at Seyfarth Shaw.</P>
<p>There’s been a tendency to segment risk with various departments shouldering the responsibility, Scott noted. For instance, companies have grappled with the issue of whether risk is - an IT issue or business operations’ responsibility.</P>
<p>“It’s one thing for the CISO to understand risk, but everyone needs to understand risk,” he said.
Engaging business leaders in discussions about cybersecurity and risk is a critical component in identifying key assets such as intellectual property that need to be safeguarded. “The private sector is in the crosshairs,” Ed said. “Threats are constantly evolving.”</P>
<p>He went on to note that data is also in numerous locations and that the aggregation and collection of data is also constantly transforming. The regulatory landscape is also more complex.
When he was working as an Assistant U.S. Attorney specializing in cybercrime, Ed said, the businesses with whom he interacted ranged in terms of preparedness for a cyber incident. Too many times, they were starting from a place of crisis when it came to incident response.</P>
<P>Best practices for minimizing future risk and making sure your organization is better equipped to deal with a cyber incident include:</P>
<ul class="list">
<li>Identify your key assets;</li>
<li>Assess threat, vulnerability and consequences of compromised data;</li>
<li>Implement key policies and standards;</li>
<li>Conduct audits and penetration;</li>
<li>Participate in incident response activities.</li>
</ul>
<p>Adam recommended that organizations hold tabletop discussions running through various cyber threat scenarios. Such drills can help organizations address potential issues before an incident or attack occurs.</p>
<p>Scott also recommended determining an organization’s obligations before a breach. For instance, there is no uniform data breach notification law in the United States. Companies should become familiar themselves with what their state requires and what triggers breach notification requirements.</p>
<p>If an organization is breached it should resist the urge to hack back or use compromised systems to communicate. In some instances, hackers have remained in the infected system and monitored communications after a breach was detected.</p>
<p>By reducing the surface area of risk, organizations can significantly mitigating potential damage from breaches and improve their ability to comply with global data protection mandates.</P>
<p>Learn more about EnForce Risk Manager, the only automated solution to proactively identify, categorize, and remediate sensitive data on our <a href="https://www.guidancesoftware.com/enforce-risk-manager">website</a> and sign up for the latest updates.</p>
guidancesoftware101http://www.blogger.com/profile/13513583878393331499noreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-48159166586273980502016-02-04T14:16:00.000-08:002016-02-04T14:16:08.936-08:00EnForce Risk Manager: Redefining Data Privacy & Compliance<p>Have you ever asked yourself if your organization has control over its data? Data breaches, privacy concerns, and growing e-discovery costs continue to evolve how organizations approach controlling their business data while balancing worker productivity. At the same time, the amount of data stored on electronic systems continues to grow at an exponential rate, making the task of controlling sensitive information embedded within this data more challenging.</p>
<p>EnForce™ Risk Manager is the only automated solution to proactively identify, categorize and remediate private or sensitive data across the enterprise. Our solution offers the deepest level of insight and control of electronic data across all endpoints, including structured and unstructured data repositories, from anywhere. This enables organizations to improve business intelligence, ensure compliance and mitigate many types of risks.</p>
<p>Our 360-degree visibility enabled by our expertise in forensic security, coupled with our patent-pending, next generation EnForce technology allows you to:</p>
<ul class="list">
<li>Find sensitive data </li>
<li>Locate where it’s stored</li>
<li>Classify and quantify data assets</li>
<li>Take action based on your business goals</li>
</ul>
<p>Key benefits of EnForce Risk Manager include:</p>
<ul class="list">
<li><strong>Protect Sensitive Data</strong> – Organizations can identify and safeguard valuable corporate assets – intellectual property, proprietary client lists, trade secrets, confidential information and sensitive customer information – from data breaches, rogue employees, lost devices and human error.</li>
<li><strong>Ensure Compliance and Mitigate Risks</strong> – Better equip organizations to comply with external data privacy regulations and polices such as HIPAA (Health Insurance Portability and Accountability Act) and PCI DSS (Payment Card Industry Data Security Standard) as well as internal policies. </li>
<li><strong>Optimize Storage</strong> – By systematically deleting data that is old, no longer needed or has no current business value, organizations can reduce current and future storage costs.</li>
<li><strong>Improve Business Intelligence</strong> – Organizations can gain insights into the flow of sensitive data as it is used and manifested throughout the enterprise. Removing aged data will leave organizations with higher quality data to help them make more accurate and better informed decisions, driving greater business performance.</li>
</ul>
<p>Visit our <a href="https://www.guidancesoftware.com/enforce-risk-manager">website</a> to learn more about EnForce Risk Manager and sign up to hear about the latest updates.</p>guidancesoftware101http://www.blogger.com/profile/13513583878393331499noreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-74306461442886620462016-01-01T06:00:00.000-08:002016-01-01T06:00:19.541-08:00Wishing you a happy and prosperous 2016!<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrwK8qLDfOo4VA8lX3ghszx7p7yNcQtlUbT2cPEPPRIQgvnQR1dT5r4Nyt0CzypYEnOvgraienHuOGIn2uQ_CezQvlNv2mW6kZeJowAwH01QEHmzU0iz9ipwbgqWqj-ZyY5Q00VHYDCw/s1600/happyNewYear2016.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrwK8qLDfOo4VA8lX3ghszx7p7yNcQtlUbT2cPEPPRIQgvnQR1dT5r4Nyt0CzypYEnOvgraienHuOGIn2uQ_CezQvlNv2mW6kZeJowAwH01QEHmzU0iz9ipwbgqWqj-ZyY5Q00VHYDCw/s1600/happyNewYear2016.png" /></a></div>
<br />Anonymoushttp://www.blogger.com/profile/05219056359611084358noreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-37565313696944531642015-11-03T19:04:00.001-08:002015-11-04T10:05:16.262-08:00Finding those Easter Eggs?UPDATE: We have our three winners! Thanks for playing and helping us celebrate our new look and logo, everyone.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCAr9DYDjYa2XjYXGinUaI2KbiaHPLOvESynfUkqlGjNJ0owKeSFfIBGp8UqT9bKs49fLIU02C0XR12xTubtUsrm99mbGUqgiingpwdkyeS9HCFPd3ss565B3fTF3Q4U6NIaIiUdyydmk/s1600/game+over.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="195" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCAr9DYDjYa2XjYXGinUaI2KbiaHPLOvESynfUkqlGjNJ0owKeSFfIBGp8UqT9bKs49fLIU02C0XR12xTubtUsrm99mbGUqgiingpwdkyeS9HCFPd3ss565B3fTF3Q4U6NIaIiUdyydmk/s320/game+over.png" width="320" /></a></div>
<br />
<br />
<a name='more'></a><h4>
Original blog post</h4>
<br />
We don't mean to egg you on... well, in fact, we do. If you've gotten this far, you probably have two pieces of our brand-new logo in hand and are looking for the third. Look around, run your cursor over every letter, and you'll find you're <a href="https://www2.guidancesoftware.com/PublishingImages/ferrari.jpg" target="_blank">g</a><span id="goog_1960724634"></span><span id="goog_1960724635"></span><a href="https://www.blogger.com/"></a>etting closer with every sentence.<br />
<br />
Wondering what this contest is all about? Read our <a href="http://encase-forensic-blog.guidancesoftware.com/2015/11/sneak-peek-at-one-piece-of-our-new-logo.html" target="_blank">original blog post here</a>.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-45130265681009743602015-10-13T10:41:00.000-07:002015-10-13T10:41:48.937-07:00The Truth About Predictive Coding: Getting Beyond the Hype <div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
If you’re reading this blog post, chances are you are an e-discovery practitioner, the keywords “predictive coding” caught your eye, you’re cautious about computer-assisted review (CAR), and curious about the constant hype that hangs over this topic. You’re not alone! One of the most highly acclaimed sessions at CEIC® 2015 (now Enfuse®) was the session called “The Truth About Predictive Coding: Getting Beyond the Hype.” </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Beyond the hype, this lecture laid out some practical reasons why predictive coding is not catching on faster and is being used in only a minority of cases. It went on to explode some of the myths about practical CAR approaches and how you can leverage the power of analytics and predictive coding today. </div>
<div class="MsoNormal">
</div>
<a name='more'></a><br />
<div class="MsoNormal">
Part of the appeal in this session was in the lecturers themselves: litigation heavy hitters David Cohen, a partner with Reed Smith LLC and the firm’s Practice Group Leader and Bryon Bratcher, also with Reed Smith serving as Director of Litigation Technology Services. These men legitimized the legacy of the Enfuse conference and its ability to attract the most highly acclaimed presenters who are industry leaders in digital investigations.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
