SlideShare a Scribd company logo
1 of 34
New York, USA

monique@altheimlaw.com
  www.altheimlaw.com
Mind the Gap: Bridging U.S.
Cross-border E-discovery and EU
Data Protection Obligations
Overview

• The Catch 22 U.S. Discovery –
  E.U. Data Protection Conundrum

• Imminent changes of the
  proposed EU regulation affecting
  cross-border discovery
1. The Catch 22 U.S. Discovery – E.U.
   Data Protection Conundrum

  • U.S. Discovery Obligations:

  1.Duty to disclose (Rule 26, FRCP)
  2.Duty to preserve and Legal Hold
  3.Sanctions for Non-Compliance
• Do US Discovery Obligations Apply to
Companies Established outside the US?
YES
Extra-territorial Application of US Discovery
Obligation (Rule 34, FRCP) confirmed by case law

  •    Rule 34 FRCP:
         (a) In General. A party may serve on any other
       party a request within the scope of Rule 26(b):
          to produce and permit the requesting party or
      its representative to inspect, copy, test, or sample
      the following items in the responding party's
      possession, custody, or control
But, what about the Hague Evidence
Convention?


  • Request under The Hague Convention on
    the Taking of Evidence Abroad in Civil or
    Commercial Matters

    or

  • US Court Order under Rule 34 FRCP?
Aérospatiale            (Société Nationale Industrielle Aérospatiale v
United States District Court, 482 U.S. 522, 544 n.28 )(1987)

       Court has option to order discovery under FRCP,
       despite Hague Evidence Convention.

   However, “International Comity” demands following balancing test
     to decide whether Hague Convention is applicable:

       1) the importance to the litigation of the information requested;
       2) the degree of specificity of request; (3) whether the
       information originated in the United States; (4) the availability of
       alternative means of securing the information; (5) the extent to
       which non-compliance would undermine the interests of the
       United States or compliance with the request would undermine
       the interests of a foreign sovereign nation.




   •
Catch 22 Conflict of Obligations for Companies
Established in the EU and Subject to U.S.
Discovery
  • Which obligations to comply with: local data protection
    obligations or US discovery obligations?

  • Proposed Solutions:

    Art. 29 WP 158 on Pre-Trial Discovery for Cross Border Civil
    Litigation

    The Sedona Conference International Principles on
    Discovery, Disclosure & Data Protection
2. Imminent changes of the proposed
   EU regulation affecting cross-border
   discovery



  All changes will affect data controllers/processors involved
     in cross-border discovery
• Processing




  New Rules for Processors (art. 26). Ex. Processors need
  consent of controller to appoint sub-processor.

  Consent of data subject: from “freely given, specific and
  informed” to “freely given, specific, informed and explicit”
  Limitation of use of consent as basis for processing when
  significant imbalance of power. (employment context)
• Transfer to third countries: (art. 40-44)

  Adequacy: Commission may design separate sectors as
  adequate.



  BCRs expressly mentioned. Includes BCRs for processors.



  Standard Data Protection Clauses don’t need authorization.

  Non-standard Contractual Clauses with authorization.
• Transfer to third countries: (art. 40-44)



  Is Safe Harbor safe? Yes.

  Legitimate interest : no frequent & massive transfers; data
  controllers & processors must provide documentation of
  proper safeguards.

  Non-Legally Binding Instrument- with authorization. (art.
  42 (5))
@Eudiscovery and @MoniqueAltheim
M. James Daley
                   M. James Daley, Esq., CIPP/US
                   Daley & Fey LLP



•   Partner, Daley & Fey LLP – over 30 years of complex litigation
    experience
•   Founder and Chair, The Sedona Conference® Working Group on
    International Discovery, Disclosure and Data Protection
•   Technologist – Masters in Management of Information Systems
•   Certified Information Privacy Professional (CIPP/US)
•   Senior Editor, The Sedona Conference® International Principles on
    Discovery, Disclosure and Data Protection (2011)
•   Editor-in Chief, The Sedona Conference® Framework for Analysis of
    Cross-Border Discovery Conflicts (2008)
                                                                   16
Sedona International Principles
4
    2011 Sedona International Principles

    The Sedona Conference International Principles on
         Discovery, Disclosure & Data Protection
    Who    •   Created by international experts in Working Group 6
           •   Addressed to courts, private parties, counsel and
               data controllers
    What   6 principles that address discovery of protected data

    Where Worldwide
    Why    Provide guidance where multiple jurisdictions impose
           conflicting duties to produce and protect data

