This document provides guidance for communicating effectively with news media and the public. It discusses how to handle interactions with reporters, the importance of transparency, and following open meeting and public records laws. Key tips include being honest, prepared, staying on message, and recognizing that all interactions could become public. Guidance is given on responding to records requests, retaining documentation, and designating records officers.
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference
Presenter: Amelia Phillips, Highline Community College
E-discovery is defined as “gathering electronically stored information (ESI) for use in litigation”. At first glance, this appears to be a straightforward statement, but upon further examination one finds that it encompasses a broad range of items. Over 90% of documents produced by companies now are electronic. Older paper files have been converted to microfiche or PDF files. Add to this email, text messages, social media (yes, even the IRS has a Facebook page) and you have an idea of the amount of information that becomes this new term called “Big Data”. Terabytes of data will soon become petabytes of data. Are we ready? Are our students prepared for this new era? E-Discovery is a field that affects not only the lawyers, but the IT support staff, and how companies do business. In this talk you will be introduced to some of the new technology in the field such as predictive coding, forensic linguistics, and social media archiving. You will also be shown some of the new tools on the market that you can use in your classrooms to prepare your students and yourself for this fast evolving arena. What does a company need to do when a litigation hold is in place? What response needs to come from the legal staff, the IT support staff, the managers, and the average employee? How does this affect the BYOD (Bring Your Own Device) policies? Which comes first - employee privacy, freedom of information or corporate security? You will walk away from this talk with a methodology to incorporate this new topic into your curriculum. You will also be given ideas of how to make this affordable for your labs, what foundations your students need, and how to deliver this in a way that appeals to the business, IT or legal oriented student. This topic affects them all. Come and find out why this is something they need to be successful in tomorrow's market.
Legal Research in the Age of Cloud ComputingNeal Axton
This presentation discusses the impact of the mass communication technologies including the Internet and Cloud Computing on the practice of law and legal research. This presentation was given the Advanced Legal Research class at William Mitchell College of Law in St. Paul, Minnesota of August 23, 2013 by Neal R. Axton, JD, MLIS.
Media law for community journalists and bloggersjtownend
A presentation given to participants at the Community Journalism Conference, Cardiff University, 16 January 2013, setting out the legal landscape for online publishers and asking for responses to a survey
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Open Government Data: Understanding Open Access vs. Public DomainJennifer C. Boettcher
By Jennifer C. Boettcher, October 25, 2019
at Everything Counts: Making Sense of Government Data and Statistics: 2019 Documents Association of New Jersey Conference
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference
Presenter: Amelia Phillips, Highline Community College
E-discovery is defined as “gathering electronically stored information (ESI) for use in litigation”. At first glance, this appears to be a straightforward statement, but upon further examination one finds that it encompasses a broad range of items. Over 90% of documents produced by companies now are electronic. Older paper files have been converted to microfiche or PDF files. Add to this email, text messages, social media (yes, even the IRS has a Facebook page) and you have an idea of the amount of information that becomes this new term called “Big Data”. Terabytes of data will soon become petabytes of data. Are we ready? Are our students prepared for this new era? E-Discovery is a field that affects not only the lawyers, but the IT support staff, and how companies do business. In this talk you will be introduced to some of the new technology in the field such as predictive coding, forensic linguistics, and social media archiving. You will also be shown some of the new tools on the market that you can use in your classrooms to prepare your students and yourself for this fast evolving arena. What does a company need to do when a litigation hold is in place? What response needs to come from the legal staff, the IT support staff, the managers, and the average employee? How does this affect the BYOD (Bring Your Own Device) policies? Which comes first - employee privacy, freedom of information or corporate security? You will walk away from this talk with a methodology to incorporate this new topic into your curriculum. You will also be given ideas of how to make this affordable for your labs, what foundations your students need, and how to deliver this in a way that appeals to the business, IT or legal oriented student. This topic affects them all. Come and find out why this is something they need to be successful in tomorrow's market.
Legal Research in the Age of Cloud ComputingNeal Axton
This presentation discusses the impact of the mass communication technologies including the Internet and Cloud Computing on the practice of law and legal research. This presentation was given the Advanced Legal Research class at William Mitchell College of Law in St. Paul, Minnesota of August 23, 2013 by Neal R. Axton, JD, MLIS.