If you missed this popular lecture, you can read a brief summary of it in this blog and download the complete slide presentation here: <a href="https://www.guidancesoftware.com/ceic/Documents/The%20Truth%20About%20Predictive%20Coding%20Getting%20Beyond%20the%20Hype-Cohen-Bratcher-5-19-2015.pdf" target="_blank">The Truth About Predictive Coding: Getting Beyond the Hype</a>. We’d also like to remind you to <a href="https://www.guidancesoftware.com/ceic/Pages/about-ceic.aspx" target="_blank">register early for Enfuse 2016</a>, where you can hear similar topics to maximize your <a href="http://www.guidancesoftware.com/ediscovery" target="_blank">EnCase® eDiscovery</a> solution and reduce costs and risks while streamlining your e-discovery process. </div>
<div class="MsoNormal">
<br /></div>
<h4>
Predictive Coding and the Myths That Undermine It</h4>
<div class="MsoNormal">
Predictive coding is an industry-specific term used to describe a CAR process—also known as technology-assisted review (TAR)—involving the use of machine-learning algorithms and statistical probability tools used to duplicate human decision-making. The software determines the relevance after training by a human reviewer and identifies properties to predict future coding. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The team at EDRM.net has prepared a Computer-Assisted Review Reference Model (CARRM) to document the steps of the process:</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAF5TlthBVYuS0w_2xb0fSp3Lex8kj3K6Gt5DbzkMWhqB48er-qynuLwjRx8Swdc-LbYlbaNk6ZrargG0QAAK42wKXu1aRVsifJLywk0hDodoFN-veJCVDY9VvXx1mumPpr5EaXzueGAA/s1600/edrm.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAF5TlthBVYuS0w_2xb0fSp3Lex8kj3K6Gt5DbzkMWhqB48er-qynuLwjRx8Swdc-LbYlbaNk6ZrargG0QAAK42wKXu1aRVsifJLywk0hDodoFN-veJCVDY9VvXx1mumPpr5EaXzueGAA/s1600/edrm.png" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both;">
Interest in predictive coding, as evidenced by the high attendance at this session in the Enfuse track “E-Discovery: Legal Issues, Technical Challenges and Solutions,” is on the rise because sometimes the volume of documents and/or value of a case make human review impractical. According to Cohen and Bratcher, predictive coding can bring:</div>
<br />
<ul class="list">
<li>Cost savings</li>
<li>Time savings</li>
<li>Reduced risk of errors</li>
<li>Greater objectivity in classifications</li>
</ul>
<div class="MsoNormal">
If the value of CAR is getting recognized and interest is increasing, why is human review still much more prevalent than computer review? Cohen and Bratcher set out to debunk the top three myths they believe are pushing back on predictive coding.</div>
<div class="separator" style="clear: both;">
<br /></div>
<h4 style="clear: both;">
Myth #1: Computer review will never be as accurate as human review.</h4>
<div class="separator" style="clear: both;">
In 2012, Judge Andrew Peck issued his opinion in <i>Da Silva Moore v. Publicis Groupe & MSL Group </i>287 F.R.D. 182 (S.D.N.Y. 2012), noting:</div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
<i>“…while some lawyers still consider manual review to be the ‘gold standard,’ that is a myth, as statistics clearly show that computerized searches are at least as accurate, if not more so, than manual review.”</i></div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
The presenters discussed some of the studies cited by Judge Peck, including one study, in which 28,209 documents were reviewed by seven different reviewer groups, revealed inconsistency in 57 percent of the human-reviewed results. They noted, however, that there is a shortage of studies comparing any well-designed/well-supervised human review to predictive coding in realistic litigation situations. </div>
<div class="separator" style="clear: both;">
<br /></div>
<h4 style="clear: both;">
Myth #2: Computers will replace all attorney review.</h4>
<div class="separator" style="clear: both;">
Cohen and Bratcher made a clear point that there is no such thing as computer-assisted review that does not at least rely on a human review element. Moreover, a number of barriers to using predictive coding ensure that CAR will not entirely supplant attorney review anytime soon.</div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
Those barriers include: </div>
<br />
<ul class="list">
<li>Limited if any cost savings in cases with fewer than 20,000 documents requiring review</li>
<li>The frequent desire or necessity for human review of the production set for privilege screening and to know what is being produced</li>
<li>The risk of spending more fighting with the other side about predictive coding than the predictive coding could save.</li>
<li>The time and expertise required to train the predictive coding engine (i.e., often partners or other busy and high-rate members of the trial team in order to achieve optimal results).</li>
<li>The problem of multiple cases—if the same documents need to be analyzed for multiple cases/jurisdictions and even one judge does not permit CAR or equivalent techniques, all of the documents will require human review anyway.</li>
<li>Unsympathetic judges/discovery masters who do not understand and/or are not willing to approve new and imperfect methods of identifying relevant documents.</li>
<li>Danger of losing the narrowing and cost savings of key word filtering where opposing parties and/or judges insist on the predictive coding being applied to the starting universe of documents in lieu of any keywords.</li>
</ul>
<div class="MsoNormal">
<h4 style="clear: both;">
Myth #3: We can’t use predictive coding software because our opponents won’t agree to it.</h4>
<div class="separator" style="clear: both;">
Magistrate Judge Andrew Peck, revisited his landmark decision in De Silva Moore three years later in <i>Rio Tinto PLC v. Vale </i>S.A. 14 Civ. 3042, (RMB) (AJP) (S.D.N.Y. March 2, 2015), stating:</div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
<i>“The case law has developed to the point that it is now black letter law that where the producing party wants to utilize TAR for document review, courts will permit it.”</i></div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
While there is not yet much case law on predictive coding, Cohen and Bratcher noted that most of what is there has been fairly positive. Specifically, In searching case law for “predictive w/2 coding,” they found about 34 cases:</div>
<br />
<ul class="list">
<li>12 positive references, in commentary or tone</li>
<li>18 neutral references</li>
<li>Often judicial approval of proposed ESI protocols</li>
<li>Four that used the term in a non-ESI context</li>
<li>No cases that disapproved the use of predictive coding</li>
</ul>
<div class="MsoNormal">
<h4 style="clear: both;">
Cohen and Bratcher Provide More Ammunition to Use Predictive Coding </h4>
<div class="separator" style="clear: both;">
If you want to learn more about using predictive coding and arm yourself with hard facts in recent case studies and court decisions, click here to download the complete presentation by David Cohen and Bryon Bratcher:<a href="https://www.guidancesoftware.com/ceic/Documents/The%20Truth%20About%20Predictive%20Coding%20Getting%20Beyond%20the%20Hype-Cohen-Bratcher-5-19-2015.pdf" target="_blank"> The Truth About Predictive Coding: Getting Beyond the Hyp</a>e. </div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
Don’t forget that you can attend other top-notch sessions like this one at <a href="https://www.guidancesoftware.com/ceic/Pages/about-ceic.aspx" target="_blank">Enfuse 2016 in Las Vegas, May 23-26, 2016</a>. Enfuse brings the power of hands-on labs, learning sessions, and networking events together in a way that will take your work—and your career—to a whole new level. </div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="MsoNormal">
<a href="http://www.guidancesoftware.com/enfuse" target="_blank">Click here to learn more about Enfuse</a> and how you can save over 40% off the regular conference registration fee if you act by November 30, 2015.</div>
<br /></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-67114946390295594692015-07-24T08:51:00.002-07:002015-07-24T08:51:56.756-07:00Panel of Experts from Dropbox, Seyfarth Shaw, and the eDisclosure Information Project to Discuss 2015 E-Discovery Survey Results<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Collecting data from cloud repositories, a myriad of mobile devices, and social media artifacts is challenging enough for most corporate counsel. Add the possibility of a data breach and resulting litigation, and the situation calls for the sharing of emerging best practices. Our 2015 E-Discovery Survey uncovered some valuable results, and you’re invited to hear our panel of e-discovery and security experts discuss them.</div>
<div>
<a name='more'></a><div>
<br /></div>
<div>
On Thursday, July 30th <a href="http://www.corpcounsel.com/" target="_blank">Corporate Counsel </a>will be hosting a one-hour webinar called, “<a href="https://goo.gl/Uhx7y2" target="_blank">Inside Counsel Takes Control: The 2015 E-Discovery Survey</a>.” Moderated by Chris Dale, Director of the <a href="http://www.edisclosureinformation.co.uk/" target="_blank">eDisclosure Information Project</a>, this webinar will review the findings of the survey through the lens of e-discovery experts Scott Carlson, Partner and Chairman of the eDiscovery and Information Governance practice, <a href="http://www.seyfarth.com/" target="_blank">Seyfarth Shaw LLP</a>; and Chad McManamy, Vice President of E-Discovery and Assistant General Counsel, Guidance Software.</div>
<div>
<br /></div>
<div>
