SlideShare ist ein Scribd-Unternehmen logo
1 von 65
E-Discovery: How do Litigation Hold, BYOD,
and Privacy affect you?
By Amelia Phillips, PhD
Chair, Pure & Applied Science Division
CIS and Computer Science Departments
Regional Director PRCCDC
Highline Community College
Seattle WA
Agenda
• Define E-Discovery
• The challenge ahead
• Who does this affect?
• Privacy or corporate security
• Current tools
• New technology
Defining E-Discovery
• “gathering electronically stored information (ESI) for
use in litigation”
• Discovery happens daily and is the compulsary disclosure of
data, facts and documents in civil and criminal cases.
• Legal council generally exists on both sides from the
beginning
Whose Perspective?
Who needs to know about e-discovery?
Information Governance
Reference Model
© edrm.net
Potential Students / Target Audience
• IT / CIS Students
• MIS Students
• Paralegals
• Business Managers
• Production Managers
Litigation Hold – what does that mean?
• If a litigation hold is in place
– Backups cannot be over written or deleted
– Physical files cannot be shredded
– Files cannot be deleted
– What happens to the BYODs?
• Corporate policies need to be in place
– Educate the employees
Tools of the Trade
• Concordance
• Discovery Assistant by IMAGEMaker
• @LegalDiscovery
• Catalyst CR
• AD Summation iBlaze
• Nextpoint Discovery Cloud
• Sherpa Software Discovery Attender
• And more
E-Discovery Tools
Discovery Attender
Finding email
Choose Search Criteria
Search Results
Reverse Funnel Method
De-Duping
Email, Social media and Privacy
• Clandestine affair
• Sharing a login on Gmail but never
transmitting
• Cyberstalking and threats
HICSS44
Why action was needed NOW
• 2 Generals implicated
• Over 30,000 documents most of which was email
examined
• Exposed that Google had responded to over 7,000
requests from the US government from January to
June 2012
Resulted in the following:
• Requests from governments
– 2009 - ~ 12,000
– 2012 – over 21,000
• U.S. certainly highest
• India
• U.K.
Google Transparency Report
What ever happened to the
4th Amendment?
• Electronic Communications Privacy Act
• Created in 1986
• PCs were in their infancy
– Hard drives were 10 to 20 MB
– Easy drive at 60 MB was the largest in 1988
– Files were 10 to 20 kb
– Email was at a premium
ECPA
• Accessing a computer or network without authorization
or by exceeding authorization
• Accessing a computer or network to collect financial
information, credit information, or other information
from a government computer or any protected
computer
• Making a computer or network unavailable for its
intended use by a department of the U.S. government
or another entity
ECPA lists as violations:
• Transmitting programs, information, codes, or
commands to intentionally cause harm or damage to
networks or computers
• Accessing information on a computer or network to
commit fraud or cause damage, whether intentionally
or as a result of reckless actions
• Intentionally obtaining and trafficking in passwords
• Threatening harm to a computer or network for use in
extortion or a similar practice
ECPA (more violations)
• Stored Communications Act
• Supplement ECPA
• Offense.— Except as provided in subsection (c) of this section whoever—
• (1) intentionally accesses without authorization a facility through which an
electronic communication service is provided; or
• (2) intentionally exceeds an authorization to access that facility;
and thereby obtains, alters, or prevents authorized access to a wire or
electronic communication while it is in electronic storage in such system shall
be punished as provided in subsection (b) of this section.
SCA
• Existing Law:
• 180 days old – considered abandoned
No warrant!
The Catch
• Gmail
• Yahoo mail
• Dropbox
• SkyDrive
• Google docs
• Google+
Online email and storage
• Facebook
• MySpace
• Twitter
• What laws apply here?
Social Media
• ArchiveSocial – compliant with
– FINRA – Financial Industry Regulatory Authority
– SEC – Securities and Exchange Commission
– FOIA – Freedom of Information Act
– FRCP – Federal Rules of Civil Procedure
– SOX – Sarbanes-Oxley
• Other software
– Actiance
– X1 Discovery
– Patrina Corporation
– Reed Archives
Social Media Archiving
BYOD, BYOA – whose line is it anyway?
• Interconnected far beyond imagined
• Business owner
– Cell phone
– Business computer
• One device compromised
– Have everything
Mobile Devices
• Someone logs in at a coffee shop
– Shows up on their Facebook
– Shows up on their Twitter
• U.S. based companies spend over $2 billion annually
for such demographics
• What are your rights?
Who knows where you are?
• 24 yr old Austrian law student
– Asked for his Facebook history
– Over 1200 pages long!
– Included items he
• Never posted
• Had deleted
• “Europe has come to the conclusion that none of the companies
can be trusted,” said Simon Davies, the director of the London-
based nonprofit Privacy International. “The European Commission
is responding to public demand. There is a growing mood of
despondency about the privacy issue.” (Semgupta, 2012)
EU Privacy Laws
• The term Bring Your Own Device (BYOD) has become
common in the language today.
• Includes cell phones, smart phones, Blackberry devices,
palmtops, laptops, iPhones, iPads and items that are
still be invented.
• Are they part of a litigation hold?
• Does the employee have the right to delete their
personal information?
BYOD
• Issued by and paid for by the company
• Purchased and paid for by the employee
• Purchased and paid for by visitors
• Purchased and paid for by patients
• And where is the information stored?
BYOD (cont’d)
• The voicemail is stored on the servers of the provider
• Text messages are saved on the device
• Voicemail can be stored on some smart phones
• Email is stored with the email server whether it be
Yahoo, Gmail, or corporate server
• File attachments could be located on the corporate
servers, on the cloud or home machine.
BYOD (part 3)
• Computers as closed containers
• U.S. v. Reyes in New York 1996
– Privacy of data on a pager
• United States v. Knotts and United States v. Karo
– U.S. Supreme Court
– Tracking devices
– On public street or in private dwelling
Mobile devices and the Law
• Ohio State Supreme Court
– 2009
– Warrant needed to search a cell phone
• Oregon State Supreme Court
– Schlossberg v. Solesbee
– 2012
– Search incident to arrest
Case Law on cell phones
HICSS44
Search
incident to
Arrest
• Online Communications and Geolocation Protection Act
(OCGPA)
• Before the House in March 2013
• GPS
• Warrant for all electronic messages regardless of age
• Just approved this week in the Senate Subcommittee
HICSS44
New Proposed Law
HICSS44
