SlideShare a Scribd company logo
Forensic Data
                                                                Investigations in China

                                                                   ASIS 3rd Annual Asia
                                                                    Pacific Conference
                                                                                 February 2009




A global expert services company providing expert testimony, authoritative studies, and strategic advisory services to
  clients including Fortune Global 500 corporations, major law firms, and governments worldwide. www.lecg.com
2


Topics
 Drivers (aka: why you should care)
    Investigation
    Compliance
    Litigation
 Challenges
    Legal
    Logistical
    Technical
 Getting Ready
 Case Studies
3


Drivers
 Investigations
    Internal incident response
    Internal investigation
         Fraud
         Theft of intellectual property
 Compliance/Congressional
      FCPA
      CFAA
      Antitrust/Anti-dumping
      Local compliance expectation
4


Drivers
 Litigation
     Intellectual property
     Product liability
     Class action
5


Where do computers come into all this?
 Estimated that well over 90% of information is held digitally
 International and local landscape on computers & crime:
       FBI sets up CART 1991
       IOCE former 1995
       G8 Lyons Group former 1998
       ASEAN MMT, ASEAN +1, ASEAN+3
       INTERPOL Asia Pacific Working Group on IT Crime
       Japan HITEC, Hong Kong TCD, PRC PSB
6


The very long-arm of the law
 FCPA
   1977 Law
   Imposes criminal and civil penalties for bribing foreign officials to obtain or
    maintain contracts
   Covers the corporation overseas and its agents
   Working with SOEs in China – all employees considered government
    officials
 CFAA
   Part of Title 18 on Fraud
   Covers fraud through unauthorised access or exceeding authorised
    access (internal fraud)
   Amended by PATRIOT Act in 2001 to append extraterritoriality
7


Changes to the Civil Litigation Landscape
 “Have your IT house in order”
                 Hon Lee Rosenthal, Chair, Federal Rules Committee


 “If it is critical to the success of your case to admit into evidence
  computer stored records, it would be prudent to plan to authenticate
  the record by the most rigorous standard that may be applied”
                 Hon Paul Grimm, US magistrate, Maryland



 “The ground has shifted....by these new rules”
                 Hon John Facciola, US magistrate, Washington DC
8


What changes?
 United States Federal Rules of Civil Procedure
 Amended December 2006
 Six years to determine amendments
 Specifically describes Discovery of “Electronically Stored Information”
  (ESI)
 Ongoing impact and precedents
         March 2007 Federal Judges' guide to ESI
         Maryland Protocol
9


What Rules?
 Inclusion of ESI (Rule 34)
 Scope and accessibility
 Form of production (Rule 34(b)
 “Claw Back” (Rule 26(b)(5))
 Preservation and sanction
 Early attention (Rules 26(f)(3), 16(b)(5), 16(b)(6))
10


What does that mean?
 Effectively brings civil and criminal action to the same standard
  regarding digital evidence
 Long Arm precedent in less than one year:
         Columbia Pictures Industries vs Bunnell, May 2007, US District Court CA
         Foreign statutes do not deprive an American court of the power to order a
          party subject to its jurisdiction to produce
11


Why you have to get it right
 Zubulake vs UBS Warburg LLC
        The obligation to preserve evidence arises when the party has notice that the evidence is
         relevant to the litigation or when a party should have known that the evidence may be
         relevant to future litigation
        It is not sufficient to notify all employees of a litigation hold and then expect that the party
         will then retain and produce all relevant information
        UBS Warburg – roughly 100 pages of email, Zubulake – roughly 400 pages of email
        Judge: adverse inference advice to jury
        USD 9.1 in compensation, USD 20.2 million in punitive damages

 Coleman (Parent) Holdings vs Morgan Stanley
        Morgan Stanley produced email partway through trial from newly discovered backup
         tapes
        Adverse inference: USD 603 million in compensation and USD 850 million in punitive
         damages
12


The Other Jurisdiction?
 China does not have a “blocking statute”
             however....
 Article 40 of the Constitution
     “the freedom and privacy of correspondence of citizens of the People's
      Republic of China are protected by law. No organisation or individual may,
      on any grounds, infringe upon the freedom and privacy of citizens'
      correspondence”
 Regulations on Employment Service and Employment Management
     Oct 30 2007
     “Any publicity of personal data of laborers and any use of... laborers'
      intellectual achievements shall be used under written consent of laborers”
     Scope??
13