This survey demonstrates how rapidly the ability to collect in a defensible way from cloud file sync and share repositories is growing in importance, and planning for and reacting to security breaches has become a near obsession. To address these areas of overlapping concern for inside counsel, Patrick Heim, Head of Trust and Security at Dropbox, will join in to comment on security and business strategies for the cloud. You may want to take a look at the related post on the <a href="https://goo.gl/2gWIM6" target="_blank">Dropbox for Business Blog</a>. </div>
<div>
<br /></div>
<div>
We invite you to join us on <a href="https://goo.gl/Uhx7y2" target="_blank">Thursday, July 30th</a> at 11:00 AM PDT, and please bring your questions for our expert panel.</div>
</div>
<div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-8217771286442442912015-05-13T17:05:00.001-07:002015-07-13T09:57:59.717-07:00New Research: In-House Legal Teams Reveal Top Trends in E-Discovery<div class="MsoNormal">
We're happy to be publishing the results of the 2015 Guidance Software Second Annual E-Discovery Survey. Responded to by nearly 100 people from in-house legal departments and e-discovery service providers this survey shows some key trends with e-discovery teams, such as:</div>
<div class="MsoNormal">
</div>
<a name='more'></a><br />
<ul class="list">
<li>53.5 percent indicated that caseloads are growing</li>
<li>55 percent of those surveyed review more than 50 percent of their cases internally</li>
<li>72 percent have an e-discovery software solution, with 46.7 percent having more than one</li>
<li>50 percent reported having a bring-your-own-device (BYOD) program in place with an average of 50 percent participation by employees</li>
<li>44.4 percent want the ability to collect ESI from the cloud in a defensible manner</li>
</ul>
<div class="MsoNormal">
This year we worked with Chris Dale, famed e-discovery expert and founder of the UK-based eDisclosure Information Project, who helped analyze the results. You can <a href="https://www.guidancesoftware.com/resources/Pages/doclib/Document-Library/Corporations-Take-Control-of-eDiscovery.aspx" target="_blank">download the paper here</a>. </div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-19546028842109393152015-04-28T10:06:00.000-07:002015-04-28T10:28:26.396-07:00Heavy Hitters On Board to Share Unique E-Discovery and Legal Insights at CEIC 2015<br />
If you come to CEIC every year to hear from the industry’s movers and shakers in the legal realm, you're in for a treat this year at CEIC in Las Vegas, May 18 – 22. We’ve secured big talent and big topics in the track called E-Discovery: Legal Issues, Technical Challenges and Solutions, including legal issues related to data breaches and information governance.<br />
<br />
<h4>
<a name='more'></a>Best Practices for Navigating Legal Issues Associated with a Data Breach
</h4>
Speakers in this e-discovery track include judges, corporate attorneys, outside counsel and e-discovery industry analysts, all of whom live and breathe e-discovery every day. Of the 10 sessions in this track, five are panels that include a variety of industry pundits from high profile enterprises such as the U.S. Attorney’s Office and a leading retailer.<br />
<br />
The first panel session on Monday afternoon, “The Intersection of Privacy, Security and E-Discovery,” will feature three seasoned experts in a lively discussion:<br />
<br />
<ul class="list">
<li>Ed McAndrew, Assistant U.S. Attorney, Cybercrime Coordinator and National Security Cyber Specialist</li>
<li>David Steele, Senior Counsel, Home Depot</li>
<li>Chad McManamy, Esq., Vice President of E-Discovery and Assistant General Counsel, Guidance Software</li>
</ul>
<div class="MsoNormal">
McAndrew, Steele, and McManamy, with many years of experience on the front lines of e-discovery, will help you understand the latest developments in federal cybercrime and security law, lawyers' ethical obligations for data security, and lessons learned in real cases.<br />
<br />
<h4>
Isn’t it Time to Talk About Information Governance with E-Discovery? </h4>
<br />
At the request of past CEIC attendees, we’ve also allocated time to address the core concept of information governance in a Wednesday afternoon session called “Information Governance and E-Discovery: Can They Really Go Hand-in-Glove?” A panel of experts will explain the challenges in adopting an information governance process that coexists with e-discovery and highlight how they can be addressed together to maximize efficiencies and reduce costs.<br />
<h4>
<br />
Leading Legal Minds Will Shed Practical Light on Judicial Decisions </h4>
We’re excited that the Honorable Andrew Peck, Magistrate Judge with the Southern District of New York, has agreed to come back to CEIC again this year. Peck is a leading e-discovery judge who consistently pushes the boundaries of what judges expect and what parties should strive for through his decisions on technology-assisted review and other e-discovery issues.<br />
<br />
Peck will participate on the Tuesday morning panel, “Judicial Roundtable on Current E-Discovery Issues,” with Hon. Matthew Sciarrino Jr. of Kings County Supreme Court and attorney Daniel Lim, a leading e-discovery attorney with Shook, Hardy & Bacon.<br />
<br />
CEIC 2015 has become one of the most important venues for inside counsel, litigation support staff and information security professionals to meet up and sync up on today’s legal and technical challenges. And there’s a lot more in store for e-discovery and legal professionals—including 11 more sessions in the track E-Discovery Labs for the Practitioner—so please visit our <a href="http://www.ceicconference.com/" target="_blank">CEIC event website </a>to see the agenda in detail, register, and more. </div>
<div class="MsoNormal">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-43492471989735568742015-04-24T16:02:00.000-07:002015-04-24T16:02:29.474-07:00P&G E-Discovery Manager Outlines How to Streamline In-House E-DiscoveryOne of the high points of our 2014 Guidance Software E-Discovery webinar series was when Scott Van Nice, E-Discovery Manager for Procter and Gamble (P&G), <a href="https://www.guidancesoftware.com/resources/Pages/webinars/A-Day-in-the-Life-of-a-Procter-Gamble-E-Discovery-Manager.aspx" target="_blank">outlined his process </a>for enabling P&G to revamp their e-discovery model, reducing their e-discovery spend by fifty percent in the first eight months and compressing a four-to-six-week case start-up schedule to just two days.<br />
<br />
Now there’s even better news, which is that e-discovery veteran Scott Van Nice has documented this knowledge in a new case study that explores in more detail how Procter & Gamble, the world’s largest consumer goods company, tackled a hefty in-house e-discovery process and now supports e-discovery for the company with a lean team of two. <br />
<br />
<a name='more'></a>
This case study is a must read whether you're currently implementing e-discovery in-house or whether you're researching how to do it. It addresses the organizational structure put in place by P&G to simplify, strengthen, and streamline its e-discovery process, including how to:<br />
<ul class ="list"><p>
<li>Mobilize teams for rapid response</li>
<li>Identify and fine-tune responsibilities</li>
<li>Measure service delivery expectations</li>
<li>Nurture cross-team collaboration</li>
<li>Select and manage vendors</li>
</ul>
<div class="MsoNormal">
Scott shares metrics and key takeaways that will serve as guideposts for any organization that cares about controlling their litigation costs and improving execution. You can <a href="https://www.guidancesoftware.com/resources/Pages/doclib/Document-Library/Simplify-Strengthen-and-Streamline-In-house-E-Discovery-by-Scott-Van-Nice.aspx" target="_blank">download it her</a>e.<br />
<br />
<b>Comments?</b> Best practices of your own? We invite your feedback in the section below.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-35225645729546493112015-03-19T10:17:00.001-07:002015-03-19T10:17:57.060-07:00E-Discovery 201 Webinar Series: Evidence Admissibility, Expert Witnesses, Data Breaches<author>Judi Uttal</author><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9aYNYC9EolI614B9m1ZmJylMuV58BKKXhjTReVuvLNm-rDC-4cwso9IlZZF8oVmSFumLHHYWqIAoIxYVcM4sksES5huuG_PzD_kzK8-z7CzjE3eBo-w31-6ZAqp8YMr1LwUr9VcIVXvI/s1600/201+series.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9aYNYC9EolI614B9m1ZmJylMuV58BKKXhjTReVuvLNm-rDC-4cwso9IlZZF8oVmSFumLHHYWqIAoIxYVcM4sksES5huuG_PzD_kzK8-z7CzjE3eBo-w31-6ZAqp8YMr1LwUr9VcIVXvI/s1600/201+series.png" height="147" width="400" /></a></div>
<br />
For the last three months we've been hard at work designing what we consider one of the best e-discovery webinar series available today. Working in concert with Joshua Gilliland of Bow Tie Law, we've assembled a team of experts to focus on the details of three advanced topics. This complimentary E-Discovery 201 webinar series features leading legal experts, including judges, specialist attorneys, and e-discovery consultants. Just as importantly, Continuing Legal Education (CLE) credits are available to those who attend the live event.<br />
<div class="MsoNormal">
<a name='more'></a><br />
<b>E-Discovery 201 Special Focus Topics: </b> Whether you’re an attorney or a litigation support specialist, you can gain a new level of understanding on these three topics that can strengthen your standing in upcoming litigation:<br />
<div class="MsoNormal">
<ul class="list"><p>
<li><b>Wed., 4/8 – Evidence Admissibility</b>: The Honorable Matthew A. Sciarrino, Jr. of the Kings County Supreme Court, Counsel Kathleen F. McConnell of Seyfarth Shaw LLP, Joshua Gilliland, Esq., of Bow Tie Law; and Chad McManamy, Esq., Assistant General Counsel at Guidance Software will provide insight into ensuring admissibility of evidence from several different perspectives.</li>
