I presented comprehensive e-discovery webinar with Eric Mandel, national e-discovery counsel and leader of the information law practice group at Zelle Hofmann Voelbel & Mason LLP.
Here are a selection of the slides that I created for the presentation
DBA Presentation On E-Discovery by Kirby DrakeKlemchuk LLP
This document provides an overview of electronic discovery (e-discovery) including the e-discovery process, key influencers like company size and data infrastructure, and the typical e-discovery model. It discusses 2015 rule changes focusing on proportionality and cooperation. Key takeaways include thinking and acting proportionally, having early discussions to define discovery scope, and using honesty and diligence. The document also covers specific issues like social media discovery, email and privilege challenges, preservation obligations, and case examples where parties ran into issues or sanctions related to e-discovery and preservation.
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...Kirby Drake
This presentation discusses various court decisions relevant to electronic discovery and concludes with a discussion of the intersection between e-discovery and social media.
Electronic Document Retention And Legal HoldsJohn Jablonski
Overview of the duty to preserve records, the Seven Steps of a legal hold business process and basic evidence for the admissibility of electronic evidence (aka ESI)
Systems, Processes & Challenges in litigation involves determining when to implement a litigation hold to preserve relevant documents. A litigation hold is necessary when litigation is reasonably anticipated based on a filed lawsuit or subpoena. The duty to preserve evidence arises when litigation is anticipated. Once implemented, the litigation hold must be properly scoped, documented, communicated to relevant parties, and monitored for compliance. Automating the litigation hold process can help manage costs and ensure preservation duties are met.
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
This document discusses ensuring that e-discovery procedures comply with new rules. It covers topics like preservation notices, meet and confer requirements, discovery strategies, protective orders, structuring protocols, and using experts. Preservation notices should follow Zubulake decisions as a benchmark for when the duty to preserve evidence arises. Meet and confer requirements involve early discussions between parties to avoid evidence spoliation. Common discovery strategies include interrogatories, document requests, and depositions. Protective orders may be needed to combat overly broad requests. Protocols should address issues like costs, data handling procedures, and confidentiality protections. Experts can help with tasks like computer forensics but selecting the right one is important.
Responding to Grand Jury: Subpoenas & Search WarrantsNexsen Pruet
The document discusses responding to criminal subpoenas, with a focus on subpoenas duces tecum for documents. It notes that criminal subpoenas are broader than civil subpoenas and provides tips for initial review of a subpoena, potential challenges, document search and production process, and expenses of compliance. It also discusses responding if a search warrant is executed, including establishing an advance planning and response protocol to protect legal interests while cooperating.
Total Evidence Management (TEM) is an approach to efficiently manage both digital and physical evidence for complex litigation in the digital age. TEM combines all relevant evidence, including documents, emails, audio/video files, and metadata from various sources into a centralized electronic repository. This repository allows lawyers to preserve, process, review, analyze, organize and collaborate on evidence. By using TEM, lawyers can save clients time and money in the discovery process where most cases are won or lost, rather than during the courtroom trial.
DBA Presentation On E-Discovery by Kirby DrakeKlemchuk LLP
This document provides an overview of electronic discovery (e-discovery) including the e-discovery process, key influencers like company size and data infrastructure, and the typical e-discovery model. It discusses 2015 rule changes focusing on proportionality and cooperation. Key takeaways include thinking and acting proportionally, having early discussions to define discovery scope, and using honesty and diligence. The document also covers specific issues like social media discovery, email and privilege challenges, preservation obligations, and case examples where parties ran into issues or sanctions related to e-discovery and preservation.
PASSCO - Examining the Ebb and Flow of Electronic Discovery: Tips, Tools, and...Kirby Drake
This presentation discusses various court decisions relevant to electronic discovery and concludes with a discussion of the intersection between e-discovery and social media.
Electronic Document Retention And Legal HoldsJohn Jablonski
Overview of the duty to preserve records, the Seven Steps of a legal hold business process and basic evidence for the admissibility of electronic evidence (aka ESI)
Systems, Processes & Challenges in litigation involves determining when to implement a litigation hold to preserve relevant documents. A litigation hold is necessary when litigation is reasonably anticipated based on a filed lawsuit or subpoena. The duty to preserve evidence arises when litigation is anticipated. Once implemented, the litigation hold must be properly scoped, documented, communicated to relevant parties, and monitored for compliance. Automating the litigation hold process can help manage costs and ensure preservation duties are met.
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
This document discusses ensuring that e-discovery procedures comply with new rules. It covers topics like preservation notices, meet and confer requirements, discovery strategies, protective orders, structuring protocols, and using experts. Preservation notices should follow Zubulake decisions as a benchmark for when the duty to preserve evidence arises. Meet and confer requirements involve early discussions between parties to avoid evidence spoliation. Common discovery strategies include interrogatories, document requests, and depositions. Protective orders may be needed to combat overly broad requests. Protocols should address issues like costs, data handling procedures, and confidentiality protections. Experts can help with tasks like computer forensics but selecting the right one is important.
Responding to Grand Jury: Subpoenas & Search WarrantsNexsen Pruet
The document discusses responding to criminal subpoenas, with a focus on subpoenas duces tecum for documents. It notes that criminal subpoenas are broader than civil subpoenas and provides tips for initial review of a subpoena, potential challenges, document search and production process, and expenses of compliance. It also discusses responding if a search warrant is executed, including establishing an advance planning and response protocol to protect legal interests while cooperating.
Total Evidence Management (TEM) is an approach to efficiently manage both digital and physical evidence for complex litigation in the digital age. TEM combines all relevant evidence, including documents, emails, audio/video files, and metadata from various sources into a centralized electronic repository. This repository allows lawyers to preserve, process, review, analyze, organize and collaborate on evidence. By using TEM, lawyers can save clients time and money in the discovery process where most cases are won or lost, rather than during the courtroom trial.
