This document provides an overview of e-discovery and the Federal Rules of Civil Procedure related to e-discovery. It discusses the importance of mastering e-discovery, as e-discovery now represents approximately 35% of litigation costs. It introduces the Electronic Discovery Reference Model and outlines key parts of the Federal Rules of Civil Procedure addressing e-discovery, including Rules 16, 26, 34 and 37. It also summarizes the state of e-discovery after amendments to the Federal Rules of Civil Procedure in 2015 regarding the scope of discovery and failure to preserve electronically stored information.
What is in store for e-discovery in 2015?Logikcull.com
The document discusses 4 major trends in e-discovery for 2015:
1) Increased focus on litigation readiness and document preservation plans to defend against sanctions for e-discovery violations.
2) Growing use of data analytics and visualization tools to improve e-discovery efficiency and reduce costs.
3) Challenges of addressing foreign privacy laws and cross-border data transfers.
4) Difficulties preserving, collecting and processing data from mobile devices.
The document discusses how predictive analytics and technology can help address issues in the legal industry and improve access to justice. It notes that the legal field has been slow to adopt data-driven approaches, unlike other sectors. Analytics have the potential to provide more transparency, educate people on their rights, and help address the large justice gap where most legal issues faced by low-income individuals receive little assistance. While technology cannot replace lawyers, it can automate routine tasks and help lawyers serve more clients by drawing on broader data patterns rather than just experience. Several companies that apply analytics to legal issues are profiled.
Systems, Processes & Challenges in litigation involves determining when to implement a litigation hold to preserve relevant documents. A litigation hold is necessary when litigation is reasonably anticipated based on a filed lawsuit or subpoena. The duty to preserve evidence arises when litigation is anticipated. Once implemented, the litigation hold must be properly scoped, documented, communicated to relevant parties, and monitored for compliance. Automating the litigation hold process can help manage costs and ensure preservation duties are met.
The Seventh Circuit developed principles relating to the discovery of electronically stored information that were codified into a standing order to serve as supplemental guidelines for selected cases in the circuit's eDiscovery pilot program, and the program will assess the effectiveness of the principles and modify them as needed based on feedback from participating judges and lawyers.
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
This document discusses eDiscovery and litigation costs in corporations and law firms. It provides biographies and contact information for two attorneys, Mark L. Smith and Ryan G. Baker, who have experience with complex commercial litigation, antitrust, securities, and intellectual property cases. It also covers topics such as the goals of ediscovery, proportionality, retention and legal holds, collection, processing, review, production, and managing discovery risks and sanctions.
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
The increasingly sophisticated realm of crime involves challenges related to digital evidence, and employing such evidence in court, as well as actors, actions, or substantial effects that are wholly or in some part located or have been carried out in different jurisdictions. Access to relevant evidence is essential both for the conviction of criminals and for the protection of those wrongly accused. However, due to the decentralised nature of cyberspace, the targeted evidence may be residing in multiple jurisdictions at once or it may be impossible to identify the location at all at a given time (e.g. in the case of cloud computing).
This presentation examines a range of traditional and novel tools aimed at ensuring law enforcement agencies’ cross-border access to evidence such as the Mutual Legal Assistance framework, and the initiatives in the European Union (notably the e-Evidence proposal), Council of Europe (the Budapest Convention) and in the United States. The discussion then moves on to relevant principles of international law such as territorial sovereignty, and seeks to examine the possible global reach and effect on other regions of the EU e-Evidence proposal.
[CB20] Privacy protection and Data breach incident response regulation in Eas...CODE BLUE
In the era of big data and privacy protection, there are many discussions on personal data, privacy protection, and information autonomy around the whole world. In addition, personal data is a part of information assets, and it also falls within the protection scope of information security. The overall information security is built on interlocking security management measures. According to the barrel theory, information security is essentially free of 100%, drip-proof protection, except that the weaknesses that may be attacked must be continuously strengthened and related accident prevention, response and handling mechanism is an important part of management measures.