<li><b>Wed., 5/6 – The Value of Expert Witnesses</b>: Court-recognized e-discovery expert Jim Vaughn will join Josh Gilliland and Chad McManamy to share his insight into the role and involvement of expert witnesses in helping defend the collection of ESI and review processes and other critical issues.</li>
<li><b>Wed., 6/10 – Executing Litigation Holds from a Data Breach</b>: Chad McManamy and Josh Gilliland will be joined by Stephanie Sparks, the Shareholder and Chair of IP, Privacy and Data Security Groups at Hoge Fenton Jones & Appel, Inc. for an invaluable session on data breach notification requirements, the rules regarding preservation of responsive ESI, and e-discovery best practices for handling a breach.</li>
</ul>
</div>
<div class="MsoNormal">
We hope you can join us. Take a look at the full session descriptions and r<a href="http://connect.guidancesoftware.com/LP=623" target="_blank">egister here</a>.<br />
<i><br /></i>
<i>Judi Uttal is the Senior Director of Product Marketing at Guidance Software. </i></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-88145369145450559072015-03-10T14:44:00.000-07:002015-03-10T14:44:09.562-07:00Strategies for Mitigating Business Risks Associated with Cloud Repositories<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
You may be
among the many organizations who are considering deploying enterprise file
synchronization and sharing solutions (EFSS) or cloud repositories to empower
your mobile workers, implement BYOD policies, and support collaboration. You’re
in good company. Cloud adoption rates
are rising as more and more companies deploy file synchronization and share
capabilities, and the reasons for doing so are important: To enable their users
to have access to data anywhere and to easily share that information and collaborate
with their colleagues, partners and customers.<o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;">
It’s working
in their favor. According to Forrester:<o:p></o:p><br />
</div>
<div class="MsoNormal?>
<br />
<ul class=" list="">
<br />
<li>91% of companies reported increased productivity thanks to file sync and share </li>
<li>70% of employees using file sync and share reported using it every day, while nearly one in five use it hourly.</li>
</div>
<div class="MsoNormal">
<br />
But the challenges are also obvious:<o:p></o:p></div><br>
<div class="MsoNormal">
<ul class="list">
<li>Security teams haven’t been able to determine with certainty whether sensitive data is in the cloud</li>
<li>Performing e-discovery search and collections in a way that a court will accept could be both time-consuming and fraught with
peril</li>
<li>Best practices for reducing risk when negotiating cloud vendor contracts are in the beginning stages of development.</li>
</ul>
</div>
<div class="MsoNormal">
In fact, at Guidance Software, we’ve been integrating with leading EFSS and cloud collaboration systems like Dropbox for Business to make it all easier—and fully defensible from a legal standpoint. Take a look at our new paper, where we define the critical business requirements related to cloud and EFSS solutions and offer some advice on how to negotiate them into vendor business agreements. It also covers the challenges of collecting ESI from the cloud for purposes of e-discovery and highlights the integrations of EnCase®
eDiscovery with Amazon S3, Box, Dropbox, Google Drive, and Office 365.<o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<a href="https://www.guidancesoftware.com/resources/Pages/doclib/Document-Library/Enabling-Defensible-Cloud-ESI-Collections-that-Aligns-with-Enterprise-Policies.aspx">Download the paper here</a><o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br />
<b>Comments</b>? Have best practices of your own? We welcome your thoughts in the Comments section below.</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-26188904946072461382015-02-10T15:00:00.000-08:002015-02-15T07:18:56.201-08:00Vote for the Biggest E-Discovery Challenges of 2015<div class="MsoNormal">
<span style="color: #444444; font-family: "Arial","sans-serif"; font-size: 10.5pt; line-height: 115%; mso-fareast-font-family: "Times New Roman";">New
trends in TAR, collecting ESI from the cloud, BYOD… When it comes to
e-discovery, what’s keeping you up at night? With just a few keystrokes, you
can make your concerns heard by participating in the second annual e-discovery
professional’s survey. The survey is short, it’s focused, and all participants will see the results after analysis. To answer this brief survey, <a href="https://www.surveymonkey.com/s/E-DISCO?elq_mid=3674&elq_cid=934451&cmpid=Email-Eloqua-Ediscovery_NA-2703_ED_EDiscoSurvey_email01_1/29-A-Eloqua_Survey-1-28-2015&utm_source=Eloqua&utm_medium=Email&utm_campaign=1-28-2015-Ediscovery_NA-2703_ED_EDiscoSurvey_email01_1/29&elq=c0db4605cd2e4f1cbd4ab24b2db0fda0&elqCampaignId=1217"><span style="color: #0a4c80;">click here</span></a>. To see last year’s results, <a href="https://www.guidancesoftware.com/about/Pages/newsroom/post/In-house-Review-Favored-by-Majority-of-E-Discovery-Professionals.aspx?elq_mid=3674&elq_cid=934451&cmpid=Email-Eloqua-Enterprise_NA-2703_ED_EDiscoSurvey_email01_1/29-B-Promo-Survey-1-28-2015&utm_source=Eloqua&utm_medium=Email&utm_campaign=1-28-2015-Enterprise_NA-2703_ED_EDiscoSurvey_email01_1/29&elq=c0db4605cd2e4f1cbd4ab24b2db0fda0&elqCampaignId=1217"><span style="color: #0a4c80;">click here</span></a>.</span></div>
<div class="MsoNormal">
<span style="color: #444444; font-family: "Arial","sans-serif"; font-size: 10.5pt; line-height: 115%; mso-fareast-font-family: "Times New Roman";"><br /></span></div>
<a name='more'></a>The survey will take less than five minutes to complete and, as a thank you, one
randomly selected survey respondent will receive an Apple Watch.<br />
<br />
<strong>We Understand Privacy
Needs</strong><br />
<div class="MsoNormal">
<span style="color: #444444; font-family: Arial, sans-serif; font-size: 10.5pt; line-height: 115%;">Your responses will be kept completely anonymous, and we
will not disclose your organization’s participation. Some of the data will be
compiled into a research report, and we would be pleased to send all survey
respondents a copy of the report next month.</span></div>
<div class="MsoNormal">
<span style="color: #444444; font-family: "Arial","sans-serif"; font-size: 10.5pt; line-height: 115%; mso-fareast-font-family: "Times New Roman";"><br /></span></div>
<div class="MsoNormal">
<span style="color: #444444; font-family: "Arial","sans-serif"; font-size: 10.5pt; line-height: 115%; mso-fareast-font-family: "Times New Roman";"><b>Comments? Questions?</b> We invite you to comment in the section below, and to explore what's new with <a href="http://www.guidancesoftware.com/ediscovery" target="_blank">EnCase eDiscovery here</a>. </span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-38777959045016593852014-09-30T09:13:00.000-07:002014-09-30T09:31:13.812-07:00The “Shellshock” BASH Vulnerability and EnCase Products<author>Ken Basore</author><br />
<br />
<div class="MsoNormal">
We know that our customers are concerned about the “<a href="http://en.wikipedia.org/wiki/Shellshock_(software_bug)" target="_blank">Shellshock” BASH vulnerability</a> and whether it affects our EnCase software, our Tableau hardware products, or any of our corporate systems. This is a legitimate concern, and because we have the utmost concern for your organizational and data security, we want to give you all the information you need regarding it. Below we address one by one the key areas that you may be wondering about.<br />
<a name='more'></a><br />
<b>EnCase-based Applications</b> (EnCase Forensic, EnCase Enterprise, EnCase eDiscovery, EnCase Cybersecurity, EnCase Analytics, and EnCase Portable) and all of the applications that run on them are NOT affected by the Shellshock vulnerability, as they do not run on Linux and do not use BASH. This is true for all versions of the applications.<br />
<br />
<b>EnCase Servlets</b> run on a wide range of operating systems, including Linux, Unix, HP-UX, and various other *nix-based systems. All of our Unix-based servlets are self-contained applications that can be launched via BASH, but do not interact with the BASH shell while they are running. As a result, the servlets are NOT affected by the vulnerability. However, users should check the operating system in which they are running for risks associated with other applications.<br />
<br />
<b>EnCase LinEn:</b> Guidance Software provides a free imaging tool that runs on Linux. LinEn is a self-contained application that can be launched via BASH, but which does not interact with the BASH shell while it is running. As a result, LinEn is NOT affected by the vulnerability, but users should check the operating system in which it is running for risks associated with other applications.<br />
<br />
<b>EnCase eDiscovery Review</b>: The EnCase eDiscovery Review SaaS application does use certain Linux systems that utilize the BASH shell. Once we learned of the original vulnerability, we immediately patched our systems or applied other well-established techniques to mitigate any risk to our systems. This includes additional attack vectors that have come to light since the original news was released. At this time, EnCase eDiscovery Review is NOT vulnerable to the known Shellshock/BASH vulnerabilities.<br />
<br />
<b>Tableau Products:</b> One of our Tableau products, TD3, runs a Linux operating system with a vulnerable version of BASH. Although the primary use case for the Tableau TD3 does not include attaching it to a network and exposing it to potential attack from an outside attacker, we are testing a patch that will fix the vulnerability and we will be releasing it in the next few days to our customers.
