SlideShare a Scribd company logo
1 of 32
Nexonia offers easy-to-manage and cost-
effective web-based business solutions.
• Expense reports, timesheets, and customer
  service solutions
• Solutions come in 161 currencies and are
  offered in English, French and Spanish
• Time, expense and billing reports are available
  in a pre-defined or customized format
  according to specific needs
AppFolio SecureDocs is a virtual data room
for sharing and storing sensitive documents
with parties outside company walls.

AppFolio, Inc. Company Basics
• Founded by the team that created and launched
  GoToMyPC and GoToMeeting
• Backed by leading technology companies and
  investors
• Web-based business software for financial and legal
  professionals
About Robert Shlachter
• Rob Shlachter is a trial lawyer who
  handles all types of complex business
  litigation with a focus on intellectual
  property, unfair competition, and
  commercial litigation.

• From 2005-2012, Rob has been
  named a top litigator multiple times in
  The National Law Journal, Chambers
  USA: America’s Leading Lawyers, Best
  Lawyers in America, Benchmark
  Litigation Guide, and Oregon Super
  Lawyers for business, intellectual
  property, and “bet-your-company”
  disputes.
Agenda

• Preservation of electronically stored information

• Data filtering, processing, and production tools

• Social media in e-discovery

• Consequences of failing to comply with e-discovery

• Non-competes, confidentiality agreements, and trade
  secret restrictions
Preservation of Electronically-
 Stored Information: Timing

               • Obligation to preserve
                 arises when a party should
                 “reasonably know that
                 evidence may be relevant
                 to anticipated litigation.”

               • Plaintiff should preserve
                 immediately. Plaintiff’s
                 burden may arise before
                 defendant’s because
                 plaintiff controls timing of
                 litigation.
Poll 1
Preservation of Electronically-Stored
    Information: Best Practices

                •   Discuss preservation of documents with
                    counsel. Counsel must oversee compliance
                    with litigation hold and monitor efforts.

                •   Broadcast the need to preserve to the
                    appropriate people (IT staff, assistants, other
                    key employees, etc.)

                •   Under counsel’s supervision, send regular
                    and frequent reminders of obligation to
                    preserve. Use a model letter from counsel
                    to send to employees.

                •   Remember that the obligation to preserve
                    extends to discovery in possession or control
                    of third parties (possibly including
                    vendors, consultants, etc.)
Data Filtering, Processing, and
 Production Tools: Electronic Evidence

• Electronic evidence can reside in a wide
  variety of locations (local hard
  drives, network servers, backup
  tapes, etc). Understand the “lay of the
  land” at the outset of the case.

• Electronic evidence can be easily altered
  or lost, even by everyday computer use.

• Preserve all relevant sources of
  evidence, including email
  retention, rotation cycles for backups, and
  re-purposing computers for new
  employees.
Data Filtering, Processing, and
       Production Tools: Data Filtering

• What is your business’s protocol for document management?
   – Does everyone follow protocol? What are the auto-delete and auto-
     backup policies? What are the regulatory requirements for
     preservation?

• Identify key custodians

• Search terms

• Review databases
   – Native, in-house, outside service
Poll 2
Data Filtering, Processing, and
  Production Tools: Processing

• Employ early case assessment (“ECA”) tools
  – Determine the source files to be analyzed;
  – Set the parameters for assessment;
  – Software automatically scans & assesses the data;
  – Review the reports generated by the software.
Data Filtering, Processing, and
  Production Tools: Production Tools

• Different applications have different
  capabilities, strengths, weaknesses, etc.

• Key issues to consider:
    – Process native documents/extracting metadata in a reliable and
      defensible manner?
    – Deduplication and grouping ‘near’ duplicates?
    – Metadata and text searching/sorting?
    – Concept clustering (grouping documents by topic and not just
      matching words)?
    – Coding and tagging databases?
    – Redacting and marking for production?
    – Creating privilege logs?
Social Media: Overview
•   Social media data is generally
    discoverable.

•   Same duty to preserve exists.

•   Social media sites
    (Facebook, MySpace, Twitter, etc.)
    pose unique issues for requesting and
    producing parties:
     – Publicly-available information vs.
       information that resides with non-
       parties.
     – Relevancy of information to claim.
     – Authenticating internet-based
       information.
     – Difficulties preserving information that
       inherently “updates” frequently.
Social Media: Best Practices

             •   Businesses should avoid or limit the
                 potential for broad-reaching discovery of
                 individual social media pages when/if
                 litigation commences.