    When   Released December 2011
2011 Sedona Conference Principles
1. With regard to data that is subject to preservation,
   disclosure, or discovery, courts and parties should
   demonstrate due respect to the Data Protection Laws
   of any foreign sovereign and the interests of any
   person who is subject to or benefits from such laws.
2. Where full compliance with both Data Protection Laws
   and preservation, disclosure, and discovery
   obligations presents a conflict, a party’s conduct
   should be judged by a court or data protection
   authority under a standard of good faith and
   reasonableness.
3. Preservation or discovery of Protected Data should be
   limited in scope to that which is relevant and
   necessary to support any party’s claim or defense in
   order to minimize conflicts of law and impact on the
   Data Subject.
2011 Sedona Conference Principles
4. Where a conflict exists between Data Protection Laws
   and preservation, disclosure, or discovery obligations,
   a stipulation or court order should be employed to
   protect Protected Data and minimize the conflict.
5. A Data Controller subject to preservation, disclosure,
   or discovery obligations should be prepared to
   demonstrate that data protection obligations have
   been addressed and that appropriate data protection
   safeguards have been instituted.
6. Data Controllers should retain Protected Data only as
   long as necessary to satisfy legal or business needs.
   While a legal action is pending or remains reasonably
   anticipated, Data Controllers should preserve relevant
   information, including relevant Protected Data, with
   appropriate data safeguards.
Framework for Cross-Border
       Discovery
2013 International Conference


                   The Fifth Annual Sedona
                 International Conference®
                       on Cross-Border
                  eDiscovery, eDisclosure &
                         Data Privacy

                     June 19-21, 2013
                    Zurich, Switzerland
E-Discovery – the EU Data
    Protection Authorities‘
          approach
                   Breakout Session
     Mind the Gap: Bridging U.S. Cross-border E-
                        discovery
         and EU Data Protection Obligations
                 Dr. Alexander Dix, LL.M.
        Berlin Commissioner for Data Protection
               and Freedom of Information
      IAPP Europe Data Protection Congress 2012
                        15.11.2012
                         Brussels
16.11.12        ©Alexander Dix          23
Overview
    • Focus on transatlantic civil law
      suits

    • Dialogue between Sedona and Art.
      29 WP

    • The latest response from Europe

    • Draft General Data Protection
      Regulation – any new ideas on
      transnational discovery ?

16.11.12       ©Alexander Dix    24
Focus on transatlantic
       civil law suits
• Discovery requests by LEAs (e.g. DoJ) and
  administrative bodies (SEC) covered by
  mutual legal assistance treaties (e.g. EU-
  US)

• Procedures of MLA-treaties should be
  observed, no direct requests to controllers
  in the EU

• Focus here: transatlantic pre-trial
  discovery in civil law suits


16.11.12       ©Alexander Dix      25
Dialogue between The Sedona
Conference and Art. 29 Working
            Party
• The Sedona Conference (TSC) Framework
  for Analysis of Cross-Border Discovery
  Conflicts (2008)
• Art. 29 Working Party WP 158 on pre-trial
  dicovery for cross-border civil litigation
  (2009)
   http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/
   2009/wp158_en.pdf
• TSC International Principles on Discovery,
  Disclosure and Data Protection (2011)
16.11.12            ©Alexander Dix           26
The latest response from
            Europe
• Art. 29 Working Party has welcomed the
  International Principles, especially their
  emphasis on
  - necessity, proportionality and a phased
   approach to discovery (Principle 3),
  - the need to minimize the disclosure of
   personal data (Principle 3),
  - encouraging organizations to
  implement privacy by design (Principle
  6).

16.11.12      ©Alexander Dix     27
Quotes from the TSC International
           Principles


    • Highlighting the importance of a
      restrictive data retention policy in vow
      of the fact that „many organizations
      worldwide have become data hoarders“

    • Pointing to serious legal risks which may
      arise from the „over-retention of
      information“

16.11.12        ©Alexander Dix      28
Remaining issues

    • Independence of EU DPAs (COM ./.
      Germany, Austria) and the US courts

    • International Principles without binding
      effect

    • HR and customer data

    • Telecommunications secrecy

16.11.12        ©Alexander Dix      29
Cloud Computing

  • Discovery in the Cloud (p. v TSC
    Principles)

  • Cf. Sopot-Memorandum of the
    International Working Group on Data
    Protection in Telecommunications
    („Berlin Group“) 2012
     www.datenschutz-berlin.de/content/europa-
     international/international-working-group-on-data-
     protection-in-telecommunications-iwgdpt/working-
     papers-and-common-positions-adopted-by-the-working-
     group