PRC, the internet and email
 1997 Administrative Measures on Security Protection for International
  Connections to Computer Information Networks
    No one may use internet connections to “infringe upon...legal rights and
     interests of citizens”
    Article 7
 2006 Measures for the Administration of Internet Email Services
    Article 10
    Definition of “non-operator Internet information services”
14


So the laws are circling....now what?
 Where is the data physically?
    Local offices
    Data centres
 Who do you have to help?
    Investigations personnel
    IT administrator
    Legal counsel
 Outside help
    Outside counsel
    Third party expert support
    Are you/they authorised to investigate or represent you in China?
15


Other logistical challenges
 Where is the data logically?
      Do you have an up-to-date data map?
      What's a data map?
      Do you have an enterprise network diagram?
      What user data and what enterprise data is needed?
      Email – where is it? User's PC? Server? Blackberry/smartphone? All of
       them?
      Files – local copies? File servers?
      CDs, thumb drives?
      Backup tapes and systems?
      Any legacy systems?
16


So now you can start to collect....
 Collection expectations:
    ACPO
    Maryland Protocol
 Volume:
      1GB = 75,000 pages
      1CD = 20 boxes
      1 DVD = 150 boxes
      40GB HDD = 1,200 boxes
      300 GB HDD = 9,000 boxes
17


Technical challenges
 Legacy systems
    Machines still around? Working?
    Cost to collect/examine/produce? Penalty for failure?
 Back-up systems
    Identified?
    Formats? Cost to restore?
    Rotation and housekeeping?
18


More technical challenges
 Enterprise systems
    3D CAD
    Proprietary formats
    Structured data
 Language
      Review and analysis
      Technical processing: ASCII, Unicode, and legacy code pages
      LOTS AND LOTS OF LITTLE SQUARES
      Validity of review
19


So what can you do about all this?
 Corporate digital data readiness
    Do not reinvent the wheel
        CISO/CIO?
        Incident Response
        Information classification policy
    Pre-define roles and responsibilities – CSO to legal counsel
    Identify skill-sets and hire those that make sense
 Know the law
    US emphasis on pre-trial conference
    Third-party ESI expert
 Know the technology
20


Data Analytics
21


Case Study: Securities Class Action
 Chinese technology company listed in US
 Share price goes down. Class action launched
 Adverse inference strategy...?
 The challenge:
    100+ custodian PCs
    Unknown network configuration
    Unknown enterprise systems
 The solution:
    ESI source mapping emphasis
    Selective acquisition of documented data sources
22


Case Study: IP Litigation
 Technology companies in dispute over team defection
 China facilities in-scope
 The challenge:
    Multiple custodian PCs
    Multi-server CAD environment
    Multi-server design version control environment
 The solution:
    Technical review of enterprise system
    Forensic acquisition
    Server re-build: defensible, repeatable
23


 Thank You




Any Questions?
24


Contact Details
LECG Hong Kong Limited

3505-06 Tower Two
Lippo Centre
Admiralty
Hong Kong

T: +852 2106 3800 (Richard Kershaw)
E: RKershaw@lecg.com

More Related Content

What's hot

Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
WilmerHale
 
Big data: legal firms play ‘Moneyballʼ
Big data: legal firms play ‘Moneyballʼ Big data: legal firms play ‘Moneyballʼ
Big data: legal firms play ‘Moneyballʼ
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal Data
Renato Monteiro
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
canadianlawyer
 
Ohio Probate Law Journal Article
Ohio Probate Law Journal ArticleOhio Probate Law Journal Article
Ohio Probate Law Journal Article
Sarah (Gaynor) Worley
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
Imperva
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
Richard S. Granat
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
Courtney Fisk
 
Criminal Background Checks for Job Applicants Seriously Flawed, says NCLC
Criminal Background Checks for Job Applicants Seriously Flawed, says NCLCCriminal Background Checks for Job Applicants Seriously Flawed, says NCLC
Criminal Background Checks for Job Applicants Seriously Flawed, says NCLC
Umesh Heendeniya
 
2012 year end-electronic-discovery-update
2012 year end-electronic-discovery-update2012 year end-electronic-discovery-update
2012 year end-electronic-discovery-update
Gareth Evans
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
The Economist Media Businesses
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technology
smithad612
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
Morris Dorfer
 
Massachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws PresentationMassachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws Presentation
billanetworks
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Financial Poise
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
Mahesh Athani
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
wcodell
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
Hayden McCall
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
DISUK Limited
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
Electronic Signature & Records Association
 

What's hot (20)

Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
Big data: legal firms play ‘Moneyballʼ
Big data: legal firms play ‘Moneyballʼ Big data: legal firms play ‘Moneyballʼ
Big data: legal firms play ‘Moneyballʼ
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal Data
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
Ohio Probate Law Journal Article
Ohio Probate Law Journal ArticleOhio Probate Law Journal Article
Ohio Probate Law Journal Article
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
Criminal Background Checks for Job Applicants Seriously Flawed, says NCLC
Criminal Background Checks for Job Applicants Seriously Flawed, says NCLCCriminal Background Checks for Job Applicants Seriously Flawed, says NCLC
Criminal Background Checks for Job Applicants Seriously Flawed, says NCLC
 
2012 year end-electronic-discovery-update
2012 year end-electronic-discovery-update2012 year end-electronic-discovery-update
2012 year end-electronic-discovery-update
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technology
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
Massachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws PresentationMassachusetts New Data Security Laws Presentation
Massachusetts New Data Security Laws Presentation
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
E-Discovery and Electronic Evidence
E-Discovery and Electronic EvidenceE-Discovery and Electronic Evidence
E-Discovery and Electronic Evidence
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
 

Viewers also liked

Duty of Care and Travel Risk Management: Due Diligence
Duty of Care and Travel Risk Management: Due DiligenceDuty of Care and Travel Risk Management: Due Diligence
Duty of Care and Travel Risk Management: Due Diligence
Enterprise Security Risk Management
 
Survey: What Makes a Good Business Continuity Manager
Survey: What Makes a Good Business Continuity ManagerSurvey: What Makes a Good Business Continuity Manager
Survey: What Makes a Good Business Continuity Manager
Enterprise Security Risk Management
 
EU blacklist-Airlines
EU blacklist-AirlinesEU blacklist-Airlines
Perimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillancePerimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillance
Enterprise Security Risk Management
 
Duty of care and travel risk management: Low as reasonably practicable
Duty of care and travel risk management: Low as reasonably practicableDuty of care and travel risk management: Low as reasonably practicable
Duty of care and travel risk management: Low as reasonably practicable
Enterprise Security Risk Management
 
Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14
Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14
Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14
Enterprise Security Risk Management
 
Hitachi Data Services. Business Continuity
Hitachi Data Services. Business ContinuityHitachi Data Services. Business Continuity
Hitachi Data Services. Business Continuity
Enterprise Security Risk Management
 
Auditing supply chain logistics -CTPAT
Auditing supply chain logistics -CTPATAuditing supply chain logistics -CTPAT
Auditing supply chain logistics -CTPAT
Enterprise Security Risk Management
 

Viewers also liked (8)

Duty of Care and Travel Risk Management: Due Diligence
Duty of Care and Travel Risk Management: Due DiligenceDuty of Care and Travel Risk Management: Due Diligence
Duty of Care and Travel Risk Management: Due Diligence
 
Survey: What Makes a Good Business Continuity Manager
Survey: What Makes a Good Business Continuity ManagerSurvey: What Makes a Good Business Continuity Manager
Survey: What Makes a Good Business Continuity Manager
 
EU blacklist-Airlines
EU blacklist-AirlinesEU blacklist-Airlines
EU blacklist-Airlines
 
Perimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillancePerimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillance
 
Duty of care and travel risk management: Low as reasonably practicable
Duty of care and travel risk management: Low as reasonably practicableDuty of care and travel risk management: Low as reasonably practicable
Duty of care and travel risk management: Low as reasonably practicable
 
Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14
Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14
Ebola Global Travel Advisory By Intelligent Travel as of 15 Oct 14
 
Hitachi Data Services. Business Continuity
Hitachi Data Services. Business ContinuityHitachi Data Services. Business Continuity
Hitachi Data Services. Business Continuity
 
Auditing supply chain logistics -CTPAT
Auditing supply chain logistics -CTPATAuditing supply chain logistics -CTPAT
Auditing supply chain logistics -CTPAT
 

Similar to Forensic data investigations in China

Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
DaniyaHuzaifa
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
pabrown1219
 
The ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth ReviewThe ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth Review
John P. Collins | Information Governance
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
drennanmicah
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
Dan Michaluk
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
amritanshu4u
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
One97 Communications Limited
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
Jonathan Bacon
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
Donald Tabone
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & Innovation
David Koosis
 