Therefore, this paper tried to start from the position of transnational enterprise and describe how to ensure legal compliance while the company need to follow different data protection laws in different jurisdiction, especially in East Asia and Europe. The countries include Japan, Taiwan, European and Thailand. This paper would direct readers to know the basic regulation and legal definition in the first part. In the second part, we would introduce the legal requirements for how to handling an event of personal data/information breach. In the third part, this paper would show you multiple data breach cases in the four countries and let you see how do other enterprises handle the crisis of data breach. Do all the incident responses comply to the applicable data protection law? How could a transnational enterprise handle the crisis legally to ensure compliance? This paper would provide advices to all the companies.
What is in store for e-discovery in 2015?Logikcull.com
The document discusses 4 major trends in e-discovery for 2015:
1) Increased focus on litigation readiness and document preservation plans to defend against sanctions for e-discovery violations.
2) Growing use of data analytics and visualization tools to improve e-discovery efficiency and reduce costs.
3) Challenges of addressing foreign privacy laws and cross-border data transfers.
4) Difficulties preserving, collecting and processing data from mobile devices.
The document discusses how predictive analytics and technology can help address issues in the legal industry and improve access to justice. It notes that the legal field has been slow to adopt data-driven approaches, unlike other sectors. Analytics have the potential to provide more transparency, educate people on their rights, and help address the large justice gap where most legal issues faced by low-income individuals receive little assistance. While technology cannot replace lawyers, it can automate routine tasks and help lawyers serve more clients by drawing on broader data patterns rather than just experience. Several companies that apply analytics to legal issues are profiled.
Systems, Processes & Challenges in litigation involves determining when to implement a litigation hold to preserve relevant documents. A litigation hold is necessary when litigation is reasonably anticipated based on a filed lawsuit or subpoena. The duty to preserve evidence arises when litigation is anticipated. Once implemented, the litigation hold must be properly scoped, documented, communicated to relevant parties, and monitored for compliance. Automating the litigation hold process can help manage costs and ensure preservation duties are met.
The Seventh Circuit developed principles relating to the discovery of electronically stored information that were codified into a standing order to serve as supplemental guidelines for selected cases in the circuit's eDiscovery pilot program, and the program will assess the effectiveness of the principles and modify them as needed based on feedback from participating judges and lawyers.
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
This document discusses eDiscovery and litigation costs in corporations and law firms. It provides biographies and contact information for two attorneys, Mark L. Smith and Ryan G. Baker, who have experience with complex commercial litigation, antitrust, securities, and intellectual property cases. It also covers topics such as the goals of ediscovery, proportionality, retention and legal holds, collection, processing, review, production, and managing discovery risks and sanctions.
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
The increasingly sophisticated realm of crime involves challenges related to digital evidence, and employing such evidence in court, as well as actors, actions, or substantial effects that are wholly or in some part located or have been carried out in different jurisdictions. Access to relevant evidence is essential both for the conviction of criminals and for the protection of those wrongly accused. However, due to the decentralised nature of cyberspace, the targeted evidence may be residing in multiple jurisdictions at once or it may be impossible to identify the location at all at a given time (e.g. in the case of cloud computing).
This presentation examines a range of traditional and novel tools aimed at ensuring law enforcement agencies’ cross-border access to evidence such as the Mutual Legal Assistance framework, and the initiatives in the European Union (notably the e-Evidence proposal), Council of Europe (the Budapest Convention) and in the United States. The discussion then moves on to relevant principles of international law such as territorial sovereignty, and seeks to examine the possible global reach and effect on other regions of the EU e-Evidence proposal.
[CB20] Privacy protection and Data breach incident response regulation in Eas...CODE BLUE
In the era of big data and privacy protection, there are many discussions on personal data, privacy protection, and information autonomy around the whole world. In addition, personal data is a part of information assets, and it also falls within the protection scope of information security. The overall information security is built on interlocking security management measures. According to the barrel theory, information security is essentially free of 100%, drip-proof protection, except that the weaknesses that may be attacked must be continuously strengthened and related accident prevention, response and handling mechanism is an important part of management measures.