16.11.12           ©Alexander Dix          30
EU Draft General Data
       Protection Regulation
• „Leaked version“ v. 29.11.2011 contained
  restrictive rule on discovery (Art. 42)
• Apparently deleted at the request of US
  Government
• Patriot Act-issue is addressed in recital 90 of
  the current draft (public interest)
• Legal situation would remain unchanged
  should the Draft become law (cf. Art. 44
  Abs. 1 e) of the Draft Regulation and Art. 26
  Abs. 1 d) of Directive 95/46)
16.11.12        ©Alexander Dix      31
Summing up (1)

    • Despite basic differences between legal
      cultures on both sides of the Atlantic
      practical ways and means to bridge the
      gap between European data protection
      law and US discovery are available
    • European companies should make use
      of all possibilities of US procedural law
      to comply with their obligations under
      EU data protection law
    • Restrictive retention policies are key
16.11.12        ©Alexander Dix      32
Summing up (2)

• Get the company‘s Data Protection Officer involved
  as early as possible
• Point to restrictions under Data Protection Laws as
  early as possible (even prior to the meet and
  confer stage)
• Highlight the risk of criminal prosecution when
  processing data falling under telecommunications
  secrecy or patients‘ confidentiality
• Phased culling in the country of origin
• Check the requirements for exporting data to third
  countries
• Apply for a protective court order


16.11.12        ©Alexander Dix         33
Thank you – any questions
                  ?

             dix@privacy.de




16.11.12      ©Alexander Dix   34

More Related Content

What's hot

Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor WebinarEthisphere
 
Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kate Chan
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...Data Sharing Principles and Legal Interoperability for Essential Biodiversity...
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...agosti
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataSchellman & Company
 
Constitutional Privacy and Data Protection in the EU
Constitutional Privacy and Data Protection in the EUConstitutional Privacy and Data Protection in the EU
Constitutional Privacy and Data Protection in the EUDavid Erdos
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesKarl Larson
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...TrustArc
 
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...TrustArc
 
Comparing EU and Council of Europe Data Protection Standards in the Context o...
Comparing EU and Council of Europe Data Protection Standards in the Context o...Comparing EU and Council of Europe Data Protection Standards in the Context o...
Comparing EU and Council of Europe Data Protection Standards in the Context o...David Erdos
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementGACC_Midwest
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionDavid Erdos
 
EU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTeEU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTeTrustArc
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowDavid Erdos
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in ResearchMarlon Domingus
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer WorkshopJohn Jablonski
 

What's hot (18)

Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...Data Sharing Principles and Legal Interoperability for Essential Biodiversity...
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU Data
 
Constitutional Privacy and Data Protection in the EU
Constitutional Privacy and Data Protection in the EUConstitutional Privacy and Data Protection in the EU
Constitutional Privacy and Data Protection in the EU
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property Issues
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
 
Comparing EU and Council of Europe Data Protection Standards in the Context o...
Comparing EU and Council of Europe Data Protection Standards in the Context o...Comparing EU and Council of Europe Data Protection Standards in the Context o...
Comparing EU and Council of Europe Data Protection Standards in the Context o...
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
EU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTeEU Privacy Shield - Understanding the New Framework from TRUSTe
EU Privacy Shield - Understanding the New Framework from TRUSTe
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
 

Viewers also liked

Three Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on FacebookThree Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on FacebookAltheimPrivacy
 
Day ın the Lıfe Template
Day ın the Lıfe TemplateDay ın the Lıfe Template
Day ın the Lıfe TemplateNoel Hatch
 
Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013Mary Howrey
 
How to answer the 64 toughest interview questions
How to answer the 64 toughest interview questionsHow to answer the 64 toughest interview questions
How to answer the 64 toughest interview questionsKarunakar Singh Thakur
 
Brazil: Nation Report
Brazil: Nation ReportBrazil: Nation Report
Brazil: Nation Reportmeggss24
 
Nation Report: Brazil
Nation Report: BrazilNation Report: Brazil
Nation Report: Brazilmeggss24
 
Modern Latin America
Modern Latin AmericaModern Latin America
Modern Latin America03ram
 
Applying technology to school
Applying technology to schoolApplying technology to school
Applying technology to schoolAditi Sameer
 
2011 annual audited financial statements
2011 annual audited financial statements2011 annual audited financial statements
2011 annual audited financial statementsProphecy Corp
 
Cafeblog.hu webdesign workshop
Cafeblog.hu webdesign workshop Cafeblog.hu webdesign workshop
Cafeblog.hu webdesign workshop Zsuzsanna Tóth
 
Transformed by You - Process
Transformed by You - ProcessTransformed by You - Process
Transformed by You - ProcessNoel Hatch
 
The fifth p, student version
The fifth p, student versionThe fifth p, student version
The fifth p, student versionRonald Voorn
 