Electronic Document Management And DiscoveryRonald Coleman
Presentation given as part of Delaware Bar Association Computer Law Section CLE program, "E-Commerce law: Critical Legal and Business Issues."
Many of the particulars of this presentation are relatively obsolete now.
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller
The document provides an overview of drafting and executing electronic forensic protocols for computer forensic examinations. It discusses best practices for completing three main stages: (1) drafting the protocol which defines what data will be examined and how, (2) harvesting data from target devices using appropriate forensic tools, and (3) reviewing the data to identify responsive files and ultimately delete files agreed upon by both parties. The document emphasizes selecting a qualified forensic expert, tailoring the protocol to each case, and maintaining evidentiary integrity throughout the examination process.
The document discusses bridging the gap between forensics and e-discovery in civil and criminal cases. It provides an overview of recent changes to federal and state discovery rules regarding electronic data. It also compares differences between e-discovery and computer forensics practices. Finally, it offers best practice suggestions for practitioners, including using commonly available formats and staying up-to-date on rule and case law changes.
The document discusses electronic forensic examinations in trade secret theft cases. It covers the legal basis for forensic examinations under In re Weekley Homes, L.P., selecting a qualified forensic expert, drafting forensic protocols, examining target devices and data, reviewing extracted information, international collection considerations, and DTSA notice requirements for employment agreements.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
Experience Mazda Zoom Zoom Lifestyle and Culture by Visiting and joining the Official Mazda Community at http://www.MazdaCommunity.org for additional insight into the Zoom Zoom Lifestyle and special offers for Mazda Community Members. If you live in Arizona, check out CardinaleWay Mazda's eCommerce website at http://www.Cardinale-Way-Mazda.com
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
E-Discovery is becoming an increasing important part of the legal process. The effect of social media, e-mail and other electronic correspondence in lawsuits including civil and criminal matters and even divorce has become dramatic. What do lawyers need to do to preserve this evidence? What can happen if you don't?
Litigation Tips for Complex Administrative Law Casesannskowronski
Expert witnesses can help clarify complex issues in administrative cases but may also complicate discovery. When considering designating an expert, attorneys should weigh whether their testimony is necessary and the potential impacts on discovery. If an expert is designated, they must be prepared for the scope of discovery, as their work product and communications are generally not privileged. Learned treatises can also be used to support or impeach testifying experts if properly introduced.
Litigation Tips for Complex Administrative Law Casesandresmedrano249
Expert witnesses can help clarify complex issues in administrative cases but may also complicate discovery. Parties should carefully consider whether designating an expert is necessary and beneficial for their case or will overly burden discovery. Any potential expert witnesses should be prepared early for the scope of discovery, as their documents and communications are not protected. Learned treatises can support or impeach testifying experts if properly introduced through questioning.
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...Kirby Drake
This document summarizes key lessons from the landmark e-discovery case Qualcomm v. Broadcom from 10 years ago. It discusses how e-discovery has evolved to include a wide range of electronically stored information. It analyzes problems that arose in Qualcomm due to lack of responsibility over document collection and verification. Key lessons outlined include the importance of being truthful, erring on the side of production, having a clear plan for compliance, and properly documenting discovery efforts. The document also provides guidance on current e-discovery best practices and considerations for social media discovery.
Computer Assisted Review and Reasonable Solutions under Rule26Michael Geske
The document discusses various studies conducted by the Electronic Discovery Institute on topics related to meeting reasonableness requirements for discovery responses under the Federal Rules of Civil Procedure. It summarizes several studies, including ones on de-duplication of documents, categorization of documents, and email threading. The studies found that these technology-assisted processes can help reduce costs and improve accuracy and speed of discovery compared to solely human review.
Inter Partes Review - Learning From the Denied PetitionsKlemchuk LLP
This document summarizes key considerations from inter partes review petitions that have been denied. It outlines the IPR process and requirements for petitions. It then analyzes examples of denied petitions, finding common reasons were failures to properly construe claims, support obviousness combinations, address patent owner responses, and provide sufficient expert testimony. It concludes with best practices such as avoiding time bars, strengthening expert opinions, considering claim construction, and thoroughly responding to petitions.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Patent Law Review - IP Year in Review CLE v2Bryan Beel
This document provides a summary of a presentation on recent developments in patent law given to the Oregon State Bar Intellectual Property Section. It discusses several topics, including proposed patent legislation, practice before the International Trade Commission and Patent and Trademark Office, as well as recent decisions from the Federal Circuit and Supreme Court that have impacted patent law. The presentation was delivered by Bryan Beel of Perkins Coie LLP on February 14, 2014.
This document provides an overview of electronic discovery (eDiscovery) including defining electronically stored information (ESI), understanding the eDiscovery process, and Hudson Legal's role. It explains that ESI includes emails, documents, social media posts and more. The eDiscovery process is broken down into the nine phases of the Electronic Discovery Reference Model (EDRM) including identification, preservation, collection, processing, review, analysis, production and presentation. Hudson Legal assists with project management, document review, and quality control during the review process.
A Trial Lawyer's Approach to Ethical Problems in E-DiscoveryBrendan Kenny
The document discusses the ethical challenges of electronic discovery (ediscovery) in litigation. It outlines attorneys' duties related to competence, confidentiality, candor and fairness under the Model Rules of Professional Conduct as they apply to ediscovery. Case law examples show courts sanctioning attorneys for failing to locate relevant electronically stored information, protect privileged communications, make false statements about evidence, and engage in obstructionist discovery tactics. Emerging technologies like social media and cloud computing are also raising new ethical issues regarding client information security and accessibility. Overall, the document emphasizes that attorneys must understand ediscovery to competently represent clients while avoiding ethical violations.