Therefore, this paper tried to start from the position of transnational enterprise and describe how to ensure legal compliance while the company need to follow different data protection laws in different jurisdiction, especially in East Asia and Europe. The countries include Japan, Taiwan, European and Thailand. This paper would direct readers to know the basic regulation and legal definition in the first part. In the second part, we would introduce the legal requirements for how to handling an event of personal data/information breach. In the third part, this paper would show you multiple data breach cases in the four countries and let you see how do other enterprises handle the crisis of data breach. Do all the incident responses comply to the applicable data protection law? How could a transnational enterprise handle the crisis legally to ensure compliance? This paper would provide advices to all the companies.
Advanced PII / PI data discovery and data protectionUlf Mattsson
We will discuss using Advanced PII/PI Discovery to Find & Inventory All Personal Data at an Enterprise Scale.
Learn about new machine learning & identity intelligence technology.
You will learn how to:
• Identify all PII across structured, unstructured, cloud & Big Data.
• Inventory PII by data subject & residency for GDPR.
• Measure data re-identifiability for pseudonymization.
• Uncover dark or uncatalogued data.
• Fix data quality, visualize PII data relationships
• Apply data protection to discovered sensitive data.
Total Evidence Management (TEM) is an approach to efficiently manage both digital and physical evidence for complex litigation in the digital age. TEM combines all relevant evidence, including documents, emails, audio/video files, and metadata from various sources into a centralized electronic repository. This repository allows lawyers to preserve, process, review, analyze, organize and collaborate on evidence. By using TEM, lawyers can save clients time and money in the discovery process where most cases are won or lost, rather than during the courtroom trial.
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
The federal government held its annual Biometric Consortium Conference 18-20 September 2012. MITRE hosted a workshop during this conference to highlight FFRDC support to the federal biometrics enterprise. One panel in this workshop focused on identifying priorities that the federal government will not be able to address and/or sponsor, and that should be considered for attention by non-federal entities. This paper summarizes the priorities identified during this panel.
[CB20] Defending Computer Criminals by Andrea MontiCODE BLUE
This paper is about defending a person accused of computer crime and computer-related crime in Court. It is intended as a primer for those defence counsel who have no experience in the specific field of criminal trials involving computer, digital assets and the Internet. At the same time, it provides insights to computer experts wanting to enter into the digital forensics sector, because it offers a way to understand how a lawyer thinks, and what are his needs when designing a defence strategy.
The focus is on the practical issues, as emerged from the direct trial experience of the author and of other criminal trial lawyers, therefore the legal theory and the ICT technical aspects are not discussed in detail. Both the legal and the IT professional, though, can find in the discussion enough hints to widen their understanding of the matter and improve the effectiveness of their strategies.
The paper is structured in three part: a criminological profile’s taxonomy of the defendants, the analysis of the digital investigation carried on by the prosecution to build the case, and the trial strategies of the defence counsel.
Finally, a note on the cases discussed in this paper: where possible, references to court decisions are available, but in some cases, for confidentiality reasons, the paper analyses the relevant elements without providing further information.
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
In this session, we will discuss a range of new emerging technologies for privacy and confidentiality in machine learning and data analytics. We will discuss how to use open source tools to put these technologies to work for databases and other data sources.
When we think about developing AI responsibly, there’s many different activities that we need to think about. In this session, we will discuss technologies that help protect people, preserve privacy, and enable you to do machine learning confidentially.
This session discusses industry standards and emerging privacy-enhanced computation techniques, secure multiparty computation, and trusted execution environments. We will discuss Zero Trust philosophy fundamentally changes the way we approach security since trust is a vulnerability that can be exploited particularly when working remotely and increasingly using cloud models. We will also discuss the “why, what, and how” of techniques for privacy preserving computing.
We will review how different industries are taking opportunity of these privacy preserving techniques. A retail company used secure multi-party computation to be able to respect user privacy and specific regulations and allow the retailer to gain insights while protecting the organization’s IP. Secure data-sharing is used by a healthcare organization to protect the privacy of individuals and they also store and search on encrypted medical data in cloud.