             •   Consider limiting or monitoring at-work
                 access to social media sites.

             •   Develop clear policies for use of social
                 media at work, communicate those
                 policies clearly, enforce them, and update
                 them when needed.

             •   Consider forming a “crisis management”
                 team and plan in the event of a social
                 media error or issue. Be ready to address
                 problems quickly and appropriately.
Poll 3
Consequences For Failing To Comply
      With Discovery Obligations

• Spoliation is the “destruction
  or significant alteration of
  evidence, or the failure to
  preserve property for
  another’s use as evidence in
  pending or reasonably
  foreseeable litigation.”
  Spoliation occurs if the party
  had “some notice” that
  documents were “potentially
  relevant” to litigation before
  they were destroyed.
Consequences For Failing To
            Comply

• Electronically-stored information is especially
  vulnerable to deletion, modification, or
  corruption, and parties and counsel must take
  extra precautions to preserve this kind of
  evidence.

• Courts have an inherent authority to impose
  sanctions in response to abusive litigation
  practices and also may impose sanctions.
Consequences For Failing To
             Comply

• Not all spoliation has the same consequences:
   – Unintentional: Data destroyed during “routine, good faith
     operation of an electronic information system” is protected
     from sanctions.
   – Negligent/Reckless: Allowing routine processes to continue
     negligently or recklessly destroying information, overseeing
     inadequately litigation hold instructions, and/or insufficiently
     trying to discover relevant docs before destruction may lead to
     sanctions.
   – Willfulness, fault or bad faith: Deliberate spoliation or gross
     failure to fulfill obligations to preserve/produce electronic data
     likely will lead to sanctions and may lead to a verdict in favor of
     the opposition.
Consequences For Failing To
         Comply

           • Sanction can include:
              – Fees, fines, costs;
              – Referral of counsel to state bar;
              – Preventing the party from
                presenting evidence;
              – Adverse inference jury
                instruction;
              – Terminating the case by
                dismissal or default.
Non-Competes: Definition

• A non-compete agreement is a contract
  between an employee and
  employer, generally signed at the time of
  hiring or promoting, where the employee
  agrees not to enter into competition with the
  employer after employment is terminated for
  a defined period of time.
Non-Competes: General
              Requirements
•   Must be reasonable: The contract must be designed to protect the employer’s
    legitimate interests without overly restricting the employee’s ability to find a job in
    the field that doesn’t compete with the employer.

•   Must be made in exchange for something: In some states, a non-compete
    agreement is valid only if it is signed at the beginning of employment because the
    employer is giving something (a job) in exchange for the employee’s agreement. In
    California, non-competes generally are not allowed.

•   Must be limited in length of time: Time periods of six months to two years are
    usually enforceable. Longer periods may render an agreement invalid because it
    may be seen as too restrictive on the employee’s ability to find meaningful work.

•   Generally, must be limited in geographic scope: An employer generally cannot bar
    an employee from competing anywhere in the country or the world.
Non-Competes: Enforceability

         • In some states, if a non-compete does not
           meet one of the requirements above and is
           too restrictive on the employee, a court can
           change the contract and make it less
           restrictive and enforce it.
            – Example: A contract barring an employee
              from working in her field anywhere in the
              state may be changed to restrict the area to
              the city where the employer is based.

         • In other states, the courts cannot change
           the contract. There, the contract will be
           enforced as written or ignored completely.
Confidentiality Agreement:
              Definition
• A contract in which the parties agree that
  certain types of information that pass from
  one party to the other or that are created
  by one of the parties will remain
  confidential.

• Often used when a company or individual
  has a secret process or new product that it
  wants another company to evaluate as a
  precursor to a licensing agreement or for
  use in a new and different application.

• Now routinely used in employment
  agreements.
Confidentiality Agreement:
            Purposes

• Protect sensitive technical or commercial information
  from disclosure to others. If information is
  revealed, the injured party has cause to claim a breach
  of contract and may seek injunctive and monetary
  damages.