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
The document discusses cybercrime and digital investigation. It begins with defining cybercrime and listing its common forms. It then discusses the underground economy of cybercrime, describing how criminal networks operate similarly to legitimate businesses. Several specific cybercrimes are examined in depth, including malware, data theft, identity theft, phishing, and botnets. The document also profiles some case studies of major cybercriminal groups and hacking incidents to illustrate how crimes are committed. It aims to outline the scope and techniques of cybercrime threats.
This document provides an overview of e-discovery and why it should be a priority for organizations. Key points include:
- E-discovery is the process of identifying, preserving, and producing electronic information for legal cases. It is important due to the large volume of electronic data and growing legal obligations.
- Getting the right e-discovery capabilities can help organizations respond more effectively to lawsuits, potentially avoid lawsuits, and reduce costs of email management and litigation.
- The document outlines important e-discovery lessons from past court cases and why data from multiple sources may need to be included in e-discovery processes.
E Discovery General E Discovery Presentationjvanacour
This document provides an overview of key concepts and best practices regarding electronic discovery (e-discovery). It discusses the duty to preserve relevant evidence once litigation is reasonably anticipated. It also outlines the stages of managing e-discovery, including having a reasonable document retention policy prior to notice, issuing a litigation hold once notice is received, and complying with discovery requests once litigation begins. The document emphasizes communicating preservation obligations, overseeing preservation efforts, and producing electronic documents and metadata in a usable format.
This document provides an overview of EMC, a company that provides tools and solutions for information management. EMC helps customers design, build, and manage intelligent information infrastructures to exploit the value of information for business advantage. EMC works with organizations of all sizes across various industries. It offers solutions, services, software, and systems to help customers meet critical business challenges relating to archiving, backup, compliance, and more. EMC has a strong record of innovation and leadership in the data storage market, and has over 33,000 employees worldwide.
Electronic Document Management And DiscoveryRonald Coleman
Presentation given as part of Delaware Bar Association Computer Law Section CLE program, "E-Commerce law: Critical Legal and Business Issues."
Many of the particulars of this presentation are relatively obsolete now.
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller
The document provides an overview of drafting and executing electronic forensic protocols for computer forensic examinations. It discusses best practices for completing three main stages: (1) drafting the protocol which defines what data will be examined and how, (2) harvesting data from target devices using appropriate forensic tools, and (3) reviewing the data to identify responsive files and ultimately delete files agreed upon by both parties. The document emphasizes selecting a qualified forensic expert, tailoring the protocol to each case, and maintaining evidentiary integrity throughout the examination process.
The document discusses bridging the gap between forensics and e-discovery in civil and criminal cases. It provides an overview of recent changes to federal and state discovery rules regarding electronic data. It also compares differences between e-discovery and computer forensics practices. Finally, it offers best practice suggestions for practitioners, including using commonly available formats and staying up-to-date on rule and case law changes.
The document discusses electronic forensic examinations in trade secret theft cases. It covers the legal basis for forensic examinations under In re Weekley Homes, L.P., selecting a qualified forensic expert, drafting forensic protocols, examining target devices and data, reviewing extracted information, international collection considerations, and DTSA notice requirements for employment agreements.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
Experience Mazda Zoom Zoom Lifestyle and Culture by Visiting and joining the Official Mazda Community at http://www.MazdaCommunity.org for additional insight into the Zoom Zoom Lifestyle and special offers for Mazda Community Members. If you live in Arizona, check out CardinaleWay Mazda's eCommerce website at http://www.Cardinale-Way-Mazda.com
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
E-Discovery is becoming an increasing important part of the legal process. The effect of social media, e-mail and other electronic correspondence in lawsuits including civil and criminal matters and even divorce has become dramatic. What do lawyers need to do to preserve this evidence? What can happen if you don't?
Litigation Tips for Complex Administrative Law Casesannskowronski
Expert witnesses can help clarify complex issues in administrative cases but may also complicate discovery. When considering designating an expert, attorneys should weigh whether their testimony is necessary and the potential impacts on discovery. If an expert is designated, they must be prepared for the scope of discovery, as their work product and communications are generally not privileged. Learned treatises can also be used to support or impeach testifying experts if properly introduced.
Litigation Tips for Complex Administrative Law Casesandresmedrano249
Expert witnesses can help clarify complex issues in administrative cases but may also complicate discovery. Parties should carefully consider whether designating an expert is necessary and beneficial for their case or will overly burden discovery. Any potential expert witnesses should be prepared early for the scope of discovery, as their documents and communications are not protected. Learned treatises can support or impeach testifying experts if properly introduced through questioning.
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...Kirby Drake
This document summarizes key lessons from the landmark e-discovery case Qualcomm v. Broadcom from 10 years ago. It discusses how e-discovery has evolved to include a wide range of electronically stored information. It analyzes problems that arose in Qualcomm due to lack of responsibility over document collection and verification. Key lessons outlined include the importance of being truthful, erring on the side of production, having a clear plan for compliance, and properly documenting discovery efforts. The document also provides guidance on current e-discovery best practices and considerations for social media discovery.
Computer Assisted Review and Reasonable Solutions under Rule26Michael Geske
The document discusses various studies conducted by the Electronic Discovery Institute on topics related to meeting reasonableness requirements for discovery responses under the Federal Rules of Civil Procedure. It summarizes several studies, including ones on de-duplication of documents, categorization of documents, and email threading. The studies found that these technology-assisted processes can help reduce costs and improve accuracy and speed of discovery compared to solely human review.