We will also review the benefits of secure data-sharing for financial institutions including a large bank that wanted to broaden access to its data lake without compromising data privacy but preserving the data’s analytical quality for machine learning purposes.
HCMUT IMP Computer Science 20 - E-Government from the view of PrivacyDuc Lai Trung Minh
E-Government involves government agencies using technology like the internet to provide services to citizens. However, this raises privacy concerns as personal data from different government records and databases can be combined to create detailed profiles of individuals. The document discusses definitions of e-government and privacy, privacy laws in the US and Vietnam, and technical solutions used to preserve privacy in e-government like data perturbation and anonymization. It also summarizes a case study where medical records from Massachusetts were re-identified by combining them with voter records to find the medical information of the Governor at the time.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
The document discusses several topics related to e-Discovery:
1) Document retention policies are important for companies to establish in order to efficiently manage electronic discovery requests if litigation occurs. These policies help reduce unnecessary data and ensure ethical data deletion practices.
2) Electronic discovery, or e-Discovery, refers to the discovery process for electronically stored information in civil lawsuits. It presents unique challenges compared to paper documents due to issues like metadata and data volume.
3) The federal rules of civil procedure have been amended to address e-Discovery procedures and obligations regarding items like initial disclosures, discovery scope, and electronically stored information. Legal holds are also discussed as an important part of the e-Discovery process.
This webinar discusses discovery practice in litigation. It begins with an overview of the rules governing discovery, including initial disclosures, written discovery like requests for production of documents and interrogatories, and oral discovery such as depositions. It covers topics like proportionality, preservation of electronic data, discovery from non-parties, and expert discovery procedures. The webinar provides both an explanation of the procedural rules and practical guidance about managing the discovery process.
This document summarizes key topics in electronic discovery (e-discovery) including: the types of electronically stored information (ESI) that now exists; how e-discovery rules and case law have evolved to address ESI; common e-discovery issues like litigation holds, accessibility tiers, and sanctions; and ethical implications for attorneys regarding e-discovery competency and diligence. Recent cases demonstrate courts' increasing willingness to impose severe sanctions like adverse inferences, monetary penalties, default judgments, or case dismissal for failure to properly preserve ESI or comply with discovery orders.
This document discusses rules aimed at reducing the cost of electronic discovery in litigation. It focuses on developments in Irish law around e-discovery, with comparisons to rules in England/Wales and the US. Key points include Ireland's expansion of the definition of "document" to include electronic formats, proportionality principles introduced in the Dome Telecom case, and 2009 rule changes requiring parties to justify requests for electronic documents. Recent cases show a shift towards balancing costs and embracing e-discovery practices.
This document discusses the Sedona Canada Principles of E-Discovery and Privacy Protection. It provides an overview of privacy and e-discovery, noting the tension between privacy rights and the need for disclosure in litigation. It discusses the Sedona Canada principles, which address proportionality and protecting privileges and privacy in electronic document production. The document also discusses issues around pre-litigation access to employee communications and social media, as well as discovery practices regarding sensitive personal information.
115 By Robert Smallwood with Randy Kahn,Esq. , and .docxdrennanmicah
The key points are:
1. Legal functions are the most important area impacted by information governance, as failure to meet legal requirements can put an organization out of business or land executives in prison.
2. The 2006 revisions to the Federal Rules of Civil Procedure were aimed at recognizing the importance of electronically stored information in litigation and reducing the costs of document review and protecting privileged documents.
3. A landmark case, Zubulake v. UBS Warburg, established that organizations must take proper care to preserve relevant email evidence, as failure to do so can result in severe penalties like an adverse inference ruling against the organization.
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
E-Discovery is becoming an increasing important part of the legal process. The effect of social media, e-mail and other electronic correspondence in lawsuits including civil and criminal matters and even divorce has become dramatic. What do lawyers need to do to preserve this evidence? What can happen if you don't?