Brainstorming Session - July 6, 2011
Brainstorming Session - July 6, 2011Brainstorming Session - July 6, 2011
Brainstorming Session - July 6, 2011ladieslearningcode
 
Nation of America (Mexico)
Nation of America (Mexico)Nation of America (Mexico)
Nation of America (Mexico)03ram
 
Shared Vision of a World-Class Neighborhood
Shared Vision of a World-Class Neighborhood Shared Vision of a World-Class Neighborhood
Shared Vision of a World-Class Neighborhood Chandra Vikash
 
Day ın the Lıfe - Example
Day ın the Lıfe - ExampleDay ın the Lıfe - Example
Day ın the Lıfe - ExampleNoel Hatch
 
Power is Everywhere
Power is EverywherePower is Everywhere
Power is EverywhereNoel Hatch
 
Day ın the Lıfe Example
Day ın the Lıfe ExampleDay ın the Lıfe Example
Day ın the Lıfe ExampleNoel Hatch
 
Metro lite guided tour2.0
Metro lite guided tour2.0Metro lite guided tour2.0
Metro lite guided tour2.0Chandra Vikash
 

Viewers also liked (20)

Three Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on FacebookThree Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on Facebook
 
Day ın the Lıfe Template
Day ın the Lıfe TemplateDay ın the Lıfe Template
Day ın the Lıfe Template
 
Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013
 
How to answer the 64 toughest interview questions
How to answer the 64 toughest interview questionsHow to answer the 64 toughest interview questions
How to answer the 64 toughest interview questions
 
Brazil: Nation Report
Brazil: Nation ReportBrazil: Nation Report
Brazil: Nation Report
 
Nation Report: Brazil
Nation Report: BrazilNation Report: Brazil
Nation Report: Brazil
 
Modern Latin America
Modern Latin AmericaModern Latin America
Modern Latin America
 
Applying technology to school
Applying technology to schoolApplying technology to school
Applying technology to school
 
2011 annual audited financial statements
2011 annual audited financial statements2011 annual audited financial statements
2011 annual audited financial statements
 
Cafeblog.hu webdesign workshop
Cafeblog.hu webdesign workshop Cafeblog.hu webdesign workshop
Cafeblog.hu webdesign workshop
 
Transformed by You - Process
Transformed by You - ProcessTransformed by You - Process
Transformed by You - Process
 
The fifth p, student version
The fifth p, student versionThe fifth p, student version
The fifth p, student version
 
Brainstorming Session - July 6, 2011
Brainstorming Session - July 6, 2011Brainstorming Session - July 6, 2011
Brainstorming Session - July 6, 2011
 
Nation of America (Mexico)
Nation of America (Mexico)Nation of America (Mexico)
Nation of America (Mexico)
 
Shared Vision of a World-Class Neighborhood
Shared Vision of a World-Class Neighborhood Shared Vision of a World-Class Neighborhood
Shared Vision of a World-Class Neighborhood
 
Day ın the Lıfe - Example
Day ın the Lıfe - ExampleDay ın the Lıfe - Example
Day ın the Lıfe - Example
 
Power is Everywhere
Power is EverywherePower is Everywhere
Power is Everywhere
 
Day ın the Lıfe Example
Day ın the Lıfe ExampleDay ın the Lıfe Example
Day ın the Lıfe Example
 
Metro lite guided tour2.0
Metro lite guided tour2.0Metro lite guided tour2.0
Metro lite guided tour2.0
 
LinkedIn for Lawyers
LinkedIn for Lawyers LinkedIn for Lawyers
LinkedIn for Lawyers
 

Similar to Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obligations

Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful EnterpriseEric Kavanagh
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryJ. David Morris
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastLogikcull.com
 
Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Logikcull.com
 
UN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy IssuesUN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy IssuesKevin Pomfret
 
UN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy IssuesUN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy IssuesKevin Pomfret
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshareFreddy Ntwari
 
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?David Erdos
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldParsons Behle & Latimer
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborGayle Gorvett
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 

Similar to Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obligations (20)

Sible 09
Sible 09Sible 09
Sible 09
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscovery
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 
Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
 
UN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy IssuesUN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy Issues
 
UN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy IssuesUN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy Issues
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshare
 
E Discovery
E DiscoveryE Discovery
E Discovery
 
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 

More from AltheimPrivacy

Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)AltheimPrivacy
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationAltheimPrivacy
 
Ripped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data PrivacyRipped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data PrivacyAltheimPrivacy
 
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsHow to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsAltheimPrivacy
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...AltheimPrivacy
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Facebook New Changes 2011
Facebook New Changes 2011Facebook New Changes 2011
Facebook New Changes 2011AltheimPrivacy
 

More from AltheimPrivacy (7)

Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentation
 
Ripped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data PrivacyRipped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data Privacy
 
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsHow to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Facebook New Changes 2011
Facebook New Changes 2011Facebook New Changes 2011
Facebook New Changes 2011
 

Recently uploaded

Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 

Recently uploaded (20)

Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 

Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obligations

  • 1.
  • 3. Mind the Gap: Bridging U.S. Cross-border E-discovery and EU Data Protection Obligations
  • 4. Overview • The Catch 22 U.S. Discovery – E.U. Data Protection Conundrum • Imminent changes of the proposed EU regulation affecting cross-border discovery
  • 5. 1. The Catch 22 U.S. Discovery – E.U. Data Protection Conundrum • U.S. Discovery Obligations: 1.Duty to disclose (Rule 26, FRCP) 2.Duty to preserve and Legal Hold 3.Sanctions for Non-Compliance
  • 6. • Do US Discovery Obligations Apply to Companies Established outside the US?
  • 7. YES Extra-territorial Application of US Discovery Obligation (Rule 34, FRCP) confirmed by case law • Rule 34 FRCP: (a) In General. A party may serve on any other party a request within the scope of Rule 26(b): to produce and permit the requesting party or its representative to inspect, copy, test, or sample the following items in the responding party's possession, custody, or control
  • 8. But, what about the Hague Evidence Convention? • Request under The Hague Convention on the Taking of Evidence Abroad in Civil or Commercial Matters or • US Court Order under Rule 34 FRCP?
  • 9. Aérospatiale (Société Nationale Industrielle Aérospatiale v United States District Court, 482 U.S. 522, 544 n.28 )(1987) Court has option to order discovery under FRCP, despite Hague Evidence Convention. However, “International Comity” demands following balancing test to decide whether Hague Convention is applicable: 1) the importance to the litigation of the information requested; 2) the degree of specificity of request; (3) whether the information originated in the United States; (4) the availability of alternative means of securing the information; (5) the extent to which non-compliance would undermine the interests of the United States or compliance with the request would undermine the interests of a foreign sovereign nation. •
  • 10. Catch 22 Conflict of Obligations for Companies Established in the EU and Subject to U.S. Discovery • Which obligations to comply with: local data protection obligations or US discovery obligations? • Proposed Solutions: Art. 29 WP 158 on Pre-Trial Discovery for Cross Border Civil Litigation The Sedona Conference International Principles on Discovery, Disclosure & Data Protection
  • 11. 2. Imminent changes of the proposed EU regulation affecting cross-border discovery All changes will affect data controllers/processors involved in cross-border discovery
  • 12. • Processing New Rules for Processors (art. 26). Ex. Processors need consent of controller to appoint sub-processor. Consent of data subject: from “freely given, specific and informed” to “freely given, specific, informed and explicit” Limitation of use of consent as basis for processing when significant imbalance of power. (employment context)
  • 13. • Transfer to third countries: (art. 40-44) Adequacy: Commission may design separate sectors as adequate. BCRs expressly mentioned. Includes BCRs for processors. Standard Data Protection Clauses don’t need authorization. Non-standard Contractual Clauses with authorization.
  • 14. • Transfer to third countries: (art. 40-44) Is Safe Harbor safe? Yes. Legitimate interest : no frequent & massive transfers; data controllers & processors must provide documentation of proper safeguards. Non-Legally Binding Instrument- with authorization. (art. 42 (5))
  • 16. M. James Daley M. James Daley, Esq., CIPP/US Daley & Fey LLP • Partner, Daley & Fey LLP – over 30 years of complex litigation experience • Founder and Chair, The Sedona Conference® Working Group on International Discovery, Disclosure and Data Protection • Technologist – Masters in Management of Information Systems • Certified Information Privacy Professional (CIPP/US) • Senior Editor, The Sedona Conference® International Principles on Discovery, Disclosure and Data Protection (2011) • Editor-in Chief, The Sedona Conference® Framework for Analysis of Cross-Border Discovery Conflicts (2008) 16
  • 18. 4 2011 Sedona International Principles The Sedona Conference International Principles on Discovery, Disclosure & Data Protection Who • Created by international experts in Working Group 6 • Addressed to courts, private parties, counsel and data controllers What 6 principles that address discovery of protected data Where Worldwide Why Provide guidance where multiple jurisdictions impose conflicting duties to produce and protect data When Released December 2011
  • 19. 2011 Sedona Conference Principles 1. With regard to data that is subject to preservation, disclosure, or discovery, courts and parties should demonstrate due respect to the Data Protection Laws of any foreign sovereign and the interests of any person who is subject to or benefits from such laws. 2. Where full compliance with both Data Protection Laws and preservation, disclosure, and discovery obligations presents a conflict, a party’s conduct should be judged by a court or data protection authority under a standard of good faith and reasonableness. 3. Preservation or discovery of Protected Data should be limited in scope to that which is relevant and necessary to support any party’s claim or defense in order to minimize conflicts of law and impact on the Data Subject.