• Prevent forfeiture of patent rights. Public disclosure of
  an invention before patent application can be deemed
  as forfeiture of patent rights in that invention, so a
  confidentiality agreement can avoid that forfeiture.
Confidentiality Agreement:
           Key Provisions
•   Define “confidential information.”      •   Include limits on information deemed
    The agreement should set forth as           confidential. There must be some
    specifically as possible the scope of       limits on the type of information that
    information covered.                        will be deemed confidential. For
                                                example, information received by
•   Explain purpose of disclosure.              third parties, that becomes publicly
    Confidential information is revealed        known, or that is requested by order
    to another party only for a specific        of a government agency is not
    purpose. The agreement should set           considered confidential.
    forth what that agreement is.
                                            •   Set a term. The term of the
•   Incorporate “no disclosure” and “no         agreement must be long enough to
    use” provisions. The recipient must         protect the interests of the disclosing
    agree not to disclose the information       party but not so long as to unduly
    to third parties and not to use the         burden the recipient.
    information for any purpose other
    than that set forth in the agreement.
Poll 4
Trade Secret Restrictions:
       Definitions
        •   A trade secret is information, including a
            formula, pattern, compilation, program, device, method, te
            chnique, or process, that derives independent economic
            value, actual or potential, from not being generally known
            to, and not being readily ascertainable by proper means
            by, other persons who can obtain economic value from its
            disclosure or use, and is the subject of efforts that are
            reasonable under circumstances to maintain its secrecy.

        •    State laws generally recognize that, at the termination of
            employment, an employee may not take with him trade
            secrets developed by his employer and disclosed to him
            while the employer-employee relationship existed.

        •   Types of restrictions include non-competition clauses, non-
            solicitation clauses, forfeiture-for-competition clauses, and
            trade secrets clauses.
Trade Secret Restrictions:
            Limitations
• The law recognizes that a business must be protected against the
  wrongful appropriation of trade secrets by a former employee, but
  it also recognizes the right of an individual to follow and pursue the
  particular occupation for which she is best trained.

• Generally, an employee is free to take with him general skills and
  knowledge acquired during his former employment.

• To prevail in court, the employer must identify specific trade secrets
  which are in the former employee’s possession and which are at
  risk.
Trade Secret Restrictions:
          Best Practices
• Enter into a formal agreement with employees. Disclosing a trade secret
  to an employee or licensee according to an express agreement provides
  the employer broader protection than that provided by trade secret law
  alone.

• Incorporate into the agreement the appropriate clauses:
    – Non-competition clause (discussed above);
    – Non-solicitation clause (limits the former employee from soliciting company
      customers, or from convincing other company employees to join the
      employee in the new venture);
    – Forfeiture-for-competition clause (calls for the forfeiture of various benefits –
      like stock options and bonuses – if an employee failed to abide by a non-
      compete clause);
    – Trade secrets clause (defines a business’s trade secrets within the employment
      agreement, thereby saving time and expense in litigating the issue of what is a
      trade secret).
Contact Information
Robert Shlachter                          AppFolio SecureDocs
209 SW Oak Street                         50 Castilian Drive
Suite 500
                                          Goleta, CA 93117
Portland, OR 97204
Phone: (503) 227-1600                     Phone: (866) 700-7975
rshlachter@stollberne.com                 info@securedocs.com
                                          sales@securedocs.com
Nexonia
Brookfield Place, TD Canada Trust Tower
161 Bay Street, 27th Floor, PO BOX 508
Toronto, Ontario
Canada M5J2S1
Phone: 1 (800) 291-4829
                                          QUESTIONS?
help@nexonia.com
Thank You




 Confidential ©2012 AppFolio, Inc.

More Related Content

More from SecureDocs

Start with the Exit in Mind
Start with the Exit in MindStart with the Exit in Mind
Start with the Exit in MindSecureDocs
 
Trends in Tech M&A
Trends in Tech M&ATrends in Tech M&A
Trends in Tech M&ASecureDocs
 
Choosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and ManagementChoosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and ManagementSecureDocs
 
NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!SecureDocs
 
Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016SecureDocs
 
Raising Capital from Life Science Investors
Raising Capital from Life Science Investors Raising Capital from Life Science Investors
Raising Capital from Life Science Investors SecureDocs
 