This document discusses topics to cover in a pre-discovery conference, including the scope of discovery, search strategies, preservation of electronic documents, privilege issues, and cooperation between parties. An effective pre-discovery conference requires understanding the issues in the case, how clients store documents, and where relevant information can be found. It aims to narrow the scope of discovery and develop strategies for identifying, collecting, and reviewing electronic documents in a reasonable manner. Areas of disagreement should also be addressed.
This document discusses the use of neutrals in electronic discovery (ESI) mediation. It notes that ESI takes many forms and is a major part of discovery, resulting in increased disputes and costs. Engaging a neutral early can help parties develop an ESI discovery plan to address issues like preservation, search terms, and production formats. A neutral can facilitate cooperation and proportionality to control costs. Both state and federal rules have been amended to better address ESI discovery and sanctions. Mediation seeks to identify practical solutions, maintain self-determination, and avoid sanctions. Initial phone conferences can establish agendas to efficiently address technical ESI issues with experts. Hybrid mediation-arbitration processes like arb-med and
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
If you say the word “discovery” to a litigator, the reaction may not be kind. Discovery-the exchange of relevant information- usually in the form of documents or oral depositions, takes up the majority of a litigator’s time and costs clients the most money.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/discovery-practice-2020/
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
DBA Presentation On E-Discovery by Kirby DrakeKlemchuk LLP
This document provides an overview of electronic discovery (e-discovery) including the e-discovery process, key influencers like company size and data infrastructure, and the typical e-discovery model. It discusses 2015 rule changes focusing on proportionality and cooperation. Key takeaways include thinking and acting proportionally, having early discussions to define discovery scope, and using honesty and diligence. The document also covers specific issues like social media discovery, email and privilege challenges, preservation obligations, and case examples where parties ran into issues or sanctions related to e-discovery and preservation.
I presented comprehensive e-discovery webinar with Eric Mandel, national e-discovery counsel and leader of the information law practice group at Zelle Hofmann Voelbel & Mason LLP.
Here are a selection of the slides that I created for the presentation
Advanced PII / PI data discovery and data protectionUlf Mattsson
We will discuss using Advanced PII/PI Discovery to Find & Inventory All Personal Data at an Enterprise Scale.
Learn about new machine learning & identity intelligence technology.
You will learn how to:
• Identify all PII across structured, unstructured, cloud & Big Data.
• Inventory PII by data subject & residency for GDPR.
• Measure data re-identifiability for pseudonymization.
• Uncover dark or uncatalogued data.
• Fix data quality, visualize PII data relationships
• Apply data protection to discovered sensitive data.
Total Evidence Management (TEM) is an approach to efficiently manage both digital and physical evidence for complex litigation in the digital age. TEM combines all relevant evidence, including documents, emails, audio/video files, and metadata from various sources into a centralized electronic repository. This repository allows lawyers to preserve, process, review, analyze, organize and collaborate on evidence. By using TEM, lawyers can save clients time and money in the discovery process where most cases are won or lost, rather than during the courtroom trial.
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
The federal government held its annual Biometric Consortium Conference 18-20 September 2012. MITRE hosted a workshop during this conference to highlight FFRDC support to the federal biometrics enterprise. One panel in this workshop focused on identifying priorities that the federal government will not be able to address and/or sponsor, and that should be considered for attention by non-federal entities. This paper summarizes the priorities identified during this panel.
[CB20] Defending Computer Criminals by Andrea MontiCODE BLUE
This paper is about defending a person accused of computer crime and computer-related crime in Court. It is intended as a primer for those defence counsel who have no experience in the specific field of criminal trials involving computer, digital assets and the Internet. At the same time, it provides insights to computer experts wanting to enter into the digital forensics sector, because it offers a way to understand how a lawyer thinks, and what are his needs when designing a defence strategy.
The focus is on the practical issues, as emerged from the direct trial experience of the author and of other criminal trial lawyers, therefore the legal theory and the ICT technical aspects are not discussed in detail. Both the legal and the IT professional, though, can find in the discussion enough hints to widen their understanding of the matter and improve the effectiveness of their strategies.