Inter Partes Review - Learning From the Denied PetitionsKlemchuk LLP
This document summarizes key considerations from inter partes review petitions that have been denied. It outlines the IPR process and requirements for petitions. It then analyzes examples of denied petitions, finding common reasons were failures to properly construe claims, support obviousness combinations, address patent owner responses, and provide sufficient expert testimony. It concludes with best practices such as avoiding time bars, strengthening expert opinions, considering claim construction, and thoroughly responding to petitions.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Patent Law Review - IP Year in Review CLE v2Bryan Beel
This document provides a summary of a presentation on recent developments in patent law given to the Oregon State Bar Intellectual Property Section. It discusses several topics, including proposed patent legislation, practice before the International Trade Commission and Patent and Trademark Office, as well as recent decisions from the Federal Circuit and Supreme Court that have impacted patent law. The presentation was delivered by Bryan Beel of Perkins Coie LLP on February 14, 2014.
This document provides an overview of electronic discovery (eDiscovery) including defining electronically stored information (ESI), understanding the eDiscovery process, and Hudson Legal's role. It explains that ESI includes emails, documents, social media posts and more. The eDiscovery process is broken down into the nine phases of the Electronic Discovery Reference Model (EDRM) including identification, preservation, collection, processing, review, analysis, production and presentation. Hudson Legal assists with project management, document review, and quality control during the review process.
A Trial Lawyer's Approach to Ethical Problems in E-DiscoveryBrendan Kenny
The document discusses the ethical challenges of electronic discovery (ediscovery) in litigation. It outlines attorneys' duties related to competence, confidentiality, candor and fairness under the Model Rules of Professional Conduct as they apply to ediscovery. Case law examples show courts sanctioning attorneys for failing to locate relevant electronically stored information, protect privileged communications, make false statements about evidence, and engage in obstructionist discovery tactics. Emerging technologies like social media and cloud computing are also raising new ethical issues regarding client information security and accessibility. Overall, the document emphasizes that attorneys must understand ediscovery to competently represent clients while avoiding ethical violations.
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
The document discusses cybercrime and digital investigation. It begins with defining cybercrime and listing its common forms. It then discusses the underground economy of cybercrime, describing how criminal networks operate similarly to legitimate businesses. Several specific cybercrimes are examined in depth, including malware, data theft, identity theft, phishing, and botnets. The document also profiles some case studies of major cybercriminal groups and hacking incidents to illustrate how crimes are committed. It aims to outline the scope and techniques of cybercrime threats.
This document provides an overview of e-discovery and why it should be a priority for organizations. Key points include:
- E-discovery is the process of identifying, preserving, and producing electronic information for legal cases. It is important due to the large volume of electronic data and growing legal obligations.
- Getting the right e-discovery capabilities can help organizations respond more effectively to lawsuits, potentially avoid lawsuits, and reduce costs of email management and litigation.
- The document outlines important e-discovery lessons from past court cases and why data from multiple sources may need to be included in e-discovery processes.
E Discovery General E Discovery Presentationjvanacour
This document provides an overview of key concepts and best practices regarding electronic discovery (e-discovery). It discusses the duty to preserve relevant evidence once litigation is reasonably anticipated. It also outlines the stages of managing e-discovery, including having a reasonable document retention policy prior to notice, issuing a litigation hold once notice is received, and complying with discovery requests once litigation begins. The document emphasizes communicating preservation obligations, overseeing preservation efforts, and producing electronic documents and metadata in a usable format.
This document provides an overview of EMC, a company that provides tools and solutions for information management. EMC helps customers design, build, and manage intelligent information infrastructures to exploit the value of information for business advantage. EMC works with organizations of all sizes across various industries. It offers solutions, services, software, and systems to help customers meet critical business challenges relating to archiving, backup, compliance, and more. EMC has a strong record of innovation and leadership in the data storage market, and has over 33,000 employees worldwide.
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...Brendan Kenny
This CLE webinar provides products liability counsel with a review of the challenges that arise when preserving, collecting, and producing documents in response to burdensome e-discovery requests from plaintiff’s counsel. The panel prepares litigators for upcoming amendments to the Federal Rules of Civil Procedure covering proportionality and sanctions for failing to preserve electronically stored information.
The document discusses various topics related to witness preparation by lawyers. It notes that witness preparation is not directly regulated and there is little case law or scholarly literature on the topic. While lawyers have a duty to zealously represent clients, they cannot knowingly assist witnesses to testify falsely or commit perjury. The document discusses challenges around distinguishing proper witness preparation from improper coaching. It also discusses techniques used in witness preparation like "the lecture" and debates around simultaneous witness interviews. Overall, the document examines the ethical boundaries and gray areas of lawyers preparing witnesses for testimony or deposition.
Administrative Adjudications by Civil Service Commissions in the State of Cal...Justin Hein
On September 26, 2013, Steven L. Simas presented a seminar on Administrative Adjudications by Civil Service Commissions in the State of California. This was part of a joint presentation by the Sacramento County Bar Association, Administrative and Labor & Employment sections.
This document discusses the ethical pitfalls lawyers can face when using social media. It identifies four main traps: (1) the myth that social media posts are private, (2) forgetting that ethics rules and terms of service still apply on social platforms, (3) improperly using social media for discovery or investigations, and (4) failing to counsel clients on their own social media use. The document provides examples of lawyers receiving sanctions for improper social media use and outlines dos and don'ts for lawyers on social platforms.
GWAVACon 2013: Why is third party archiving still neccessary?GWAVA
This document compares the archiving capabilities of Microsoft Exchange/Office 365 with a third-party archiving solution from GWAVA. It notes that Exchange/Office 365 have limited archiving capabilities and outlines scenarios where a third-party solution provides benefits like relieving the Exchange server, faster searches, audit requests, eDiscovery, migration support, avoiding lost emails, and switching Office 365 plans. It then discusses specific limitations of Exchange/Office 365 archiving and advantages of the GWAVA solution in areas like costs, retention policies, deletion prevention, eDiscovery, and data export.