Keys to Successful M&A: Transparency, Security, and Process
 Keys to Successful M&A: Transparency, Security, and Process Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessSecureDocs
 
Financial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFOFinancial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFOSecureDocs
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...SecureDocs
 
When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?SecureDocs
 
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsOptimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsSecureDocs
 
Funding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant BasicsFunding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant BasicsSecureDocs
 
Technology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and ManagementTechnology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and ManagementSecureDocs
 
The Art of the Deal- Webinar
The Art of the Deal- WebinarThe Art of the Deal- Webinar
The Art of the Deal- WebinarSecureDocs
 
Alternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar SlidesAlternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar SlidesSecureDocs
 
The Power Of The Paperless Office
The Power Of The Paperless OfficeThe Power Of The Paperless Office
The Power Of The Paperless OfficeSecureDocs
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesSecureDocs
 
Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessKeys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessSecureDocs
 

More from SecureDocs (20)

Start with the Exit in Mind
Start with the Exit in MindStart with the Exit in Mind
Start with the Exit in Mind
 
Trends in Tech M&A
Trends in Tech M&ATrends in Tech M&A
Trends in Tech M&A
 
Choosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and ManagementChoosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and Management
 
NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!
 
Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016
 
Raising Capital from Life Science Investors
Raising Capital from Life Science Investors Raising Capital from Life Science Investors
Raising Capital from Life Science Investors
 
Keys to Successful M&A: Transparency, Security, and Process
 Keys to Successful M&A: Transparency, Security, and Process Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and Process
 
Financial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFOFinancial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFO
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
 
When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?
 
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsOptimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
 
Funding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant BasicsFunding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant Basics
 
Technology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and ManagementTechnology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and Management
 
The Art of the Deal- Webinar
The Art of the Deal- WebinarThe Art of the Deal- Webinar
The Art of the Deal- Webinar
 
Alternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar SlidesAlternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar Slides
 
The Power Of The Paperless Office
The Power Of The Paperless OfficeThe Power Of The Paperless Office
The Power Of The Paperless Office
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
 
Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessKeys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and Process
 