Media law for community journalists and bloggersjtownend
A presentation given to participants at the Community Journalism Conference, Cardiff University, 16 January 2013, setting out the legal landscape for online publishers and asking for responses to a survey
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Open Government Data: Understanding Open Access vs. Public DomainJennifer C. Boettcher
By Jennifer C. Boettcher, October 25, 2019
at Everything Counts: Making Sense of Government Data and Statistics: 2019 Documents Association of New Jersey Conference
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Canadian Copyright Law, Technology and Cultural Management CAMT
This seminar will provide cultural managers with a broad overview of the evolving legal and business issues facing copyright owners who wish to exploit and protect their property in the expanding digital, web-based, techonolgically-enabled universe. It will also provide a targeted framework for assessing the short and long term legal and business risks and benefits arising from the promotion, commercialization and enforcement of their copyright over the Internet among an increasingly demanding consumer base. Created by Elise Orenstein for the 2008 Technology in the Arts: Canada Conference.
This is a copy of my presentation at the 2013 VT Family Law Conference. This lecture discusses the growing importance of electronic evidence in divorce litigation, and provides suggestions on how to locate, recover, and preserve emails, social media posts, pictures, and computer files. It also covers the legal risks that attorneys and their clients face if they are too aggressive in pursuing electronic evidence.
"Navigating Disability Law: The 30,000-Foot View" was presented at the Center for Health Literacy Conference 2011: Plain Talk in Complex Times by Cary LaCheen, JD, Senior Attorney, National Center for Law and Economic Justice.
Description: This session will provide a forum for an audience-driven discussion about the legal obligations to communicate and provide information in a way that is accessible to individuals with disabilities. The presenter will answer your questions about disability law, what "reasonable" accommodation means, and where to go for additional resources.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Social media is slowly changing the practice of law. Join our panel of experts as they discuss everything from social media in eDiscovery to the challenges of interpreting emoji.
Attendees will learn:
--Best practices for preserving and producing social media evidence in litigation.
--How social media is working its way into the discovery process and how courts are reacting.
--Ethical pitfalls that can arise when dealing with social media.
--How emojis are changing the legal practice today and how they’ll continue to alter the profession in the future.
Let Robert B. Fitzpatrick, principal of Robert B. Fitzpatrick, PLLC, walk you through the ins and outs of hiring (or being hired) and firing (or being fired) in the digital age. Employees and employers alike need to know their rights in this fast changing world, and technology adds a new twist to the old calculus. The best advantage that you can get is knowledge, and this presentation is packed with tips, tricks, and hints that will help you get hands on with the employment process, whatever your level of legal or technical sophistication.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Canadian Copyright Law, Technology and Cultural Management CAMT
This seminar will provide cultural managers with a broad overview of the evolving legal and business issues facing copyright owners who wish to exploit and protect their property in the expanding digital, web-based, techonolgically-enabled universe. It will also provide a targeted framework for assessing the short and long term legal and business risks and benefits arising from the promotion, commercialization and enforcement of their copyright over the Internet among an increasingly demanding consumer base. Created by Elise Orenstein for the 2008 Technology in the Arts: Canada Conference.
This is a copy of my presentation at the 2013 VT Family Law Conference. This lecture discusses the growing importance of electronic evidence in divorce litigation, and provides suggestions on how to locate, recover, and preserve emails, social media posts, pictures, and computer files. It also covers the legal risks that attorneys and their clients face if they are too aggressive in pursuing electronic evidence.
"Navigating Disability Law: The 30,000-Foot View" was presented at the Center for Health Literacy Conference 2011: Plain Talk in Complex Times by Cary LaCheen, JD, Senior Attorney, National Center for Law and Economic Justice.
Description: This session will provide a forum for an audience-driven discussion about the legal obligations to communicate and provide information in a way that is accessible to individuals with disabilities. The presenter will answer your questions about disability law, what "reasonable" accommodation means, and where to go for additional resources.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Social media is slowly changing the practice of law. Join our panel of experts as they discuss everything from social media in eDiscovery to the challenges of interpreting emoji.
Attendees will learn:
--Best practices for preserving and producing social media evidence in litigation.
--How social media is working its way into the discovery process and how courts are reacting.
--Ethical pitfalls that can arise when dealing with social media.
--How emojis are changing the legal practice today and how they’ll continue to alter the profession in the future.
Let Robert B. Fitzpatrick, principal of Robert B. Fitzpatrick, PLLC, walk you through the ins and outs of hiring (or being hired) and firing (or being fired) in the digital age. Employees and employers alike need to know their rights in this fast changing world, and technology adds a new twist to the old calculus. The best advantage that you can get is knowledge, and this presentation is packed with tips, tricks, and hints that will help you get hands on with the employment process, whatever your level of legal or technical sophistication.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Knowledge, data and information in the corporate contextKschopflin
A knowledge and information management talk about how information works in the modern organisation, the problems it presents and some approaches to dealing with them.
A presentation prepared for KSFR, a public radio station in Santa Fe, New Mexico, USA. The main point is that the station should develop a "digital first" approach to all aspects pertaining to its Audience(s), Content and Technologies.