E Discovery and Archiving in Microsoft Office 365 - Presented by AtidanDavid J Rosenthal
The document discusses eDiscovery and archiving capabilities in Office 365. It provides an agenda that covers eDiscovery, archiving and hold features, and includes demonstrations and a question and answer section. Key capabilities highlighted include automated time-based criteria for deleting items, setting retention policies at the item, folder and site levels, searching across multiple Office 365 products with de-duplication, and integrated tools to preserve, expire and discover data with case management and search result export functions. The presentation also discusses in-place archiving and hold capabilities including customizing holds based on filters and placing holds across multiple products in a single action.
Présentation en français des fonctionnalités d'EDiscovery au sein d'Office 365, dans les plans E3 et E5. Ediscovery Center et Advanced Analytics (Equivio)
This document provides guidance on using the App Model for developing and deploying custom solutions in SharePoint Online Dedicated. It discusses governance considerations for app-based solutions, the different types of apps that are supported including SharePoint-hosted and provider-hosted apps, planning for app development and deployment, and configuration requirements for supporting provider-hosted apps in SharePoint Online Dedicated.
Although Microsoft has done quite a good job at creating a robust and scalable platform in Office 365 that can satisfy the requirements of many organizations, there are some organizations that will need compliance and security capabilities not available natively in the platform. This white paper discusses what Office 365 will and will not do, and discusses where supplemental offerings from third-party vendors will prove to be beneficial.
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLaboraDK
This document provides an overview of Office 365 compliance and archiving capabilities. It discusses how compliance features in Office 365 like data loss prevention, auditing, and eDiscovery help secure and govern sensitive data. It also describes how Exchange Online Archiving allows users to store inactive email in the cloud for long-term retention and compliance purposes. The document demonstrates how archives can be accessed from Outlook, OWA, and other clients and how retention policies and tags can be used to automatically archive emails.
5 Key Things to Know About eDiscovery and How to Implement Them in Your PracticeESI Attorneys LLC
A primer for attorneys, legal professionals, board members and business people on what to be aware of with digital information and the process of electronic discovery.
ROI of Office 365: Forrester Total Economic Impact SummaryWhy Microsoft
The document summarizes a study by Forrester Consulting on the total economic impact of Microsoft Office 365 for enterprise customers. The study found that the composite organization experienced a 163% three-year ROI and $5.6 million in risk-adjusted net present value from adopting Office 365. Key benefits included cost savings from improved mobility, control and compliance, business intelligence, and enterprise social capabilities. The payback period for Office 365 implementation was estimated to be 7 months.
This is a deck I presented at SharePoint Saturday Chicago Suburbs, on March 19, 2016. I explain the roles that an Office 365 Administrator is expected to play and offer advice on best practices.
Law, Ethics & Technology: e-Discovery and e-Competencejcassd619
The document discusses key aspects of electronic discovery (e-discovery) in litigation cases. It covers topics like a lawyer's duty to understand electronic sources of information that could be relevant in a case, how to properly preserve and collect electronically stored information (ESI), the importance of meeting and conferring with opposing counsel on an e-discovery protocol, and risks of sanctions or other penalties for mishandling ESI. It also provides some practice points on effectively managing e-discovery in the litigation process.
This document summarizes key topics in electronic discovery (e-discovery) including: the types of electronically stored information (ESI) that now exists; how e-discovery rules and case law have evolved to address ESI; common e-discovery issues like litigation holds, accessibility tiers, and sanctions; and ethical implications for attorneys regarding e-discovery competency and diligence. Recent cases demonstrate courts' increasing willingness to impose severe sanctions like adverse inferences, monetary penalties, default judgments, or case dismissal for failure to properly preserve ESI or comply with discovery orders.
This document discusses topics to cover in a pre-discovery conference, including the scope of discovery, search strategies, preservation of electronic documents, privilege issues, and cooperation between parties. An effective pre-discovery conference requires understanding the issues in the case, how clients store documents, and where relevant information can be found. It aims to narrow the scope of discovery and develop strategies for identifying, collecting, and reviewing electronic documents in a reasonable manner. Areas of disagreement should also be addressed.
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
If you say the word “discovery” to a litigator, the reaction may not be kind. Discovery-the exchange of relevant information- usually in the form of documents or oral depositions, takes up the majority of a litigator’s time and costs clients the most money.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/discovery-practice-2020/
Document Retention And Destruction Power Pointlnarvid
This document discusses the importance of implementing a thorough electronic records retention policy for companies. It outlines 7 key steps to ensure compliance with e-discovery rules and avoid sanctions, including: 1) understanding IT systems, 2) creating a detailed retention schedule and procedures, 3) instituting a litigation hold process, 4) training employees, 5) designating a records manager, 6) forming a retention committee, and 7) preserving former employees' hard drives. Failure to follow these steps could result in massive monetary penalties or adverse inferences, as shown in several court cases discussed in the document.
The document discusses several factors to consider when choosing a federal vs state forum for a class action lawsuit. It addresses appealability of certification decisions, approval requirements for pre-certification dismissals, how trials are conducted regarding case processing speed and jury practices, and settlement approval processes. It also summarizes amendments to the Federal Rules of Civil Procedure governing electronic discovery, including initial disclosures, discovery conferences, and limitations on accessing inaccessible data.
Can I Get A Witness? Technical Witness BootcampPriyanka Aash
As the stakes rise in data breach litigation, more and more information security professionals will be called upon to testify on behalf of their organization. This boot camp will teach participants the basics of providing solid, credible testimony, and point out traps for the unwary first time witness.