<br />
<br />
<b>Guidance Software, Inc. Web-based Systems: </b> As with most companies with any type of a web presence, Guidance Software did have internet-facing systems that were affected by this vulnerability. Upon learning of the issue, we immediately started working with our vendors and suppliers to obtain patches for those systems. As of this date, we have patched all our systems or applied other well-established techniques to mitigate any risk. At this time, we are confident that there is NO risk to any GSI web-facing system and all of our data, including confidential customer data, is secure.<br />
<br />
Rest assured that we maintain a relentless commitment to the security of all of our software and systems and will continue our diligent efforts to validate that security. If you have any questions, <a href="https://www.guidancesoftware.com/about/pages/contactus.aspx?cmpid=nav#CustomerService" target="_blank">please contact us here</a>.<br />
<br />
<i>Ken Basore is the Senior Vice President of Research and Development at Guidance Software, Inc.</i></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-51653583619966584222014-09-19T15:49:00.002-07:002014-09-29T19:41:25.176-07:00“E-Discovery Best Practices for IT” Webinar Highlights<author>Jason Pickens</author><br />
<br />
<div class="MsoNormal">
IT teams are the unsung heroes of litigation, spending many hours searching for relevant electronically stored information (ESI), helping the legal team “herd cats” to ensure that custodians respond to litigation holds, and preparing massive files for both review and production phases. Having spent time with many legal and IT teams across North America and Canada, I’ve compiled a few best practices after some discussion with my <a href="http://goo.gl/ABEpeo" target="_blank">recent webinar</a> co-presenter and former colleague, Carl Wong, who’s an adjunct professor in forensic computing at the John Jay College of Criminal Justice.<br />
<br />
<b>#1 – Bring Preservation and Collection In-House</b><br />
<br />
Lowering costs relative to both software and a streamlined collection process are big benefits, but not the only ones. No one understands your IT landscape better than you do, and it makes sense for you to be the drivers of a repeatable and defensible process that’s part of a total response plan. Bringing the oversight of the process in-house doesn’t mean your team has to do all the work, but rather that you should have control over the process for greater efficiency and lower risk.<br />
<br />
<a name='more'></a><b>#2 – Avoid Custodian
Self-Collection</b><br />
<div class="MsoNormal">
<br />
Let’s face it: custodians as a group have
not proven to be very good at identifying and preserving the ESI that the legal
team needs. In fact, a court may view custodian self-collection as an unlawful
“outsourcing” of the preservation process. In general, letting custodians
perform their own collection makes the process less defensible in court for
your legal team and less reliable overall. The teams I’ve worked with have seen
greater efficiency and far more thorough results by using e-discovery software
like <a href="https://www.guidancesoftware.com/products/Pages/EnCase-eDiscovery/legal-hold.aspx">EnCase
eDiscovery</a> to manage the legal hold and preservation process. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>#3 – Preserve
Relevant ESI from All Potential Data Sources ASAP<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
This one is especially beneficial if put into practice
because it turns out that 80 to 90 percent of the legal risk in e-discovery
occurs at the preservation stage. What your legal team has to stand ready to
prove to the court is that they met the “reasonableness standard” by:</div>
<div class="MsoNormal">
<br />
<ul class="list">
<li>Identifying the sources of relevant ESI</li>
<li>Notifying the custodians of relevant ESI that they should not delete or change it</li>
<li>Taking steps to preserve that ESI in a way that protects it and proves chain of custody</li>
</ul>
</div>
<div class="MsoNormal">
Having a data map showing where all key types of data are
stored on your network and endpoints is extremely helpful. It’s also important
to be aware of cross-border data accessibility issues, as collecting data from
foreign countries can present a host of legal and logistical issues. This is
something to collaborate on with your legal team, who are likely to be highly
motivated to help prevent privacy-related problems.</div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>#4 – Perform a True Early Case Assessment—Before Collection<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
What your legal team wants more than anything is to be able
to start working on their case strategy ASAP, which means they need to get
their hands on the relevant ESI the second you can get it to them. To help them
get it faster and to save enormously on your staff time and costs, my clients
and I have found that two things help in a big way:</div>
<br />
<ul class="list">
<li>“Right-size” your discovery efforts by estimating the collection of data volumes, knowing in advance the file types of
the documents you typically collect for litigation, which keywords are most effective for searching, and the relevant date ranges. Also be sure that you can account for the possibility of “inaccessible” or “missing” data ahead of time.</li>
<li>Perform a limited initial collection and processing of ESI for a select group of key custodians to support an argument by your legal team to restrict the scope of discovery. If you can document your research and sampling efforts along with budget projections, your inside counsel can counter their opposing counsel’s overly broad production demands.</li>
</ul>
<div class="MsoNormal">
<b>#5 – Collect ESI Based on Search Criteria Optimized for Each Case<o:p></o:p></b><br />
<br />
There is a better way to collect and preserve data, and that’s by optimizing search criteria for each case by conferring with your
legal team. To begin with, it’s important to consider documents and e-mails to be separate items. Why is that? Because of the metadata. A document does not have a “From” field. An email is not going to have an MDF or SHA1 hash value and so is not considered a file. Secondly, if you can safely exclude backup (.bak) files or executable (.exe) files, for example, that can help pare down
the collection criteria for all cases. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<a href="http://www.guidancesoftware.com/ediscovery" target="_blank">EnCase eDiscovery</a> offers simple questionnaires that will
help in developing collection criteria that can be captured for reuse in
templates. It also makes it easy to incorporate more best practices related to
the organization, automation, and searching of data sets. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
After years of work with IT and legal teams on e-discovery,
these are a few of the best practices that can prevent each new notice of
litigation for your organization from becoming an instant nightmare in which
you are constantly reinventing the wheel with collection and preservation.<o:p></o:p></div>
<br />
<div class="MsoNormal">
<b>Have You Incorporated
Other Best Practices?</b> I welcome discussion in the Comments section below. And if you'd like to see the webinar recording, you can do so 24/7/365 <a href="http://goo.gl/ABEpeo" target="_blank">right here</a>.<o:p></o:p><br />
<br />
<i>Jason Pickens is an EnCE®- and
EnCEP®-certified principal consultant at Guidance Software and performs e-discovery and digital forensics work alongside many in-house teams inside Fortune 500 companies.</i></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-62563601820207579412014-06-10T11:09:00.000-07:002014-06-10T11:09:50.062-07:00CEIC 2014: Highlights of “The Intersection of Privacy, Security and E-Discovery” Session<div class="MsoNormal">
<br />
Recent news stories have sparked a worldwide debate about
the right to privacy for both individuals and businesses. As the European Union
pushes for greater safeguards, tech giants like Google are struggling with the
potential implications of the “right to be forgotten.” Here in the United
States, several high-profile breaches raised the issue of consumers’ right to
know when sensitive information about them has been accessed.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
In their discussion at <a href="http://www.ceicconference.com/" target="_blank">CEIC 2014</a>, 451 Research Analyst and
Counsel David Horrigan and Assistant U.S. Attorney Edward McAndrew highlighted
several developments that could impact e-discovery and investigations. <o:p></o:p></div>
<div class="MsoNormal">
</div>
<a name='more'></a><br />
<div class="MsoNormal">
<b>The Right to Be Forgotten<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
Under the “right to
be forgotten,” individuals can request that search engine operators, such as
Google, remove personal information that’s outdated or irrelevant. This right
was recently bolstered when the Court of Justice of the European Union ruled
that internet companies can be made to remove certain information. <o:p></o:p></div>
<div class="MsoNormal">
<br />
In this specific case, a Spanish man objected that Google
searches on his name returned results about a real-estate auction to collect
alleged debts in the late 1990s. The court ruled that Google was required to
remove results that are "inadequate, irrelevant or no longer relevant, or
excessive in relation to the purposes for which they were processed and in the
light of the time that has elapsed."<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The ruling is already having an impact. According to a
recent <a href="http://time.com/2821716/google-right-to-be-forgotten-europe/">Time
Magazine story</a>, Google has received an average of 10,000 requests per day
from individuals who want certain search results deleted.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
“It’s a delicate balancing act between the right to know and
the individual’s right to privacy,” Horrigan noted. How privacy is viewed is
also a cultural issue—with the United States often placing greater emphasis on
the right to know and the public’s access to information. Meanwhile, many
Europeans view the United States as the “Wild West” when it comes to data
privacy.<o:p></o:p></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>Valuable Corporate Information is in Hackers’ Crosshairs<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
On the first day of CEIC, the
Justice Department announced that it had indicted five members of the Chinese
military for allegedly hacking into and stealing trade secrets from six U.S.