Understanding records management print and electronicFe Angela Verzosa
lecture presented by Fe Angela M. Verzosa at the Seminar Workshop sponsored by De La Salle University- Dasmarinas, on 4 December 2014 at Luis Aguado Viewing Room, Aklatang Emilio Aguinaldo, DLSU-Dasmarinas, Cavite
Those implementing social media in local government agencies face a different set of challenges than private sector implementers. From agency culture to policy to terms of use agreements, the issues need to be identified and managed for successfully implementing these networks.
By Pro Bono Net—A reprise of a popular topic, this year we present examples of new innovations in technology to support pro bono in an Ignite-style format. The special Pre-Celebrate Pro Bono Week Webinar will cover various technologies in use by pro bono lawyers, as well as tips on how to make these technologies more effective and helpful for their pro bono programs.
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
2. What you need to know about
the news media
• It’s a business.
• Reporting doesn’t have to be balanced.
• Deadlines are important.
• They may be friendly, but they may not be
your friends.
• NC laws give the public broad access to
records and meetings.
3. What else you need to know …
• Reporters often have little information.
• Time is limited for reporters.
• Every interaction you have can be an
opportunity.
• Reporters come from traditional and non-
traditional news outlets.
4. When reporters call…
• Thank them for calling.
• Tell them we want to ensure that they get
what they need.
• Connect them to NCDPI’s
Communications office (for DPI staff) or
follow your district’s policies.
5. Learning a few basic principles
from some cautionary tales…
6. 1. Be honest.
REAL CLEAR POLITICS: Weiner Asked If
Photo Is Of Him: "I Wish," "I'm Not Sure"
http://www.realclearpolitics.com/video/2011/06/01/weiner_asked_if_photo_is_of_him_i_wish_im_not_sure.html
7. 2. Be prepared.
CBS NEWS: Sarah Palin Can't Name a
Newspaper She Reads
http://www.youtube.com/watch?v=xRkWebP2Q0Y
8. If you don’t know an answer,
don’t make one up.
http://www.youtube.com/watch?v=nokTjEdaUGg&feature
9. 3. Use the right tone.
ABC NEWS:Christie Calls Reporter ‘Idiot’
and ‘Stupid’ at Press Conference
http://abcnews.go.com/blogs/politics/2012/07/christie-calls-reporter-an-idiot-and-stupid-at-press-conference/
10. 4. Stay on message.
HUFFINGTON POST: BP CEO Tony
Hayward: 'I'd Like My Life Back'
http://www.huffingtonpost.com/2010/06/01/bp-ceo-tony-hayward-video_n_595906.html
11. 5. Recognize that the definition of
news media definition is changing.
12. Hey you’re on YouTube!
• Consider that anything you say or do in a
public space could be on YouTube in 5
minutes or less.
13. Social media are media too.
POYNTER: HuffPost, CNN, Mediaite fall
for fake Twitter account of NC governor
http://www.poynter.org/latest-news/regret-the-error/173923/huffpost-cnn-mediaite-fall-for-fake-twitter-account-of-nc-governor/
14. 6. Always try to tell YOUR story.
http://www2.nbc17.com/news/2012/feb/14/reality-check-k-12-teacher-cuts-ar-1930737/
15. Interview tips
• Before you speak, ask yourself:
what’s the goal of this communication?
• Plan your message and gather facts
ahead of time.
17. Interview tips
• Be honest.
• Be prepared.
• Use the right tone.
• Stay on message.
• Know the media.
• Tell YOUR story.
18. Follow up
• Communications tracks news media
coverage and includes it in a daily clips
email.
• We also can assist with other strategies to
make sure your message is heard.
Examples: op ed columns, newsletter
articles, email messaging, face-to-face
meetings.
19. How Communications
supports you
• Practice interviews
• Presence at interviews
• Letters to the editor
• Op eds
• Tracking coverage and social media
20. PUBLIC RECORDS &
OPEN MEETINGS
Katie Cornetto
NC State Board of Education
Attorney
21. Handling requests
• From news & social media:
– Contact Communication and Information
Services (919.807.3450).
• From general public:
– Provide requested information and notify
Communication and Information Services.
LEA/School staff: Follow your district’s
policies on public records requests.
22. Protocols
• How we handle calls
• Timeline - 2 hours or less for initial
response
• Costs for copies, etc.
23. Public records laws
• Individual users are responsible for
managing state records effectively and
efficiently, regardless of the technology
used to create them.
• Assume that all information on government
e-mail systems is public (and subject to
review by state officials).
24. Definition
"Public record" or "public records" = all…
• documents • artifacts, or
• papers • other documentary
• letters material regardless of
• physical form or
maps characteristics (email)
• books • made or received in
• photographs connection with the
• films transaction of public
• sound recordings business by any agency
• of North Carolina
magnetic or other tapes government or its
• electronic data‑processing subdivisions.
records
25. Who can access public records?
• “Public records and public information…
are the property of the people.