The paper is structured in three part: a criminological profile’s taxonomy of the defendants, the analysis of the digital investigation carried on by the prosecution to build the case, and the trial strategies of the defence counsel.
Finally, a note on the cases discussed in this paper: where possible, references to court decisions are available, but in some cases, for confidentiality reasons, the paper analyses the relevant elements without providing further information.
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
In this session, we will discuss a range of new emerging technologies for privacy and confidentiality in machine learning and data analytics. We will discuss how to use open source tools to put these technologies to work for databases and other data sources.
When we think about developing AI responsibly, there’s many different activities that we need to think about. In this session, we will discuss technologies that help protect people, preserve privacy, and enable you to do machine learning confidentially.
This session discusses industry standards and emerging privacy-enhanced computation techniques, secure multiparty computation, and trusted execution environments. We will discuss Zero Trust philosophy fundamentally changes the way we approach security since trust is a vulnerability that can be exploited particularly when working remotely and increasingly using cloud models. We will also discuss the “why, what, and how” of techniques for privacy preserving computing.
We will review how different industries are taking opportunity of these privacy preserving techniques. A retail company used secure multi-party computation to be able to respect user privacy and specific regulations and allow the retailer to gain insights while protecting the organization’s IP. Secure data-sharing is used by a healthcare organization to protect the privacy of individuals and they also store and search on encrypted medical data in cloud.
We will also review the benefits of secure data-sharing for financial institutions including a large bank that wanted to broaden access to its data lake without compromising data privacy but preserving the data’s analytical quality for machine learning purposes.
HCMUT IMP Computer Science 20 - E-Government from the view of PrivacyDuc Lai Trung Minh
E-Government involves government agencies using technology like the internet to provide services to citizens. However, this raises privacy concerns as personal data from different government records and databases can be combined to create detailed profiles of individuals. The document discusses definitions of e-government and privacy, privacy laws in the US and Vietnam, and technical solutions used to preserve privacy in e-government like data perturbation and anonymization. It also summarizes a case study where medical records from Massachusetts were re-identified by combining them with voter records to find the medical information of the Governor at the time.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
The document discusses several topics related to e-Discovery:
1) Document retention policies are important for companies to establish in order to efficiently manage electronic discovery requests if litigation occurs. These policies help reduce unnecessary data and ensure ethical data deletion practices.
2) Electronic discovery, or e-Discovery, refers to the discovery process for electronically stored information in civil lawsuits. It presents unique challenges compared to paper documents due to issues like metadata and data volume.
3) The federal rules of civil procedure have been amended to address e-Discovery procedures and obligations regarding items like initial disclosures, discovery scope, and electronically stored information. Legal holds are also discussed as an important part of the e-Discovery process.
This webinar discusses discovery practice in litigation. It begins with an overview of the rules governing discovery, including initial disclosures, written discovery like requests for production of documents and interrogatories, and oral discovery such as depositions. It covers topics like proportionality, preservation of electronic data, discovery from non-parties, and expert discovery procedures. The webinar provides both an explanation of the procedural rules and practical guidance about managing the discovery process.
This document summarizes key topics in electronic discovery (e-discovery) including: the types of electronically stored information (ESI) that now exists; how e-discovery rules and case law have evolved to address ESI; common e-discovery issues like litigation holds, accessibility tiers, and sanctions; and ethical implications for attorneys regarding e-discovery competency and diligence. Recent cases demonstrate courts' increasing willingness to impose severe sanctions like adverse inferences, monetary penalties, default judgments, or case dismissal for failure to properly preserve ESI or comply with discovery orders.
This document discusses rules aimed at reducing the cost of electronic discovery in litigation. It focuses on developments in Irish law around e-discovery, with comparisons to rules in England/Wales and the US. Key points include Ireland's expansion of the definition of "document" to include electronic formats, proportionality principles introduced in the Dome Telecom case, and 2009 rule changes requiring parties to justify requests for electronic documents. Recent cases show a shift towards balancing costs and embracing e-discovery practices.