(Source: RSA Conference USA 2017)
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
This webinar discusses discovery practice in litigation. It begins with an overview of the rules governing discovery, including initial disclosures, written discovery like requests for production of documents and interrogatories, and oral discovery such as depositions. It covers topics like proportionality, preservation of electronic data, discovery from non-parties, and expert discovery procedures. The webinar provides both an explanation of the procedural rules and practical guidance about managing the discovery process.
The document discusses new rules under the Federal Rules of Civil Procedure regarding electronically stored information (ESI) and litigation holds. It notes that the 2006 amendments require lawyers to discuss ESI during initial planning conferences and include ESI in initial disclosures. Failure to institute a litigation hold and preserve potentially relevant ESI when litigation is reasonably anticipated can result in severe sanctions, including adverse inference instructions and millions in damages. The document provides best practices for organizations to develop an ESI retention policy and storage configuration to safely manage ESI and qualify for the "safe harbor" provision against sanctions.
Document review, in the context of litigation and legal proceedings, is the process by which each party to the proceeding examines, sorts, and analyses all documents, data, and electronic information in their possession to determine which materials are relevant to the proceeding and which should be withheld from production. Most discovery and ediscovery actions are built around this procedure.
This document provides an overview of e-discovery and the Federal Rules of Civil Procedure related to e-discovery. It discusses the importance of mastering e-discovery, as e-discovery now represents approximately 35% of litigation costs. It introduces the Electronic Discovery Reference Model and outlines key parts of the Federal Rules of Civil Procedure addressing e-discovery, including Rules 16, 26, 34 and 37. It also summarizes the state of e-discovery after amendments to the Federal Rules of Civil Procedure in 2015 regarding the scope of discovery and failure to preserve electronically stored information.
Lawyer competency in the age of e-discovery Logikcull.com
This document contains summaries of key points from a presentation on lawyer competency in eDiscovery. It discusses:
- The need for lawyers to develop technological competence in eDiscovery and embrace 21st century tools to handle electronic evidence cost-effectively.
- Current law regarding the preservation and production of electronically stored information (ESI) in discovery, including mobile device data, cloud data, and acceptable search methodologies.
- How lawyers must safeguard client confidences, prevent unauthorized disclosures, and protect privilege over attorney work product and communications, given the risks posed by technologies.
- Affirmative duties of counsel in eDiscovery, such as assessing a client's information governance practices and ensuring an effective
The Oregon State Bar approved a new ethics opinion on metadata. The opinion discusses a lawyer's duty to remove metadata from electronic documents sent to others and the appropriate actions if metadata is received from another lawyer. It finds that lawyers must take reasonable care to prevent inadvertent disclosure of confidential metadata and may use metadata intentionally left in a received document but should notify the sender if metadata was inadvertently included. Using special software to search for hidden metadata may violate ethics rules if reasonable efforts were made to remove it.
This document discusses laws governing electronic data and seizure, including key cases like Zubulake v. USB Warburg and US v. Arthur Andersen. It covers topics like data preservation duties arising from litigation, sanctions for spoliation of evidence, the Sarbanes-Oxley Act increasing document retention requirements, HIPAA privacy rules, the Stored Communications Act, and the importance of meet and confer requirements under the FRCP for electronic discovery. Key takeaways include parties having a duty to preserve relevant evidence once litigation is reasonably foreseeable and place it under a litigation hold, as well as the need to identify relevant data sources, systems and key players early in the discovery process.
The document summarizes an annual ethics update presentation given to Sulloway lawyers. It discusses various technology and ethics issues including litigation holds, virtual practice concerns, and confidentiality on Zoom. It also reviews recent ethics cases and ABA opinions. Throughout the presentation, the duties of competent representation and preserving client confidentiality are emphasized. Best practices for using technology professionally and virtually are provided.
Controlling The Cost Of Discovery In A Digital Age.DocDavid Haines
This document discusses strategies for controlling costs associated with the discovery process in litigation. It notes that discovery is often the most expensive part of a case. It recommends forming the basis for accountability and cost control by having proper document retention, identification, collection, and workflow processes. It also suggests assessing the efficiency of your discovery process by estimating costs based on factors like the parties involved and missing facts. Finally, it recommends managing document workflow during discovery and assembling the right discovery response team to help control costs.
The document discusses several topics related to e-Discovery:
1) Document retention policies are important for companies to establish in order to efficiently manage electronic discovery requests if litigation occurs. These policies help reduce unnecessary data and ensure ethical data deletion practices.
2) Electronic discovery, or e-Discovery, refers to the discovery process for electronically stored information in civil lawsuits. It presents unique challenges compared to paper documents due to issues like metadata and data volume.
3) The federal rules of civil procedure have been amended to address e-Discovery procedures and obligations regarding items like initial disclosures, discovery scope, and electronically stored information. Legal holds are also discussed as an important part of the e-Discovery process.
Similar to Mastering E-Discovery Presentation (partial) (20)
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
Receivership and liquidation Accounts
Being a Paper Presented at Business Recovery and Insolvency Practitioners Association of Nigeria (BRIPAN) on Friday, August 18, 2023.
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
The Future of Criminal Defense Lawyer in India.pdfveteranlegal
https://veteranlegal.in/defense-lawyer-in-india/ | Criminal defense Lawyer in India has always been a vital aspect of the country's legal system. As defenders of justice, criminal Defense Lawyer play a critical role in ensuring that individuals accused of crimes receive a fair trial and that their constitutional rights are protected. As India evolves socially, economically, and technologically, the role and future of criminal Defense Lawyer are also undergoing significant changes. This comprehensive blog explores the current landscape, challenges, technological advancements, and prospects for criminal Defense Lawyer in India.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
3. The Unreliable Narrator and Law
Within the field of literature, the unreliable narrator is a
storyteller who violates our trust.