  • 20. 2011 Sedona Conference Principles 4. Where a conflict exists between Data Protection Laws and preservation, disclosure, or discovery obligations, a stipulation or court order should be employed to protect Protected Data and minimize the conflict. 5. A Data Controller subject to preservation, disclosure, or discovery obligations should be prepared to demonstrate that data protection obligations have been addressed and that appropriate data protection safeguards have been instituted. 6. Data Controllers should retain Protected Data only as long as necessary to satisfy legal or business needs. While a legal action is pending or remains reasonably anticipated, Data Controllers should preserve relevant information, including relevant Protected Data, with appropriate data safeguards.
  • 22. 2013 International Conference The Fifth Annual Sedona International Conference® on Cross-Border eDiscovery, eDisclosure & Data Privacy June 19-21, 2013 Zurich, Switzerland
  • 23. E-Discovery – the EU Data Protection Authorities‘ approach Breakout Session Mind the Gap: Bridging U.S. Cross-border E- discovery and EU Data Protection Obligations Dr. Alexander Dix, LL.M. Berlin Commissioner for Data Protection and Freedom of Information IAPP Europe Data Protection Congress 2012 15.11.2012 Brussels 16.11.12 ©Alexander Dix 23
  • 24. Overview • Focus on transatlantic civil law suits • Dialogue between Sedona and Art. 29 WP • The latest response from Europe • Draft General Data Protection Regulation – any new ideas on transnational discovery ? 16.11.12 ©Alexander Dix 24
  • 25. Focus on transatlantic civil law suits • Discovery requests by LEAs (e.g. DoJ) and administrative bodies (SEC) covered by mutual legal assistance treaties (e.g. EU- US) • Procedures of MLA-treaties should be observed, no direct requests to controllers in the EU • Focus here: transatlantic pre-trial discovery in civil law suits 16.11.12 ©Alexander Dix 25
  • 26. Dialogue between The Sedona Conference and Art. 29 Working Party • The Sedona Conference (TSC) Framework for Analysis of Cross-Border Discovery Conflicts (2008) • Art. 29 Working Party WP 158 on pre-trial dicovery for cross-border civil litigation (2009) http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/ 2009/wp158_en.pdf • TSC International Principles on Discovery, Disclosure and Data Protection (2011) 16.11.12 ©Alexander Dix 26
  • 27. The latest response from Europe • Art. 29 Working Party has welcomed the International Principles, especially their emphasis on - necessity, proportionality and a phased approach to discovery (Principle 3), - the need to minimize the disclosure of personal data (Principle 3), - encouraging organizations to implement privacy by design (Principle 6). 16.11.12 ©Alexander Dix 27
  • 28. Quotes from the TSC International Principles • Highlighting the importance of a restrictive data retention policy in vow of the fact that „many organizations worldwide have become data hoarders“ • Pointing to serious legal risks which may arise from the „over-retention of information“ 16.11.12 ©Alexander Dix 28
  • 29. Remaining issues • Independence of EU DPAs (COM ./. Germany, Austria) and the US courts • International Principles without binding effect • HR and customer data • Telecommunications secrecy 16.11.12 ©Alexander Dix 29
  • 30. Cloud Computing • Discovery in the Cloud (p. v TSC Principles) • Cf. Sopot-Memorandum of the International Working Group on Data Protection in Telecommunications („Berlin Group“) 2012 www.datenschutz-berlin.de/content/europa- international/international-working-group-on-data- protection-in-telecommunications-iwgdpt/working- papers-and-common-positions-adopted-by-the-working- group 16.11.12 ©Alexander Dix 30
  • 31. EU Draft General Data Protection Regulation • „Leaked version“ v. 29.11.2011 contained restrictive rule on discovery (Art. 42) • Apparently deleted at the request of US Government • Patriot Act-issue is addressed in recital 90 of the current draft (public interest) • Legal situation would remain unchanged should the Draft become law (cf. Art. 44 Abs. 1 e) of the Draft Regulation and Art. 26 Abs. 1 d) of Directive 95/46) 16.11.12 ©Alexander Dix 31
  • 32. Summing up (1) • Despite basic differences between legal cultures on both sides of the Atlantic practical ways and means to bridge the gap between European data protection law and US discovery are available • European companies should make use of all possibilities of US procedural law to comply with their obligations under EU data protection law • Restrictive retention policies are key 16.11.12 ©Alexander Dix 32
  • 33. Summing up (2) • Get the company‘s Data Protection Officer involved as early as possible • Point to restrictions under Data Protection Laws as early as possible (even prior to the meet and confer stage) • Highlight the risk of criminal prosecution when processing data falling under telecommunications secrecy or patients‘ confidentiality • Phased culling in the country of origin • Check the requirements for exporting data to third countries • Apply for a protective court order 16.11.12 ©Alexander Dix 33
  • 34. Thank you – any questions ? dix@privacy.de 16.11.12 ©Alexander Dix 34