This document discusses the Sedona Canada Principles of E-Discovery and Privacy Protection. It provides an overview of privacy and e-discovery, noting the tension between privacy rights and the need for disclosure in litigation. It discusses the Sedona Canada principles, which address proportionality and protecting privileges and privacy in electronic document production. The document also discusses issues around pre-litigation access to employee communications and social media, as well as discovery practices regarding sensitive personal information.
115 By Robert Smallwood with Randy Kahn,Esq. , and .docxdrennanmicah
The key points are:
1. Legal functions are the most important area impacted by information governance, as failure to meet legal requirements can put an organization out of business or land executives in prison.
2. The 2006 revisions to the Federal Rules of Civil Procedure were aimed at recognizing the importance of electronically stored information in litigation and reducing the costs of document review and protecting privileged documents.
3. A landmark case, Zubulake v. UBS Warburg, established that organizations must take proper care to preserve relevant email evidence, as failure to do so can result in severe penalties like an adverse inference ruling against the organization.
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
E-Discovery is becoming an increasing important part of the legal process. The effect of social media, e-mail and other electronic correspondence in lawsuits including civil and criminal matters and even divorce has become dramatic. What do lawyers need to do to preserve this evidence? What can happen if you don't?
This document discusses topics to cover in a pre-discovery conference, including the scope of discovery, search strategies, preservation of electronic documents, privilege issues, and cooperation between parties. An effective pre-discovery conference requires understanding the issues in the case, how clients store documents, and where relevant information can be found. It aims to narrow the scope of discovery and develop strategies for identifying, collecting, and reviewing electronic documents in a reasonable manner. Areas of disagreement should also be addressed.
This document discusses the use of neutrals in electronic discovery (ESI) mediation. It notes that ESI takes many forms and is a major part of discovery, resulting in increased disputes and costs. Engaging a neutral early can help parties develop an ESI discovery plan to address issues like preservation, search terms, and production formats. A neutral can facilitate cooperation and proportionality to control costs. Both state and federal rules have been amended to better address ESI discovery and sanctions. Mediation seeks to identify practical solutions, maintain self-determination, and avoid sanctions. Initial phone conferences can establish agendas to efficiently address technical ESI issues with experts. Hybrid mediation-arbitration processes like arb-med and
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
If you say the word “discovery” to a litigator, the reaction may not be kind. Discovery-the exchange of relevant information- usually in the form of documents or oral depositions, takes up the majority of a litigator’s time and costs clients the most money.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/discovery-practice-2020/
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
DBA Presentation On E-Discovery by Kirby DrakeKlemchuk LLP
This document provides an overview of electronic discovery (e-discovery) including the e-discovery process, key influencers like company size and data infrastructure, and the typical e-discovery model. It discusses 2015 rule changes focusing on proportionality and cooperation. Key takeaways include thinking and acting proportionally, having early discussions to define discovery scope, and using honesty and diligence. The document also covers specific issues like social media discovery, email and privilege challenges, preservation obligations, and case examples where parties ran into issues or sanctions related to e-discovery and preservation.
I presented comprehensive e-discovery webinar with Eric Mandel, national e-discovery counsel and leader of the information law practice group at Zelle Hofmann Voelbel & Mason LLP.
Here are a selection of the slides that I created for the presentation
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachDawn Yankeelov
The document summarizes legal issues related to data privacy and security breaches. It discusses (1) the relevant cost-benefit analysis that courts consider for data security, (2) examples of court orders regarding document productions and computer forensics in litigation, and (3) that parties are responsible for errors made by their vendors. The document then provides an agenda on legal issues in data privacy and security, including anticipating threats, incident response, and applying relevant laws and frameworks.
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
Arent Fox LLP. Rules for data collection, aggregation, sharing, use and protection all depend on the business and legal context. One size does not fit all.
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
All privacy is contextual. Like that, the legal rules for collecting, aggregating, sharing and protecting data, including through IP, are specific to the context. One size does not fit all.