• Therefore, the people may obtain copies of
their public records and public information
free or at minimal cost.”
26. What isn’t “public” (general)?
• Written communications • Settlement documents in
to any public board, medical malpractice
council, commission or actions against a hospital
other governmental • Information technology
body that fall within the security features
attorney-client privilege (passwords, security
• Tax records standards, procedures,
• Trade secrets, if processes, configurations,
properly submitted to a software, and codes)
government entity • Criminal investigative
• Information that reveals records
an account number for • Medical records
electronic payment • Anything other than basic
personnel information
27. What isn’t public (for schools)?
• Student files • Special education
• Former student records
records • Criminal history
• Mediation records for checks:
children with – for charter school
disabilities boards and
• Student records employees
derived from – for LEA employees
contractors and contractors
• Juvenile court records • Emergency Response
Plans
28. Records retention/
disposition schedules
• Governed by state statutes
• Maintained by Government Records
Branch of NC Department of Cultural
Resources (NCDCR)
• Customized with agency Chief Records
Officer and NCDCR expert
• Filed and accessible online at
http://www.records.ncdcr.gov
29. What we should be doing (print)
• Appoint a Chief Records Officer
• Follow schedule found at
http://www.records.ncdcr.gov/for non-electronic files
• Designate division/area records management contacts
• Report contact’s name to Chief Records Officer
• Notify Chief Records Officer whenever contact changes
• Work with Chief Records Officer to add division-specific
items to generic retention/disposal schedule
• Send division/area management plans to the
Government Records Branch (NC Department of
Cultural Resources)
• Batch critical archives for NCDCR pick-up
30. What should we be doing (digital)
Examples of email, email attachments, and
text mail messages that are public records:
• Policies or directives
• Final drafts or reports and recommendations
• Correspondence and memos related to official business
• Work schedules and assignments
• Meeting agendas or minutes
• Any document or message that initiates, facilitates,
authorizes, or completes a business transaction
• Messages that create a precedent, such as issuing
instructions or advice
31. What we should be doing (digital)
• Managing our email individually
• Selectively archiving:
– Email (even from personal accounts if messages involve
official state business)*
– Text messages (mobile email or Instant Messenger)*
– Files created by off-site employees (using separate back-
up medium)
– Webinars (as public meetings)
– Digital images
– Podcasts
• See http://www.records.ncdcr.gov/erecords/default.htm#dig
for guidance
*forward message to government account
32. Records retention/
disposition schedule
• Find DPI email policy on the Intranet under
Policies/Procedures/Forms
• Find state policy at
http://www.records.ncdcr.gov/erecords/Email_P
olicy.pdf
33. Additional resources
• Find a variety of classes (both online and
at the Government Records office on
Blount Street across from the Executive
Mansion) at
http://www.records.ncdcr.gov/workshops.ht
m
35. Open meetings
• A meeting is open to the public if a “public
body” meets.
• A public body is defined broadly as any:
– Authority
– Board
– Commission
– Committee
– Council
– Other body of state or local government
36. What should we be doing?
• Public notice is required.*
• Minutes of the meetings must be kept and
available to the public.*
– Written
– Audio/video taped
– Webinar recordings
*As long as the purpose of the meeting is to execute one of five
functions:
– legislative
– policy-making
– quasi-judicial
– administrative
– advisory
37. Who must follow
open meetings laws?
• The State Board of Education and its
committees
• Other examples within DPI are:
– Compliance Commission
– Military Council
– Drop-Out Prevention Grant Committee
– CIHS Joint Advisory Council
38. Resources
• Online:
– www.ncdoj.com
• NC Department of Justice (primers on
open government laws)
– www.elon.edu/e-
web/academics/communications/ncopengov/
• NC Open Government Coalition, a group of
organizations interested in promoting public access to
government
– www.sunshineweek.org
• More info about open access to government
39. Resources
• Print:
– Institute of Government Publications:
• Open Meetings and Local Governments in
North Carolina: Some Questions and Answers
– Seventh Edition by David Lawrence
• Public Records Law for North Carolina Local
Governments
– by David Lawrence
Editor's Notes
Poll participants to see how many work with local PIOs and how often. Discuss importance of good working relationship with PIOs and then transition to occasions when school finance officers may have to work directly with the media.
Official Records Retention/Disposition Schedules at http://www.records.ncdcr.gov/schedules/ dpi.htm range from 2002 to 2007 and cover only: EC Behavior Support Services NC Professional Teaching Standards Commission School Improvement Division State Board of Education State Superintendent ’s/Deputy Superintendent’s Offices Textbook Adoption Services