companies. Horrigan believes that, although data privacy and protection in the
United States may not be the priorities they are in many other nations, this case
indicates a greater government emphasis on data privacy and cyber security,
including criminal prosecutions and regulatory enforcement. Further, the
indictment will fuel continuing global dialogue on espionage and cyber threats.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
“Economic espionage and the rampant cyber theft of
intellectual property is perhaps the greatest, current threat to the United
States in the cyber realm,” McAndrew said, explaining that China is actively targeting
industries in which it would like to grow in order to gain a competitive
advantage.<o:p></o:p></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>A Piecemeal Approach<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
There are more than 50 federal statutes that address
cybersecurity issues, according to McAndrew. There are also a number of federal
privacy and data security statutes geared towards protecting an individual’s
right to privacy, such as the Health Insurance Portability and Accountability
Act (HIPAA).<o:p></o:p></div>
<div class="MsoNormal">
<br />
The Obama Administration has been actively pushing for a
national data breach law. The Federal Trade Commission recently joined the data
security fray, when it sued Wyndham Worldwide, claiming the hotel chain did not
take proper measures to protect the personal and financial information of guests
against cybercriminals. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The FTC blamed data breaches at Wyndham hotels on several significant
security lapses, such as lack of firewalls, reliance on weak or easily guessed
passwords, and the failure to conduct security investigations and fix previously
known vulnerabilities.<o:p></o:p></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>Defining Privacy in a Rapidly Transforming Environment<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
What does this all mean for professionals tasked with
e-discovery? They should become more actively engaged in discussions concerning
security and privacy. Just like the government and other private industry sectors,
lawyers and legal services providers are
at risk of losing valuable and confidential information.<o:p></o:p></div>
<div class="MsoNormal">
<br />
“This is no longer just an IT problem in need of just an IT
solution,” said McAndrew. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
He also stressed the importance of individualized risk
assessments and the creation of a data security plan that fits each lawyer or
legal organization’s risk profile, goals, and budget. Legal organizations must
also develop data-breach and incident-response plans, so they are prepared to
act when confronted with different types of cyber issues.<o:p></o:p></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>What are Your Thoughts?</b>
What role should legal play in security policies? In an increasingly connected
world, is the further erosion of privacy as we know it inevitable? <o:p></o:p></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-56136280166838319882014-06-06T11:57:00.003-07:002014-06-06T11:57:53.393-07:00On OpenSSL Security Advisory CVE-2014-0224<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="font-family: Calibri, sans-serif; font-size: 11pt;">After the well-documented, highly
publicized Heartbleed flaw in OpenSSL was made </span><a href="http://www.heartbleed.com/" style="font-family: Calibri, sans-serif; font-size: 11pt;">public</a><span style="font-family: Calibri, sans-serif; font-size: 11pt;">, many of our customers reached out
to Guidance Software to confirm whether our products were affected. At
that time, we confirmed: Guidance Software products do not use OpenSSL at all.</span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt;">On June 5th, 2014, another OpenSSL
vulnerability was published: <a href="http://www.openssl.org/news/secadv_20140605.txt">CVE-2014-0224</a>. Once
again, Guidance Software confirms our products <u>do not use OpenSSL</u> and are
therefore unaffected by the latest published vulnerability in OpenSSL. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<br />
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt;">Questions? Comments? Add below or reach out
to us on <a href="http://www.twitter.com/encase" target="_blank">Twitter @EnCase</a>. <o:p></o:p></span></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-33466621741111818642014-05-29T08:57:00.000-07:002014-05-29T08:57:18.863-07:00Case in Point: Litigation Cash Cow<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMeBWXD5WXZV0CpNND6sBTTmuWm7SoR_7oMRr4Sb4wjcvu8PnwFa8O6NzK5FbQzJ3Gjz72OKIprra15lBTTkQ376jla2c8PlsWP_vO1U0XlVEfD_UsAgUwnJrf0aoznVLZglVIeWis5qg/s1600/freerange-reviewers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;">
<img style="width: 90% !important; height: auto !important; border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMeBWXD5WXZV0CpNND6sBTTmuWm7SoR_7oMRr4Sb4wjcvu8PnwFa8O6NzK5FbQzJ3Gjz72OKIprra15lBTTkQ376jla2c8PlsWP_vO1U0XlVEfD_UsAgUwnJrf0aoznVLZglVIeWis5qg/s1600/freerange-reviewers.jpg" /></a></div>
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-48923351335761013892014-04-11T14:10:00.001-07:002014-04-11T14:10:54.555-07:00Out of Cold Storage and Onto Your Screen: Why In-House E-Discovery Review is Taking Hold<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Bringing e-discovery review in-house is becoming more common
by the week. The days of sending legal assistants and paralegals away to
“storage camp” are becoming history not just because of the reality that the
overwhelming amount of our business information is stored electronically. It’s
because bringing review in house makes sense in terms of early case assessment
as well as costs and time.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
A few developments in the legal industry are fueling this
trend, too. Inside counsel are becoming both savvier about technology and more
impatient with the inability to gain oversight on the process when review is
always and only outsourced. When counsel asks, “How far along are we in the
review process?” and receives an answer like, “Um, it’s hard to quantify
exactly,” it’s time to get a different system in place. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Learn New Options
from a Field Expert<o:p></o:p></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Betsy McCabe, a principal business consultant for Guidance
Software with plenty of hands-on review experience, will present a webinar on
Wednesday, April 16<sup>th</sup> called, “<a href="http://goo.gl/vsesJi%20" target="_blank">Taking Control: Benefits and Best Practices for Bringing Review In-House</a>.” <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Join her for a look at research on the expectations of
increased corporate litigation, how you and your ever more technologically
proficient colleagues now have a number of options for performing review, and
how to establish a methodology for secure, flexible multi-party, multi-matter
review. <a href="http://goo.gl/vsesJi" target="_blank">You can register her</a>e. We hope to see you there.</div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>Comments?</b> We
welcome discussion in the Comments section below.</div>
<div class="MsoNormal">
<o:p></o:p></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-52673063328722436162014-03-17T10:45:00.000-07:002014-03-18T10:07:51.972-07:00Highlights of the Sedona Conference Institute Program on “eDiscovery in a New Era”<author>Chad McManamy</author><br />
<br />
<div class="MsoNormal">
Last week I attended the 8<sup>th</sup> Annual Sedona
Conference Institute Program, “eDiscovery in a New Era: New Technologies, New
Media, New Rules.” During the initial session, leaders polled the audience as
to how many were first-timers at the event, and a significant number of attendees
raised their hands. I've attended the annual event for the past four years, and am encouraged to see more people taking an interest in improving their e-discovery
processes.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><i>Zubulake</i> Opinions Still the Standard</b></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
This year’s program focused on drawing a finer point
on specific issues. Case law is always of interest, but discussions still
mostly continue to refer back to cases such as the now classic <i>Zubulake v. UBS Warburg</i>, which led to the issuance of a
groundbreaking series of opinions on electronic discovery from Judge Shira
Scheindlin prior to the 2006 amendments to the Federal Rules of Civil Procedure
(FRCP). At the 2014 Sedona Conference Institute Program and going forward, we are simply
further defining the questions at issue. No sea change in opinion or
ramifications of these opinions was in evidence this week.</div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
</div>
<a name='more'></a><br />
<div class="MsoNormal">
The discussion on the impending proposed changes to the FRCP
was lively and, I believe, important, because we business attorneys must stay
educated on those changes in order to adopt new best practices that lower e-discovery
risk. Over 2, 200 comments were submitted online before the public comment
period concluded. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Proposed FRCP Rule
Changes<o:p></o:p></b></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
Certain hot-topic issues emerged from the public comments.
For example, there was quite a bit of fervent discussion on changing Rule
37(e). The proposed revision could help organizations lower the costs of
preservation by reducing the potential for being sanctioned for routine,
inadvertent, good-faith destruction of electronically stored information (ESI).
Instead, the revised rule would raise the standard for sanctions so that only
knowing or willful destruction of ESI would be penalized.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The street view of proposed revisions to Rule 26(b)(1) is
that the issue of proportionality is being moved up in the rules to give it a
higher profile, but discussion at Sedona teased out some additional nuances about its
potentially more prominent new position.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>TAR Not on Judicial Radar
Yet<o:p></o:p></b></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
During one session, a comment was made that there aren’t yet
a lot of technology-assisted review (TAR) cases making it to courts. My take is
that, while TAR may be increasingly in use, it’s not making its way up to the
courts very often for decisions on whether or not the methodology is judicially
acceptable.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>People, Technology,
Process: A Hybrid Approach May Make Sense<o:p></o:p></b></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
The last panel on the opening day was about how to make a business
case for e-discovery. Panelists played various roles as e-discovery technology
vendors, outside counsel, or in-house counsel. The first go-round required each
one to advocate for his or her model. In the end, it seemed everyone agreed
that a hybrid approach was best. There is no one-size-fits-all when it comes to
e-discovery; it’s best to decide on a case-by-case basis, with some outside
help on larger cases.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
At Guidance Software, we see that our customers need to
bring e-discovery in-house when they reach a point of needing to respond to
more than one big case a year. Having an easily accessible <a href="http://www.guidancesoftware.com/products/Pages/EnCase-eDiscovery/centralized-legal-repository.aspx" target="_blank">Central Legal Repository</a>
in <a href="http://www.guidancesoftware.com/products/Pages/encase-ediscovery/overview.aspx" target="_blank">EnCase eDiscovery</a> provides them with a secure virtual workspace where both
inside and outside counsel can work on multiple matters without duplicating
efforts. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
Whether e-discovery is a major focus for your legal team
this year or is just coming into focus, the Sedona Conference Institute Program
is a highly productive way to stay up-to-date with emerging best practices. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Did You Attend?</b> I
welcome your comments in the Comments section below.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<i>Chad McManamy is an Assistant General Counsel at Guidance Software.</i></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-80249458110984104632013-12-05T14:56:00.000-08:002013-12-13T13:06:42.902-08:00The Road to Sanctions is Paved with Good Intentions<author>Siddartha Rao</author><br />
<br />
<div class="MsoNormal">
<i>In Sekisui American Corp. v.