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...AHRP Law Firm
Law Number 13 of 2003 on Manpower has been partially revoked and amended several times, with the latest amendment made through Law Number 6 of 2023. Attention is drawn to a specific part of the Manpower Law concerning severance pay. This aspect is undoubtedly one of the most crucial parts regulated by the Manpower Law. It is essential for both employers and employees to abide by the law, fulfill their obligations, and retain their rights regarding this matter.
A Critical Study of ICC Prosecutor's Move on GAZA WarNilendra Kumar
ICC Prosecutor Karim Khan's proposal to its judges seeking permission to prosecute Israeli leaders and Hamas commanders for crimes against the law of war has serious ramifications and calls deep scrutiny.
The presentation deals with the concept of Right to Default Bail laid down under Section 167 of the Code of Criminal Procedure 1973 and Section 187 of Bharatiya Nagarik Suraksha Sanhita 2023.
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
18. RULE 16 (Pre-trial
conferences, scheduling)
SECTION NEW
Pre-trial Conference (b)(1)
Court must issue scheduling order after (A) receiving parties' Rule 26(f) report
or (B) consulting with the parties via direct simultaneous communication.
Those communications may be in person, by telephone, or by more
sophisticated electronic means.
Scheduling
(b)(3)(B)(iii)
The scheduling order may provide for disclosure, discovery, or
preservation of ESI.
Scheduling (b)(3)(B)(iv) The scheduling order may include agreements reached under FRE 502.
18
19. RULE 26 (Duty to Disclose;
General Provisions Governing
Discovery) SECTION NEW
Discovery Scope and Limits... Scope in
General
(b)(1)
Parties may discover information about any non-privileged matter where the
information is both: relevant to any party's claim or defense and proportional
to the needs of the case.
Discovery Scope and Limits... Scope in
General
(b)(1)
Factors to be considered to determine proportionality are:
The importance of the issues at stake in the action;
The amount in controversy;
The parties' relative access to relevant information;
The parties' resources;
The importance of the discovery in resolving the issues; and
Whether the burden or expense of the proposed discovery outweighs its likely
benefit.
Proportionality factors have been moved to one location, at the beginning of
the rule, and have been reordered. A previously implicit factor has been made
explicit: the parties' relative access to relevant information. The Committee
Note concerning this aspect of the rule is long and detailed and should be
read with care.
Protective Orders
(c)(1)(B)
Court is explicitly authorized to issue protective orders that allocate
expenses for disclosure or discovery. This change is not meant to suggest
that cost-shifting should become a common practice.
19
20. RULE 34 (Producing Documents,
ESI)
SECTION NEW
Procedure... Responses and
Objections... Time to Respond (b)(2)(A)
Party responding to Rule 26(d)(2) early document requests must deliver
responses within 30 days of the Rule 26(f) conference.
Procedure... Responses and
Objections... Responding to Each Item (b)(2)(B)
Parties objecting to document requests must specify the grounds for
objecting.
Responding parties may produce copies of documents or ESI instead of
permitting inspection. The same deadlines apply either way.
Procedure... Responses and
Objections... Objections (b)(2)(C)
Parties objecting to document requests must state, with each objection, whether
they are withholding any responsive materials on the basis of that objection.
20
21. RULE 37 (Failure to Make Disclosures
or to Cooperate in Discovery; Sanctions) SECTION NEW
Failure to Preserve ESI (e)
Court takes action only if:
ESI has been lost;
The lost ESI should have been preserved in the anticipation or
conduct of litigation;
The party failed to take reasonable steps to preserve the ESI; and
The ESI cannot be restored or replaced through additional
discovery.
(e) 1
If court finds that another party has been prejudiced by loss of the
information, court may order measures no greater than necessary to
cure the prejudice.
(e) 2
If and only if court finds that the other party acted with intent to deprive
another party of the information's use in the litigation, court may take one
of three actions:
(e)(2)(A) Presume the lost information was unfavorable to the party;
(e)(2)(B)
Instruct jury that it may or must presume the lost information was
unfavorable to the party; or
(e)(2)(C)
Dismiss action or enter a default judgment.
21