Recently uploaded

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 

Recently uploaded (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 

How To Protect Your Company From Business Litigation Obligations And Challenges

  • 1.
  • 2. Nexonia offers easy-to-manage and cost- effective web-based business solutions. • Expense reports, timesheets, and customer service solutions • Solutions come in 161 currencies and are offered in English, French and Spanish • Time, expense and billing reports are available in a pre-defined or customized format according to specific needs
  • 3. AppFolio SecureDocs is a virtual data room for sharing and storing sensitive documents with parties outside company walls. AppFolio, Inc. Company Basics • Founded by the team that created and launched GoToMyPC and GoToMeeting • Backed by leading technology companies and investors • Web-based business software for financial and legal professionals
  • 4. About Robert Shlachter • Rob Shlachter is a trial lawyer who handles all types of complex business litigation with a focus on intellectual property, unfair competition, and commercial litigation. • From 2005-2012, Rob has been named a top litigator multiple times in The National Law Journal, Chambers USA: America’s Leading Lawyers, Best Lawyers in America, Benchmark Litigation Guide, and Oregon Super Lawyers for business, intellectual property, and “bet-your-company” disputes.
  • 5. Agenda • Preservation of electronically stored information • Data filtering, processing, and production tools • Social media in e-discovery • Consequences of failing to comply with e-discovery • Non-competes, confidentiality agreements, and trade secret restrictions
  • 6. Preservation of Electronically- Stored Information: Timing • Obligation to preserve arises when a party should “reasonably know that evidence may be relevant to anticipated litigation.” • Plaintiff should preserve immediately. Plaintiff’s burden may arise before defendant’s because plaintiff controls timing of litigation.
  • 8. Preservation of Electronically-Stored Information: Best Practices • Discuss preservation of documents with counsel. Counsel must oversee compliance with litigation hold and monitor efforts. • Broadcast the need to preserve to the appropriate people (IT staff, assistants, other key employees, etc.) • Under counsel’s supervision, send regular and frequent reminders of obligation to preserve. Use a model letter from counsel to send to employees. • Remember that the obligation to preserve extends to discovery in possession or control of third parties (possibly including vendors, consultants, etc.)
  • 9. Data Filtering, Processing, and Production Tools: Electronic Evidence • Electronic evidence can reside in a wide variety of locations (local hard drives, network servers, backup tapes, etc). Understand the “lay of the land” at the outset of the case. • Electronic evidence can be easily altered or lost, even by everyday computer use. • Preserve all relevant sources of evidence, including email retention, rotation cycles for backups, and re-purposing computers for new employees.
  • 10. Data Filtering, Processing, and Production Tools: Data Filtering • What is your business’s protocol for document management? – Does everyone follow protocol? What are the auto-delete and auto- backup policies? What are the regulatory requirements for preservation? • Identify key custodians • Search terms • Review databases – Native, in-house, outside service
  • 12. Data Filtering, Processing, and Production Tools: Processing • Employ early case assessment (“ECA”) tools – Determine the source files to be analyzed; – Set the parameters for assessment; – Software automatically scans & assesses the data; – Review the reports generated by the software.
  • 13. Data Filtering, Processing, and Production Tools: Production Tools • Different applications have different capabilities, strengths, weaknesses, etc. • Key issues to consider: – Process native documents/extracting metadata in a reliable and defensible manner? – Deduplication and grouping ‘near’ duplicates? – Metadata and text searching/sorting? – Concept clustering (grouping documents by topic and not just matching words)? – Coding and tagging databases? – Redacting and marking for production? – Creating privilege logs?
  • 14. Social Media: Overview • Social media data is generally discoverable. • Same duty to preserve exists. • Social media sites (Facebook, MySpace, Twitter, etc.) pose unique issues for requesting and producing parties: – Publicly-available information vs. information that resides with non- parties. – Relevancy of information to claim. – Authenticating internet-based information. – Difficulties preserving information that inherently “updates” frequently.
  • 15. Social Media: Best Practices • Businesses should avoid or limit the potential for broad-reaching discovery of individual social media pages when/if litigation commences. • Consider limiting or monitoring at-work access to social media sites. • Develop clear policies for use of social media at work, communicate those policies clearly, enforce them, and update them when needed. • Consider forming a “crisis management” team and plan in the event of a social media error or issue. Be ready to address problems quickly and appropriately.
  • 17. Consequences For Failing To Comply With Discovery Obligations • Spoliation is the “destruction or significant alteration of evidence, or the failure to preserve property for another’s use as evidence in pending or reasonably foreseeable litigation.” Spoliation occurs if the party had “some notice” that documents were “potentially relevant” to litigation before they were destroyed.
  • 18. Consequences For Failing To Comply • Electronically-stored information is especially vulnerable to deletion, modification, or corruption, and parties and counsel must take extra precautions to preserve this kind of evidence. • Courts have an inherent authority to impose sanctions in response to abusive litigation practices and also may impose sanctions.
  • 19. Consequences For Failing To Comply • Not all spoliation has the same consequences: – Unintentional: Data destroyed during “routine, good faith operation of an electronic information system” is protected from sanctions. – Negligent/Reckless: Allowing routine processes to continue negligently or recklessly destroying information, overseeing inadequately litigation hold instructions, and/or insufficiently trying to discover relevant docs before destruction may lead to sanctions. – Willfulness, fault or bad faith: Deliberate spoliation or gross failure to fulfill obligations to preserve/produce electronic data likely will lead to sanctions and may lead to a verdict in favor of the opposition.