Editor's Notes

  1. 1. Duty to disclose under Rule 26?FRCP: "parties may obtain discovery regarding any matter, not privileged, that is relevant to any party's claim or defense." The obligation of parties in a litigation to disclose all the information they have in a case so that they can effectively prepare for trial and won,t be caught by surprise by the introduction of new evidence at the trial itself, is a purely common law tradition and does not exist in countries with a civil code tradition. The obligation of parties in a litigation to disclose all the information they have in a case so that they can effectively prepare for trial and won,t be caught by surprise by the introduction of new evidence at the trial itself, is a purely common law tradition and does not exist in countries with a civil code tradition. In civil code countries, such as Europe, Latin America and other former European colonies, each party to the litigation submits its own evidence to the court in support of its case. The Judge decides whether or not to order additional evidence. Usually, one party can also request from the judge to order production of specific documents, that it suspects is in the possession of the other party, but the request must be very specific. 2. The Common Law imposes the obligation to preserve evidence from the moment that litigation is reasonably anticipated. Ex. Apple v. Samsung patent infringement case: Apple: gave Samsung a live presentation about specific patent infringement claims it had against Samsung in Aug. 2010. They sued in April 2011. Apple claimed obligation to preserve started in Aug.2010; Samsung April 2011; Crt agreed with Apple; Samsung could reasonably foresee from this presentation that litigation would follow Once the preservation duty has been triggered, the Common Law imposes an obligation to implement a "litigation hold" to insure the preservation of relevant documents. Companies' retention/ deletion policies have to be suspended and no relevant document or email may be deleted or altered. 3. Sanctions The sanctions for failure to make a required discovery and for spoliation ( destruction) of evidence are very real & serious. Judge can order dismissal of the case, can order punitive/ compensatory damages & can instruct the jury adverse inference. Ex. Apple v. Samsung case: after Apple's presentation to Samsung, Samsung issued a Litigation Hold to a number of key employees with instructions to retain all relevant email. But retention policy:,every 2 weeks, email,automatically deleted. Despite litigation hold, all emails continued to be automatically deleted. Crt found that Samsung was guilty of willful spoliation of evidence because it has failed to follow up on the litigation hold: did not train employees; did not monitor them; did not perform audits; did not reissue litigation holds regularly.the Crt ordered an adverse inference instruction, allowing the jury to presume that the lost evidence was relevant and favorable to plaintiffs. The jury ended up awarding Apple $1.049 billion in damages. Sanctions depends on judge, even within same district.
  2. What if you are a US plaintiff before a US crt product liability. Disabled bcause of side effects of a medicine. The manufactures main branch is based in Germany. Most of the data are there. You sue the co. in the US. you ask judge to issue order under Rule 34 FRCP.to compel discovery of all possibly relevant documents, so you can prove your that justice can be done? Can judge issue extra territorial order to conduct ediscovery in Germany?
  3. Case law interpretation art. 34 FRCP According to Rule 34 of the FRCP, a party may request another party to produce ESI that are in that party,s " possession, custody or control". Control does not require physical control. Contractual right of control is enough. If you have the right to demand your data, you have control. Subsidiaries, affiliates, fall under this category, as do 3rd party providers, such as cloud providers. I t all depends on the terms of the contract. There is some controversy in US case law whether there has to be a legal right to access the ESI or whether practical access is sufficient. The important principle here is that the fact that the ESI is overseas is irrelevant for this test of " possession, custody or control" . If a US employee can access ESI of an affiliate overseas on a shared network, the US company has " possession, custody and control" and the overseas ESI is discoverable on that basis
  4. Defendant will usually argue that the judge has to apply The Hague Convention; International Treaty; normally would trump Federal Rules History; The US ratified this treaty, as did many EU member states. The Hague Convention provides a procedure, where the Court of one country sends a letter of request to a designated authority of another country, requesting assistance from that authority in obtaining relevan information located within its borders. Advantages: There are a couple of advantages in using the Hague Convention: The EU recognizes it as a legal basis for transferring personal,data to the US. And it is a way to obtain production of ESI that is NOT under a party,s " possession, custody or control". But there are many problems with this procedure: Problems: • not all EU Member States are parties to the Hague Convention. (e.g. Belgium) • reservations under Article 23:“a contracting state may at the time of signature, ratification or accession declare that it will not execute letters of request issued for the purposes of obtaining pre-trial discovery of documents. Many signatory States, including France, Germany, Spain and the Netherlands have filed such reservations under Article 23. • unduly time consuming; can take more than a year. • discovery request must be very specific. Broad requests are denied. Normally, an international treaty trumps a national law.