The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical Issues
Richard Austin
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
Law Practice Strategy
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
ButlerRubin
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
scubastog
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
Craig Mullins
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
J. David Morris
 

Similar to Forensic data investigations in China (20)

Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
The ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth ReviewThe ESI Data Map, An In-Depth Review
The ESI Data Map, An In-Depth Review
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & Innovation
 
The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical Issues
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
 

More from Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
Enterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Enterprise Security Risk Management
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Efficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web ApplicationsEfficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web Applications
Harwinder Singh
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
IPLTech Electric
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
RedSeer
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
BBPMedia1
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
thesiliconleaders
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
PennapaKeavsiri
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
ZevinAttisha
 
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
concepsionchomo153
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
obriengroupinc04
 
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
dpbossdpboss69
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
valvereliz227
 
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
➑➌➋➑➒➎➑➑➊➍
 
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
ISONIKELtd
 
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
Cambridge Product Management Network
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
➑➌➋➑➒➎➑➑➊➍
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
Arijit Dutta
 

Recently uploaded (20)

Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Efficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web ApplicationsEfficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web Applications
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
 
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
 
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
 
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN8328958814KALYAN MATKA | MATKA RESULT | KALYAN
8328958814KALYAN MATKA | MATKA RESULT | KALYAN
 
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
1 Circular 003_2023 ISO 27001_2022 Transition Arrangments v3.pdf
 
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
2024.06 CPMN Cambridge - Beyond Now-Next-Later.pdf
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
 