Whatever the cause, the reader starts to notice things
that suggest that the narrator is either lying or doesn’t
understand what is really going on.
10. (3) Contents of the Order. * * *
(B) Permitted Contents. The scheduling
order may:
(iii) provide for disclosure, or discovery,
or preservation of electronically
stored information;
(iv) include any agreements the parties
reach for asserting claims of privilege
or of protection as trial-preparation
material after information is produced,
including agreements reached
under Federal Rule of Evidence 502
Rule 16 Order
11. Parties may obtain discovery regarding any nonprivileged
matter that is relevant to any party’s claim or defense and
proportional to the needs of the case, [considering the
amount in controversy, the importance of the issues at
stake in the action,] considering the importance of the
issues at stake in the action, the amount in controversy,
the parties relative access to relevant information, the
parties’ resources, the importance of the discovery in
resolving the issues, and whether the burden or expense
of the proposed discovery outweighs its likely benefit.
Information within this scope of discovery need not be
admissible in evidence to be discoverable.
Scope of Discovery: Rule 26(b)
12. Culling by Objective Criteria
http://www.papergreat.com/2014/01/old-style-ruth-manning-sanders-library.html
We want to use to cull out
irrelevant documents using these
filters:
Domain
Name
User
Date range
Custodian
Clustering
13. What Is the Case About?
Facts/admissions
Statute of limitations
Claims
Defenses
14. How Do My Client’s Systems Work?
Retention Schedule
Key Custodians
Document
Management
16. Metadata: How Important Is It?
What?: Data about data.
When?: Whenever lawyers
send, produce or receive ESI
containing metadata in
response to a discovery
request or subpoena.
Why?: If the history, tracking,
or management of an
electronic document matters.
How?: Review and produce
the document in a form that
maintains the metadata.
THE SEDONA CONFERENCE® COMMENTARY ON ETHICS & METADATA
What is to be done?
Work with other side to
determine how to deal
with metadata during
production.
17. Requesting Production of Native Files
Rule 34(b)(2)(E)
Producing the Documents or Electronically Stored Information.
Unless otherwise stipulated or ordered by the court, these
procedures apply to producing documents or electronically stored
information:
(i) Aparty must produce documents as they are kept in the usual
course of business or must organize and label them to
correspond to the categories in the request;
(ii) If a request does not specify a form for producing
electronically stored information, a party must produce it in a form
or forms in which it is ordinarily maintained or in a reasonably
usable form or forms; and
(iii) A party need not produce the same electronically stored
information in more than one form.
18. Case Law | Metadata & Cooperation
Covad Commc’n Co. v. Revonet, Inc.
Facts: Covad moved to compel Revonet to produce
documents in native format, even though Covad never
requested that they be produced in native form and
Revonet already produced the documents in hard copy.
Outcome: Motion denied
Take Away: Parties should cooperate to figure out
forms of production in Rule 26(f), include in the Discovery
Plan, and then make it part of Rule 16 order.
19. Objective Criteria Established During 26(f)
(f) CONFERENCE OF THE PARTIES;
PLANNING FOR DISCOVERY.
(3) Discovery Plan. A discovery plan must
state the parties’ views and proposals on: * *
*
(C) any issues about disclosure, or
discovery, or preservation of electronically
stored information, including the form or
forms in which it should be produced;
(D) any issues about claims of privilege or of
protection as trial-preparation materials,
including — if the parties agree on a
procedure to assert these claims after
production — whether to ask the court to
include their agreement in an order under
Federal Rule of Evidence 502;
22. Evidence Admissible Only IF
Relevant: tends to make a fact “of consequence” more or
less probable.
Authentic: prima facie showing of trustworthiness that the
document is what the party claims it to be.
Non-Hearsay: not a third-party’s out-of-court statement
offered for its truth.
Hearsay Exception: hearsay statement, but falls under
exception.
Original or Duplicate Writing: original or duplicate
required unless proven by acceptable secondary evidence.
23. Applying FRE 901 and 902 to ESI
Rule 901: Can you show that the ESI is what you say it is?
Authorizes “[e]vidence describing a process or system
used to produce a result and showing that the process or
system produces an accurate result.”
Rule 902: Is the ESI self-authenticating?
Official Publications: Books, pamphlets, or other
publications purporting to be issued by public authority.
Trade Inscriptions: Information in the document
generated in the course of business that shows ownership,
control, or origin.
Records of Regularly Conducted Activity. Document
with declaration that showing that document was created
and kept in the regular course of business.
24. Hashtags & Metadata to Meet Rule 901
“A party that seeks to introduce its own electronic records
may have just as much difficulty authenticating them as
one that attempts to introduce the electronic records of an
adversary.”
-- Judge Grimm
Hashtags: A unique numerical identifier that can be
assigned to a file, a group of files, or a portion of a file.
Metadata: Information describing the history, tracking, or
management of an electronic document.
25. Tips for Authenticating Social Media Evidence
Don’t rely on print-outs.
Use programs to capture
and authenticate.
Remember: social-media
evidence = evidence.
Don’t forget circumstantial
evidence.
26. Using Witnesses to Introduce ESI
From the creator?
From the receiver?
From anyone else who could
know?
28. Framework for Evaluating Report
How was evidence collected?
Provides sufficient details to replicate findings?
Establishes tools used?
Establishes assumptions made?
29. Case Law | ESI Forensic Report
Nucor Corp v. Bell
Background: Nucor’s forensic report
stated that data was wiped from former
employee Bell’s laptop.
Problem: Nucor moved for a default
judgment or an adverse inference jury
instruction, based partly on expert’s theory
that specialized software wiped data from
laptop hard drive.