  • 20. Consequences For Failing To Comply • Sanction can include: – Fees, fines, costs; – Referral of counsel to state bar; – Preventing the party from presenting evidence; – Adverse inference jury instruction; – Terminating the case by dismissal or default.
  • 21. Non-Competes: Definition • A non-compete agreement is a contract between an employee and employer, generally signed at the time of hiring or promoting, where the employee agrees not to enter into competition with the employer after employment is terminated for a defined period of time.
  • 22. Non-Competes: General Requirements • Must be reasonable: The contract must be designed to protect the employer’s legitimate interests without overly restricting the employee’s ability to find a job in the field that doesn’t compete with the employer. • Must be made in exchange for something: In some states, a non-compete agreement is valid only if it is signed at the beginning of employment because the employer is giving something (a job) in exchange for the employee’s agreement. In California, non-competes generally are not allowed. • Must be limited in length of time: Time periods of six months to two years are usually enforceable. Longer periods may render an agreement invalid because it may be seen as too restrictive on the employee’s ability to find meaningful work. • Generally, must be limited in geographic scope: An employer generally cannot bar an employee from competing anywhere in the country or the world.
  • 23. Non-Competes: Enforceability • In some states, if a non-compete does not meet one of the requirements above and is too restrictive on the employee, a court can change the contract and make it less restrictive and enforce it. – Example: A contract barring an employee from working in her field anywhere in the state may be changed to restrict the area to the city where the employer is based. • In other states, the courts cannot change the contract. There, the contract will be enforced as written or ignored completely.
  • 24. Confidentiality Agreement: Definition • A contract in which the parties agree that certain types of information that pass from one party to the other or that are created by one of the parties will remain confidential. • Often used when a company or individual has a secret process or new product that it wants another company to evaluate as a precursor to a licensing agreement or for use in a new and different application. • Now routinely used in employment agreements.
  • 25. Confidentiality Agreement: Purposes • Protect sensitive technical or commercial information from disclosure to others. If information is revealed, the injured party has cause to claim a breach of contract and may seek injunctive and monetary damages. • Prevent forfeiture of patent rights. Public disclosure of an invention before patent application can be deemed as forfeiture of patent rights in that invention, so a confidentiality agreement can avoid that forfeiture.
  • 26. Confidentiality Agreement: Key Provisions • Define “confidential information.” • Include limits on information deemed The agreement should set forth as confidential. There must be some specifically as possible the scope of limits on the type of information that information covered. will be deemed confidential. For example, information received by • Explain purpose of disclosure. third parties, that becomes publicly Confidential information is revealed known, or that is requested by order to another party only for a specific of a government agency is not purpose. The agreement should set considered confidential. forth what that agreement is. • Set a term. The term of the • Incorporate “no disclosure” and “no agreement must be long enough to use” provisions. The recipient must protect the interests of the disclosing agree not to disclose the information party but not so long as to unduly to third parties and not to use the burden the recipient. information for any purpose other than that set forth in the agreement.
  • 28. Trade Secret Restrictions: Definitions • A trade secret is information, including a formula, pattern, compilation, program, device, method, te chnique, or process, that derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and is the subject of efforts that are reasonable under circumstances to maintain its secrecy. • State laws generally recognize that, at the termination of employment, an employee may not take with him trade secrets developed by his employer and disclosed to him while the employer-employee relationship existed. • Types of restrictions include non-competition clauses, non- solicitation clauses, forfeiture-for-competition clauses, and trade secrets clauses.
  • 29. Trade Secret Restrictions: Limitations • The law recognizes that a business must be protected against the wrongful appropriation of trade secrets by a former employee, but it also recognizes the right of an individual to follow and pursue the particular occupation for which she is best trained. • Generally, an employee is free to take with him general skills and knowledge acquired during his former employment. • To prevail in court, the employer must identify specific trade secrets which are in the former employee’s possession and which are at risk.
  • 30. Trade Secret Restrictions: Best Practices • Enter into a formal agreement with employees. Disclosing a trade secret to an employee or licensee according to an express agreement provides the employer broader protection than that provided by trade secret law alone. • Incorporate into the agreement the appropriate clauses: – Non-competition clause (discussed above); – Non-solicitation clause (limits the former employee from soliciting company customers, or from convincing other company employees to join the employee in the new venture); – Forfeiture-for-competition clause (calls for the forfeiture of various benefits – like stock options and bonuses – if an employee failed to abide by a non- compete clause); – Trade secrets clause (defines a business’s trade secrets within the employment agreement, thereby saving time and expense in litigating the issue of what is a trade secret).
  • 31. Contact Information Robert Shlachter AppFolio SecureDocs 209 SW Oak Street 50 Castilian Drive Suite 500 Goleta, CA 93117 Portland, OR 97204 Phone: (503) 227-1600 Phone: (866) 700-7975 rshlachter@stollberne.com info@securedocs.com sales@securedocs.com Nexonia Brookfield Place, TD Canada Trust Tower 161 Bay Street, 27th Floor, PO BOX 508 Toronto, Ontario Canada M5J2S1 Phone: 1 (800) 291-4829 QUESTIONS? help@nexonia.com
  • 32. Thank You Confidential ©2012 AppFolio, Inc.