  5. Supreme Court resolved this issue in 1987 with the landmark Aerospatiale case.. If US Crt has jurisdiction over the foreign entity (ex. Defendant in the case)..Case;Frech blocking statute; must make a case by case analysis, balancing many factors. most courts decide balancing test in favor of US; full discovery is in interest of US justice system ; exceptions: Tiffany trademark case (chinese bank of the defendant; letter from government will cooperate speedily with Hague Convention request . Tiffany (NJ) LLC v. Forbse (S.D.N.Y. May no time to go into details. Crt has choice.
  6. Assume defendant German pharmaceutical co. lost its Hague Convention defense. They invoked the strict german data protection laws. Judge applied the aerospatiale balancing test and decided that interest of injured parties in US to pursue justice is more important then German data protection laws. Ediscovery order from a US judge. mEanwhile, Varied types of data protection laws: Bank secrecy, data privacy, labor laws, blocking statutes. Defendant : Sanctions from US judge if don’t comply with ediscovery request; sanctions if do not comply with data protection laws? ..Data Privacy Laws: Laws:Art.29; prefers hague convention, but if not: recognizes discovery obligation as a legitimate interest basis for processing BUT balancing test -  data protection directive applies. Little difficult in practice. Sedona Conference: practical solution.
  7. Of course, ALL the changes of proposed regulation will apply to crosssborder discovery. what changes are of specific interest for discovery one stop shop: BCRs; transfers; makes it easier than to apply to 27 or more separate DPAs rtbf: if individual requets DC to delete his data, data controller tis obliged to o delete them, unless there is a legitimate reason to retain it: Q: will Litigation Hold be considered a “legitimate reason” to refuse deletion? In case of discovery procedures: Will be Conflict of two obligations for DC: obligation to delete & obligation to preserve.
  8. Documentation: already now good business practice Explicit: now: only sensitive data- regulation: all personal data; the opposite of implied; a statement or a clear affirmative action. Article 29 WP Opinion on the definition of consent:  “meaning an active response, oral or in writing, whereby the individual expresses his/her wish to have his/her data processed for certain purposes. Therefore, express consent cannot be obtained by the presence of a pre-ticked box. The data subject must take some positive action to signify consent and must be free not to consent.” Ex. Notice to employees that their emails will be subject to ediscovery. If employee does not consent, must call a number. NOT express consent. Express Consent= Statement of employees: I hereby agree that my personal data will be subject of ediscovery. Online, opt-in as opposed to opt-put. Note: consent never a good legal basis for processing/transfer of data in ediscovery context; difficult to obtain valid consent; data subject has right to withdraw his consent.
  9. Adequacy: Commissions delegated acts ?seperate sectors? US health & financial sectors? Hipaa & glb Safe Harbor: the Joint Statement issued by EC Vice-President Viviane Reding and U.S. Secretary of Commerce John Bryson. March 2012
“In line with the objectives of increasing trade and regulatory cooperation outlined by our leaders at the U.S.-EU Summit, the United States and the European Union reaffirm their respective commitments to the U.S.-EU Safe Harbor Framework”./DEpt of Commerce considering expanding SH to non-profit sector. Washington DC conference last March: mixed EU/Us panel on Safe Harbor: videotaped . Sanctions:will become important factor in ediscovery risk management. Compare risk of sanctions if dont disclose the data v if disclose the data.
  10. Adequacy: Commissions delegated acts ?seperate sectors? US health & financial sectors? Hipaa & glb Safe Harbor: the Joint Statement issued by EC Vice-President Viviane Reding and U.S. Secretary of Commerce John Bryson. March 2012
“In line with the objectives of increasing trade and regulatory cooperation outlined by our leaders at the U.S.-EU Summit, the United States and the European Union reaffirm their respective commitments to the U.S.-EU Safe Harbor Framework”./DEpt of Commerce considering expanding SH to non-profit sector. Washington DC conference last March: mixed EU/Us panel on Safe Harbor: videotaped . Sanctions:will become important factor in ediscovery risk management. Compare risk of sanctions if dont disclose the data v if disclose the data.
  11. Hot off the presses! Sedona is also working to provide more guidance on international discovery.
  12. 16.11.12