Outcome: Motion denied
Nucor expert’s methodology insufficient to show that defendants
intentionally wiped data, especially because he arrived at his final
theories only after the defendants’expert discredited his others.
30. Applying Daubert
Testing: Can and has the scientific procedure
been independently tested?
Peer Review: Has the scientific procedure
been published and subject to peer review?
Error rate: Is there a known error rate, or
potential to know the error rate, associated with
the use of this scientific procedure?
Standards: Are there standards and
protocols for the execution of the methodology?
Acceptance: Is the scientific procedure
generally accepted by the relevant scientific
community?
31. ESI and the Rules of Hearsay
Non-Hearsay #1: Some ESI isn’t
hearsay because no person created
the document and no assertion is
made in it.
Non-Hearsay #2: Not offered to
prove assertions.
Don’t Forget Business
Records Exception!
32. Applying the Original Writing /
Best Evidence Rule
ESI offered as evidence an original or a
duplicate?
Admissible secondary evidence (e.g.,
testimony)?
Rely on summaries?
Party admissions?
Object or you waive!
35. ABA Model Rule 1.1
Competence
“A lawyer shall provide competent
representation to a client. Competent
representation requires the legal knowledge,
skill, thoroughness and preparation reasonably
necessary for the representation.”
36. Case Law | Competence
Brown v. Tellermate Holdings Ltd.
Background: Fired salespeople bring sex-
discrimination action against Tellermate.
Problem: Defense counsel did not understand how to
find and produce information on client’s salesforce.com
account and made false statements to opposing counsel
and the court.
Outcome:
37. NY Rule Prof. Conduct 4.2(a)
Communication w/ Party
“[A] lawyer shall not communicate about the
subject of a representation with a party” who the
lawyer “knows to be represented by another
lawyer in the matter” unless the lawyer has the
consent of the other lawyer or the contact is
“authorized to do so by law.”
38. The Model Rule 3.3(a)
Candor
A lawyer shall not knowingly:
(1) Make a false statement of fact or law; or
(2) Offer evidence lawyer knows to be
false.
39. The Model Rule 3.4(a)
Fairness
“A lawyer shall not unlawfully obstruct another party’s
access to evidence or unlawfully alter, destroy or
conceal a document or other material having
potential evidentiary value. A lawyer shall not counsel
or assist another person to do any such act….”
40. Ethics Hypothetical
Axis employee loses control of concrete truck,
hits Bester’s car, and kills Bester’s wife.
Employee pleads to manslaughter.
Bester hires McGuire and sues Axis under
wrongful death and loss-of-consortium theories.
Axis counsel receives Facebook message from
Bester and found on profile; served
discovery.
McGuire’s office tells Bester to “clean up”
Facebook; no Facebook photos produced; Axis
moves to compel.
41. Claims:
Loss of Consortium
What’s relevant?
In a wrongful death action in Virginia, a spouse may
recover for sorrow, mental anguish, and solace, which
can include society, companionship, comfort,
guidance, “kindly offices” and advice of the decedent.
42. Facebook Ethics
Background: At the time, Facebook allowed you to
briefly access the private Facebook of anyone who
responds to your message.
AXIS COUNSEL OUT-OF-BOUNDS?
Some what-ifs:
Bester contacted Axis’s counsel first?
Bester told Axis’s to stay away from his Facebook
page?
Bester invited Axis’s counsel to be Facebook friends?
Axis’s counsel knew that the photo was private?
43. Discovery Ethics: Relevance & Scope
Flickr/a4gpa
The Big Picture: Is the photo
relevant under any circumstances?
Some What-ifs:
Picture taken before his wife died?
Picture taken a year after wife died?
Picture taken at wedding reception
where grooms men were given
shirts and expected to behave
badly.
44. Preservation Ethics
Can Bester’s attorney tell him to delete something from his
Facebook profile without violating ethics?
Some What-ifs:
McGuire tells Bester to “clean-up” his Facebook profile
because he doesn’t want to see photos as trial exhibits?
McGuire has paralegal contact Bester and asks him to
“clean-up” Facebook profile.
45. Discovery Ethics: Preparing & Responding
Some what-ifs:
Axis sends out discovery requesting: “screen print copies on
the day this request is signed of all pages from Isaiah Lester’s
Facebook page including, but not limited to, all pictures, his
profile, his message board, status updates, and all messages
sent or received.” OR…
Axis sends out more narrowly tailored discovery request.
OR…
Bester responds to discovery with “I do not have a Facebook
page on the date this is signed.” OR…
Bester objects to discovery because no showing that evidence
is relevant.
48. Juror’s Social Media
“No, we are not champions of civil/human rights. In
fact, our Courts are willing to usurp and strip each
and every one of those rights in order to protect
false entities, these big businesses.”
“Our people are in bondage. The shackles of wage
slavery and money are placed silently on our
minds from birth.”
50. Protecting Client Confidentiality
in Digital Communications
Model Rule 1.6 | Confidentiality: A lawyer shall
make reasonable efforts to prevent the inadvertent
disclosure of, or unauthorized access to, information
relating to the representation of a client.
52. Case Law | Confidentiality
Alamar Ranch, LLC v. County of Boise
Held: Court found privilege was waived
regarding e-mails sent via company e-mail
addresses using company computers.
Why: Attorney should have been aware
client’s employer would be monitoring and
accessing e-mail sent to that address since
it is now a common practice.
53. Cyber-Liability and Data Breach Risks
in Managing E-Discovery
Cloud computing raises legal ethics issues, particularly
around competence and confidentiality of information
as information stored in the cloud is outside the
lawyer’s control, and is often in numerous locations,
including different countries.
Lawyers must ensure steps are taken to safeguard
security and confidentiality of client information.