Forensic data investigations in China

  • 1. Forensic Data Investigations in China ASIS 3rd Annual Asia Pacific Conference February 2009 A global expert services company providing expert testimony, authoritative studies, and strategic advisory services to clients including Fortune Global 500 corporations, major law firms, and governments worldwide. www.lecg.com
  • 2. 2 Topics  Drivers (aka: why you should care)  Investigation  Compliance  Litigation  Challenges  Legal  Logistical  Technical  Getting Ready  Case Studies
  • 3. 3 Drivers  Investigations  Internal incident response  Internal investigation  Fraud  Theft of intellectual property  Compliance/Congressional  FCPA  CFAA  Antitrust/Anti-dumping  Local compliance expectation
  • 4. 4 Drivers  Litigation  Intellectual property  Product liability  Class action
  • 5. 5 Where do computers come into all this?  Estimated that well over 90% of information is held digitally  International and local landscape on computers & crime:  FBI sets up CART 1991  IOCE former 1995  G8 Lyons Group former 1998  ASEAN MMT, ASEAN +1, ASEAN+3  INTERPOL Asia Pacific Working Group on IT Crime  Japan HITEC, Hong Kong TCD, PRC PSB
  • 6. 6 The very long-arm of the law  FCPA  1977 Law  Imposes criminal and civil penalties for bribing foreign officials to obtain or maintain contracts  Covers the corporation overseas and its agents  Working with SOEs in China – all employees considered government officials  CFAA  Part of Title 18 on Fraud  Covers fraud through unauthorised access or exceeding authorised access (internal fraud)  Amended by PATRIOT Act in 2001 to append extraterritoriality
  • 7. 7 Changes to the Civil Litigation Landscape  “Have your IT house in order”  Hon Lee Rosenthal, Chair, Federal Rules Committee  “If it is critical to the success of your case to admit into evidence computer stored records, it would be prudent to plan to authenticate the record by the most rigorous standard that may be applied”  Hon Paul Grimm, US magistrate, Maryland  “The ground has shifted....by these new rules”  Hon John Facciola, US magistrate, Washington DC
  • 8. 8 What changes?  United States Federal Rules of Civil Procedure  Amended December 2006  Six years to determine amendments  Specifically describes Discovery of “Electronically Stored Information” (ESI)  Ongoing impact and precedents  March 2007 Federal Judges' guide to ESI  Maryland Protocol
  • 9. 9 What Rules?  Inclusion of ESI (Rule 34)  Scope and accessibility  Form of production (Rule 34(b)  “Claw Back” (Rule 26(b)(5))  Preservation and sanction  Early attention (Rules 26(f)(3), 16(b)(5), 16(b)(6))
  • 10. 10 What does that mean?  Effectively brings civil and criminal action to the same standard regarding digital evidence  Long Arm precedent in less than one year:  Columbia Pictures Industries vs Bunnell, May 2007, US District Court CA  Foreign statutes do not deprive an American court of the power to order a party subject to its jurisdiction to produce
  • 11. 11 Why you have to get it right  Zubulake vs UBS Warburg LLC  The obligation to preserve evidence arises when the party has notice that the evidence is relevant to the litigation or when a party should have known that the evidence may be relevant to future litigation  It is not sufficient to notify all employees of a litigation hold and then expect that the party will then retain and produce all relevant information  UBS Warburg – roughly 100 pages of email, Zubulake – roughly 400 pages of email  Judge: adverse inference advice to jury  USD 9.1 in compensation, USD 20.2 million in punitive damages  Coleman (Parent) Holdings vs Morgan Stanley  Morgan Stanley produced email partway through trial from newly discovered backup tapes  Adverse inference: USD 603 million in compensation and USD 850 million in punitive damages
  • 12. 12 The Other Jurisdiction?  China does not have a “blocking statute” however....  Article 40 of the Constitution  “the freedom and privacy of correspondence of citizens of the People's Republic of China are protected by law. No organisation or individual may, on any grounds, infringe upon the freedom and privacy of citizens' correspondence”  Regulations on Employment Service and Employment Management  Oct 30 2007  “Any publicity of personal data of laborers and any use of... laborers' intellectual achievements shall be used under written consent of laborers”  Scope??
  • 13. 13 PRC, the internet and email  1997 Administrative Measures on Security Protection for International Connections to Computer Information Networks  No one may use internet connections to “infringe upon...legal rights and interests of citizens”  Article 7  2006 Measures for the Administration of Internet Email Services  Article 10  Definition of “non-operator Internet information services”
  • 14. 14 So the laws are circling....now what?  Where is the data physically?  Local offices  Data centres  Who do you have to help?  Investigations personnel  IT administrator  Legal counsel  Outside help  Outside counsel  Third party expert support  Are you/they authorised to investigate or represent you in China?
  • 15. 15 Other logistical challenges  Where is the data logically?  Do you have an up-to-date data map?  What's a data map?  Do you have an enterprise network diagram?  What user data and what enterprise data is needed?  Email – where is it? User's PC? Server? Blackberry/smartphone? All of them?  Files – local copies? File servers?  CDs, thumb drives?  Backup tapes and systems?  Any legacy systems?
  • 16. 16 So now you can start to collect....  Collection expectations:  ACPO  Maryland Protocol  Volume:  1GB = 75,000 pages  1CD = 20 boxes  1 DVD = 150 boxes  40GB HDD = 1,200 boxes  300 GB HDD = 9,000 boxes
  • 17. 17 Technical challenges  Legacy systems  Machines still around? Working?  Cost to collect/examine/produce? Penalty for failure?  Back-up systems  Identified?  Formats? Cost to restore?  Rotation and housekeeping?
  • 18. 18 More technical challenges  Enterprise systems  3D CAD  Proprietary formats  Structured data  Language  Review and analysis  Technical processing: ASCII, Unicode, and legacy code pages  LOTS AND LOTS OF LITTLE SQUARES  Validity of review
  • 19. 19 So what can you do about all this?  Corporate digital data readiness  Do not reinvent the wheel  CISO/CIO?  Incident Response  Information classification policy  Pre-define roles and responsibilities – CSO to legal counsel  Identify skill-sets and hire those that make sense  Know the law  US emphasis on pre-trial conference  Third-party ESI expert  Know the technology
  • 21. 21 Case Study: Securities Class Action  Chinese technology company listed in US  Share price goes down. Class action launched  Adverse inference strategy...?  The challenge:  100+ custodian PCs  Unknown network configuration  Unknown enterprise systems  The solution:  ESI source mapping emphasis  Selective acquisition of documented data sources
  • 22. 22 Case Study: IP Litigation  Technology companies in dispute over team defection  China facilities in-scope  The challenge:  Multiple custodian PCs  Multi-server CAD environment  Multi-server design version control environment  The solution:  Technical review of enterprise system  Forensic acquisition  Server re-build: defensible, repeatable
  • 23. 23 Thank You Any Questions?
  • 24. 24 Contact Details LECG Hong Kong Limited 3505-06 Tower Two Lippo Centre Admiralty Hong Kong T: +852 2106 3800 (Richard Kershaw) E: RKershaw@lecg.com