Hart, Judge Scheindlin
issues discovery sanctions, warns counsel that good intentions are not enough<o:p></o:p></i></div>
<div class="MsoNormal">
<i><br /></i></div>
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
Counsel
should take note of the adverse inference instruction sanction Judge Shira
Scheindlin issued against the plaintiff in <a href="http://www.nylj.com/nylawyer/adgifs/decisions/081913scheindlin.pdf"><i>Sekisui
American Corp. v. Hart</i>, No. 12 Civ. 3479 (SAS) (FM), (S.D.N.Y. Aug. 15,
2013)</a><i> </i>(“<i>Sekisui</i>”), an action against former executives for
breach of contract. The case signals potential increased risks to
litigants who fail to implement proactive hold and preservation policies and
should provide guidance to counsel about the need for defensible forensic
processes. </div>
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
</div>
<a name='more'></a>The <i>Sekisui</i>
sanctions order is of particular interest because it reversed the memorandum
decision of Magistrate Judge Maas who declined to sanction plaintiff, reasoning
that sanctions should not issue where spoliation occurred through innocent
error and defendants had not shown prejudice. <i>Sekisui America Corp. v.
Hart</i>, No. 12 Civ. 3479, (SAS) (FM) (S.D.N.Y. June 10, 2013).<br />
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
<o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
Judge
Scheindlin’s opinion reversing Judge Maas is noteworthy for at least three
reasons: <o:p></o:p></div>
<div class="MsoNormal" style="text-align: justify; text-autospace: none;">
</div>
<ol>
<li>Judge Scheindlin's analysis places the burden with respect to key issues of culpability and prejudice on litigants with preservation obligations.</li>
<li>The decision furthers a trend in finding a duty to preserve attaching before the Complaint is filed, using a fact-specific rather than a formalistic test.</li>
<li>Judge Scheindlin's criticisms of the proposed changes to Rule 37 of the Federal Rules of Civil Procedure may influence the final form of the rule and push it in a direction that harmonizes the rule with the <i>Sekisui </i>holding. </li>
</ol>
<div>
For full commentary on the <i>Sekisui </i>sanctions, review our <a href="http://www.encase.com/resources/Pages/doclib/Document-Library/The-Road-to-Sanctions-is-Paved-with-Good-Intentions.aspx?cmpid=Social-Blog-Ediscovery_NA-none-A-Whitepaper-The_Road_to_Sanctions_is_Paved_with_Good_Intentions-12-5-2013&utm_source=Blog&utm_medium=Social&utm_campaign=12-5-2013-Ediscovery_NA-none" target="_blank">Case Update</a><span id="goog_1360110252"></span><span id="goog_1360110253"></span><a href="http://www.blogger.com/"></a>.</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-81699856590886974352013-11-14T09:04:00.000-08:002013-11-14T11:06:19.598-08:00Announcing an Industry-first Integration between EnCase eDiscovery and Box for Defensible Cloud Collection<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;">
<a href="https://www.box.com/enterprise/" target="_blank"><img alt="Box is the enterprise cloud content management platform of choice" src="https://box.zendesk.com/system/logos/2049/0097/box-logo.png" title="box logo" /></a> </div>
<br />
<br />
<div class="MsoNormal">
All of us on the EnCase eDiscovery team are excited to
announce a new integration between EnCase® eDiscovery and Box, the enterprise
cloud content management platform used by 97% of the Fortune 500. Enterprise IT
teams have come to rely on Box for cloud storage capabilities that map to their
information governance policies and processes. This makes Box the perfect
choice for this industry-first integration with our complete e-discovery
product, an integration that will let legal teams securely search, collect, and
preserve electronically stored information (ESI) located on Box from within
<a href="http://www.encase.com/ediscovery" target="_blank">EnCase eDiscovery</a> just as easily as with on-premise data.</div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Now Collect and
Preserve Information Managed in Box as Readily as On-Premises Data<o:p></o:p></b></div>
<br />
<div class="MsoNormal">
Whitney Bouck, the senior vice president and general manager
of enterprise at Box, has said that many of their enterprise customers reside
within highly regulated industries, so they need a way to meet e-discovery and
compliance requirements in a way that does not compromise efficiency and user
experience. This makes Box and EnCase eDiscovery ideally suited to offer IT and
legal teams a scalable, reliable, and secure way to gain visibility of content
stored in Box, to manage access to that content, and to control retention and
dispensation.</div>
<a name='more'></a><br />
Our President and CEO, Victor Limongelli, told us, “Box has
focused on bringing enterprise-grade cloud storage to the market, making them
the perfect partner for EnCase eDiscovery. Inside counsel and information
security teams are beginning to collaborate on processes and best practices,
and their essential technologies must do so, as well.”<br />
<br />
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<b>Integration Enables Visibility and Control
over ESI Managed in Box<o:p></o:p></b></div>
<div class="MsoNormal">
<br />
The
EnCase eDiscovery integration with Box offers the following to your risk
management and legal teams:<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Instant Visibility </b>of content housed in Box. EnCase eDiscovery can quickly scan Box and identify potentially relevant ESI based on specific criteria. Legal and IT support teams can access Box data in a forensically sound manner, as the integration keeps metadata and content intact, then makes it available to dispersed collaboration groups as needed. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Centralized Access </b>to data that may be required for e-discovery, increasing speed while preventing inadvertent sharing of sensitive data.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Rapid Response to Legal Matters, </b>which is a critical advantage when responding to regulatory requests. By collecting only relevant ESI, workloads are reduced along with risks and costs associated with manual procedures such as copying files and burning DVDs.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Lifecycle Control </b>supports a defensible process for retention and deletion (dispensation) of all data relevant in legal matters, whether stored on premise or on Box.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
More details are coming soon. Watch this space for
additional information, and let us know your thoughts in the Comments section
below. </div>
<div class="MsoNormal">
<o:p></o:p></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-47570777798708532592013-10-31T11:27:00.000-07:002014-03-24T14:18:36.749-07:00ACC Annual Meeting 2013: EU Data Privacy and the Godmother of E-Discovery<author>John Blumenschein</author><br />
<br />
I’m on a plane flying back from this year’s ACC (Association
of Corporate Counsel) <a href="http://www.acc.com/education/am13/">Annual Meeting</a>
in Los Angeles, which, as usual, delivered four days’ worth of excellent
sessions and food for thought. The hottest topic by far was data privacy,
especially in light of the <a href="http://news.cnet.com/8301-1009_3-57609559-83/officials-admit-nsa-snooped-on-world-leaders-wsj/">NSA
revelations this week</a>.<br />
<br />
<div class="MsoNormal">
<o:p></o:p></div>
<h4>
<b>Globalization and
Data Privacy</b></h4>
<div class="MsoNormal">
Almost all of the panel sessions that I attended [e.g., on
social media, government investigations, the Foreign Corrupt Practices Act
(FCPA)] touched on the topic of privacy in one way or another. The primary driving
force behind this topic’s heat factor, however, is the increasingly global
nature of business today.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<a name='more'></a><h4>
<b>EU Data Privacy in
E-Discovery</b></h4>
<div class="MsoNormal">
We were pleased to participate as a company in various
sessions, which were well attended and prompted intense, productive
discussions. Our Assistant General Counsel, Chad McManamy, moderated a panel
discussion entitled, “Overcoming EU Data Privacy Challenges in E-Discovery.”
The panelists for this session were:<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-left: .25in;">
<a href="http://www.nysd.uscourts.gov/judge/Scheindlin">The Honorable Shira A.
Scheindlin</a>, a very influential U.S. District Judge, Southern District of
New York, whom I consider the “Godmother of E-Discovery”<o:p></o:p></div>
<div class="MsoNormal" style="margin-left: .25in;">
<a href="http://www.encase.com/about/Pages/leadership/Mark-Harrington.aspx">Mark
Harrington</a>, our own General Counsel and Corporate Secretary<o:p></o:p></div>
<div class="MsoNormal" style="margin-left: .25in;">
<a href="http://www.linkedin.com/profile/view?id=93743924&authType=NAME_SEARCH&authToken=ahlp&locale=en_US&srchid=9397231383176973276&srchindex=1&srchtotal=1&trk=vsrp_people_res_name&trkInfo=VSRPsearchId%3A9397231383176973276%2CVSRPtargetId%3A93743924%2CVSRPcmpt%3Aprimary">David
Goodis</a>, Director of Legal Services and General Counsel, Office of the Information
and Privacy Commissioner of Ontario<o:p></o:p></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
</div>
<div class="MsoNormal" style="margin-left: .25in;">
<a href="http://www.kpmg.com/ca/en/contact/pages/dominicjaar.aspx">Dominic Jaar</a>,
KPMG Canada Partner and National Practice Leader.<o:p></o:p></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-indent: -.25in;">
<br /></div>
<div class="MsoNormal">
The lively and timely discussion at this session dealt with
issues like the European Union’s interaction with “privacy friendly” countries
such as Canada, EU-based corporations’ privacy concerns when dealing with
U.S.-based corporations and our propensity for litigation, as well as the
ramifications (or lack thereof) of failing to adhere to privacy regulations in
countries like France, Germany, and the United Kingdom.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<h4>
<b>Process and Risk in
Cross-Border Discovery</b></h4>
<div class="MsoNormal">
Later in the afternoon, our Vice President and Deputy
General Counsel, Daniel Lim, sat on a panel entitled, “Managing the Processes
and Risks of Cross-Border Discovery" with <a href="http://www.seyfarth.com/ScottCarlson">Scott Carlson</a>, Partner and
e-Discovery Practice Group Co-Chair at Seyfarth Shaw LLP and <a href="http://www.linkedin.com/pub/harvey-jang/b/82a/120">Harvey Jang</a>,
Director of Privacy and Information Management at Hewlett-Packard. They provided
an overview of the evolution of data-privacy rules in the EU and Asia, and the
inherent conflict with U.S. discovery requirements. The panel also offered practical tips on
navigating privacy restrictions in the context of business information needed
for litigation in the US. A key point of discussion was the way that the cultural
differences between the EU, Asia and U.S. can create conflicting views on the topic of privacy. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Did You Attend?</b> I
welcome your comments on highlights from the ACC Annual Meeting in the Comments
section below.</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-75704569937973638122013-10-23T09:19:00.000-07:002013-10-23T11:04:17.316-07:00Data Privacy, Cross-Border E-Discovery, and the Hybrid Solution<author>Chris Kruse</author><br /><br>
You could call the United States the epicenter of
litigation. It’s an unfortunate, but inescapable, reality that our markets and business
cultures drive a preponderance of international business litigation, so much so
that we’re the world leader by a mile. The challenge for European and Asian
corporations lies in the fact that many have U.S. headquarters or do business
with companies here, which is when e-discovery becomes complex due to their
national, local, or other pertinent data-privacy laws.<br />
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<o:p></o:p></div>
<br />
There are dramatic variations in data-privacy laws and
requirements across countries, domains, and jurisdictions. For example, in
Germany the requirements for <a href="http://www.encase.com/resources/Pages/doclib/Document-Library/Obtaining-German-Works-Council-Approval-to-Collect-Employee-E-Mail-and-Electronic-Documents.aspx">collecting
employee e-mail and electronic documents</a> within one company may be
completely different than those for the company next door, as those
requirements are determined by each corporation’s <a href="http://en.wikipedia.org/wiki/Works_council">works council</a>.<br />
<a name='more'></a><br />
<div class="MsoNormal">
<b>In-country
Collections<o:p></o:p></b></div>
<div class="MsoNormal">
Many countries, works councils, and jurisdictions now
require that the collection of electronically stored information (ESI) be done
from within the borders of the country where that data is stored and its
employees work. We have seen inside counsel in Mexican and Brazilian companies
who don’t want their ESI to leave Mexico or Brazil. We often work and sit on
panels—such as the <a href="https://www.multisoftevents.com/ACCAM13/programlisting.aspx?__utma=236250769.753835912.1374590987.1377653149.1380046182.6&__utmb=236250769.1.10.1380046182&__utmc=236250769&__utmx=-&__utmz=236250769.1377653149.5.5.utmcsr=google%7Cutmccn=(organic)%7Cutmcmd=organic%7Cutmctr=dominique%20evans%20association%20of%20%20corporate%20counsel&__utmv=-&__utmk=242543553">upcoming
Overcoming EU Data Privacy Challenges in Ediscovery</a> at the Association for
Corporate Counsel Annual Meeting in Los Angeles—with <a href="https://twitter.com/dominicjaar">Dominic Jaar</a> of KPMG-Canada to
discuss this very topic. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
An expert on Safe Harbor and cross-border e-discovery
challenges, Jaar and his team help many European companies with their
e-discovery by making use of Canada’s status as a virtual “data Switzerland” or
a type of “discovery hub” for Safe Harbor compliance because its data-privacy
laws are much closer to those of the EU than those of the U.S. The panel will
also include Judge Shira Scheindlin from the U.S. District Court, S.D.N.Y., and
David Goodis from the Office of the Information and Privacy Commissioner of
Ontario.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Situated in the heart of a safe zone for European data, KPMG
<a href="http://www.encase.com/resources/Pages/doclib/Document-Library/How-KPMG-Uses-EnCase-Tools.aspx">makes use of EnCase® eDiscovery</a> to speed
and simplify the collection and review of data from around the globe. EnCase
eDiscovery has a unique “hybrid” architecture, which allows U.S. litigants to
collect their European employees’ data remotely from Canada, cull that data in
Canada, and then take advantage of the EnCase eDiscovery Review private cloud capabilities
to review the case and its relevant ESI collaboratively from various points
around the globe. <o:p></o:p></div>
<div class="MsoNormal">
<b><br /></b></div>
<div class="MsoNormal">
<b>Collect, Cull, then
Launch Private-cloud Review <o:p></o:p></b></div>
<div class="MsoNormal">
In fact, any corporation can perform collections “in
country” to meet data-privacy regulations with EnCase eDiscovery. Many of our
customers collect inside their national boundaries and then put the small
amount that must be reviewed into a private cloud. Overall, these capabilities
minimize the amount of data for which they must gain employees’ consent before
sending to the U.S. for processing and analysis.<o:p></o:p></div>
<br />
<div class="MsoNormal">
<b>How do you perform
international e-discovery collection?</b> We welcome notes on your own best
practices in the Comments section below. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<i>Chris Kruse is the Vice President, E-Discovery at Guidance Software.</i></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1547435407682790391.post-73278392794512325892013-08-07T13:46:00.000-07:002013-10-03T15:28:44.082-07:00Judge Grimm Goes Social<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxVSYVPTjBNDjhLchMXQwl0-ca1Ssi1Yjxi-NBQPdakJJSlMeI6Fi8NVonSimJz99KuU0dJygFwB-gIRtWljtnRf9BEgZRt9kXTv0MFLRi2wJRpv40Bflhkv4ln37delQwjHodWzJGbvo/s1600/judge+grimm.jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxVSYVPTjBNDjhLchMXQwl0-ca1Ssi1Yjxi-NBQPdakJJSlMeI6Fi8NVonSimJz99KuU0dJygFwB-gIRtWljtnRf9BEgZRt9kXTv0MFLRi2wJRpv40Bflhkv4ln37delQwjHodWzJGbvo/s320/judge+grimm.jpg" width="213" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Paul W. Grimm, United States District Judge</td></tr>
</tbody></table>
<author>Bryant Bell</author><br />
<br />Judge Grimm is a judicial superstar when it comes to
e-discovery. His opinions have helped shape our interpretation of digital data
as evidence, and he continues to be on the forefront of issues regarding ESI.
He has yet again stepped to the plate to address a simmering e-discovery issue.
In a recent article he provides thorough analysis and guidance on social media
and the evidentiary authentication as an important development for social-media
evidence discovery. Judge Grimm succinctly summarizes his article as follows:<br />
<div class="MsoNormal">
<o:p></o:p></div>
<br />
<i>Given the ubiquitous use of digital devices to communicate on social media sites, there is little chance that such evidence will cease to be highly relevant in either criminal or civil cases... Hopefully, this Article can shed some light on the nature of the confusion and offer useful suggestions on how to approach the authentication of social media evidence. It is a near certainty that the public appetite for use of social media sites is unlikely to abate, and it is essential for courts and lawyers to do a better job in offering and admitting this evidence. We hope that reading this Article will be their first step toward this goal.</i><br />
<a name='more'></a><br />
<div class="MsoNormal">
We all know that social media is growing and that the
upcoming generations are embracing this as a normal method of communication.
Just as we had to establish the methodology for admission of e-mail as
evidence, social media will go through the same rigor. There is no doubt that
this article will help set standards and raise the awareness of offering and
admitting social media evidence. The 29-page article is available to
subscribers to LexisNexis and Westlaw, and non-subscribers can purchase the
article.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
Highlights of Judge Grimm’s piece include:<o:p></o:p></div>
<div class="MsoNormal">
</div>
<ul>
<li>A "checklist for authentication" and a thorough discussion of the perils of relying on mere screen printouts of social media and other internet evidence</li>
<li>Highlights of Federal Rule of Evidence 901(b)(4) (authenticating evidence through internal patterns and other "distinctive characteristics"), noting that it is "one of the most successful methods used to authenticate all evidence, including social media evidence"</li>
<li>Advice on the collection of "all of the circumstances and characteristics that apply to the social media exhibit that add up to a showing that, more likely than not, it was authored by the person that you content authored it."</li>
</ul>
<br />
<div class="MsoNormal">
Social media in the years to come will likely become as or
more important than e-mail. I would recommend to anyone that wants to stay ahead
of the e-discovery curve to read this article.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div>
<div class="MsoNormal">
Title: SYMPOSIUM: Keynote Address: Authentication of Social
Media Evidence, Honorable Paul W. Grimm</div>
</div>
Unknownnoreply@blogger.com0