IRS Facebook
• Lady boasted on her Facebook about her and her
partner’s tax fraud
• Pictures of how much money they had made
• 57 counts of tax fraud
HICSS44
Tax Fraud Pioneer
• Can a company require that you make them a friend
before they hire you?
• Can a company force you to give them your username
and password on Facebook or MySpace to get a rating?
• Can conversations on social media be used against you?
• Can such exchanges hold up in court?
HICSS44
Social Media and Investigations
New Technology
Forensic Linguistics
• International Association of Forensic Linguists
• Look for variations in the way things are phrased,
cadence, etc.
• Very effective in spotting fraudulent documents
Dealing with Multinational Corporations
• Every country must deal with email, mobile
business and devices, data, ecommerce, Black
Berries, and PDAS
• Privacy laws vary from country to country.
• Chain of custody
• Qualifications of examiners
• Process and procedure
HCSS44
• Unique law enforcement concerns regarding the location of
potential digital evidence, its preservation, and its subsequent
forensic analysis.
• For instance, if a customer or business becomes the target of a
criminal investigation, they could migrate their working
environment to a cloud environment.
• This would provide a means for the business to continue its
routine operations while the migrated environment is forensically
analyzed.4
• However, this is not without risk. The migrated data only
represents a “snapshot” of when it was sent to the cloud.
Case proposed by John Barbara
• Since the data can be stored anywhere in the world, its
dispersal could be to a location or country where
privacy laws are not readily enforced or non-existent.
• Establishing a chain of custody for the data would
become difficult or impossible if its integrity and
authenticity cannot be fully determined (where was it
stored, who had access to view it, was there data
leakage, commingling of data, etc.).
JJ Barbara (slide 2)
• There are also potential forensic issues when the
customer or user exits a cloud application.
• Items subject to forensic analysis, such as registry
entries, temporary files, and other artifacts (which
are stored in the virtual environment) are lost -
making malicious activity difficult to substantiate:
JJ Barbara (slide 3)
• Over time, it's expected that clouds will contain more and
more evidence of criminal activity.
• The NIJ, recently revealed plans to fund research into
improved electronic forensics in several areas, including the
cloud.
• Cloud providers and customers need to set up their
infrastructures to meet these lawful requests or face fines
and other legal repercussions.
– do so without violating local privacy laws or accidentally giving
away competitive secrets.
George Lawton’s Opinion
• The demands of cloud forensics could prove costly as
lawsuits and investigations become more complex.
• A 2009 study by McKinsey & Company
– electronic discovery requests were growing by 50% annually.
– Growth in e-discovery spending from $2.7 billion in 2007 to
$4.6 billion in 2010, according to a Socha Consulting LLC
survey.
Lawton (slide 2)
• The U.S. government has also attempted to expand the scope
of data that can be lawfully requested without a warrant
through a National Security Letter (NSL).
• In August, the Obama administration requested to add
"electronic communication transaction records" to the data
included in an NSL,
– Require providers to include the addresses a user has emailed, the
times and dates of transactions, and possibly a user's browser
history.
– Have to ensure that the provider's infrastructure can deliver on
these requests in a timely manner.
Lawton (slide 3)
• "Cloud forensics is difficult because there are
challenges with multi-tenant hosting,
synchronization problems and techniques for
segregating the data in the logs,"
• "Right now, most of the cloud service providers are
not open to talking about this because they don't
know the issue ."
Lawton (slide 4)
Privacy Laws
• USA citizens take the expectation of privacy for granted
• Privilege “according to UK common law … allows a
person to refuse to testify on a matter or to withhold
information”
– Includes self incrimination
– Legal counsel privilege
– Statements made without prejudice
• China and Japan (and other non-English speaking
nations) have laws that are significantly different
HICSS44
Objectives of any Investigation
• That evidence obtained can hold up in court
• That the examiner can hold up under scrutiny
HICSS44
The Expert
• What qualifies a person as a digital forensic expert?
• The qualifications of the person examining the evidence
should be easily identifiable in all parts of the world
• On the international front, many use vendor
certifications.
• In the US, several states - against the resolution of the
American Bar Association (ABA) - instituted
requirements that all computer forensics investigators
be licensed private investigators.
HICSS44
The Expert (cont’d)
• “Is it a state or federal matter to qualify digital
investigators?”
• The global economy and international crime require an
international standard that is beyond the boundaries of
vendor certification
• The ISFCE has created certifications which are accepted
in many countries.
• SANS has created a body of knowledge that constitutes
what is needed for a person qualified in the field.
HICSS44
• ISO 27037:2012
• October 2012
• Digital Evidence First Responder (DEFR) as the one
who collects the evidence, chain of custody, and
storage of digital evidence
• Gives guidelines for transmission of ESI
New ISO standard
Technology and E-evidence
• Email investigations
– Whose server are things located on?
– How was it transmitted?
– When is a wiretap law needed?
– When are you dealing with stored messages?
– How to put laws in place that addresses these issues is
another challenge.
HICSS44
• Cloud-based electronic discovery tools might help to keep
these costs down.
• Companies including Orange, Autonomy, Clearwell and
Kazeon have launched hosted services for
collecting, preserving and analyzing digital evidence.
• Gartner research director Debra Logan said she expects that
many corporations will start investing in e-discovery
infrastructure and that, by 2012, companies without this
infrastructure will spend 33% more to meet these requests.
Technology and E-Evidence
What laws affect what you do?
DEMO of Law database
• E-discovery is here to stay
• New challenges
• Affects legal, business, and IT students /
professionals alike
• Needs to become part of the curriculum
• Global issue
Summary
Questions?
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference

Weitere ähnliche Inhalte

Was ist angesagt?

Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...ImageSoft
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 

Was ist angesagt? (20)

Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Digital law
Digital lawDigital law
Digital law
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 

Andere mochten auch

E Discovery Cloud
E Discovery CloudE Discovery Cloud
E Discovery Cloudgjohansen
 
Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...
Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...
Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...Sandro Rossetti
 
Mapping the-forensic-standard-iso-iec-27037-to-cloud-computing
Mapping the-forensic-standard-iso-iec-27037-to-cloud-computingMapping the-forensic-standard-iso-iec-27037-to-cloud-computing
Mapping the-forensic-standard-iso-iec-27037-to-cloud-computingBisyron Wahyudi
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?trentlivingston
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5scm24
 
Office 365 Groups and Planner - Jump Start PM and Digital Collaboration
Office 365 Groups and Planner - Jump Start PM and Digital CollaborationOffice 365 Groups and Planner - Jump Start PM and Digital Collaboration
Office 365 Groups and Planner - Jump Start PM and Digital CollaborationGina Montgomery, V-TSP
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 

Andere mochten auch (9)

E Discovery Cloud
E Discovery CloudE Discovery Cloud
E Discovery Cloud
 
Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...
Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...
Deftcon 2013 - Cesare Maioli - Aspetti della legge 48/2008 che influenzano l'...
 
Mapping the-forensic-standard-iso-iec-27037-to-cloud-computing
Mapping the-forensic-standard-iso-iec-27037-to-cloud-computingMapping the-forensic-standard-iso-iec-27037-to-cloud-computing
Mapping the-forensic-standard-iso-iec-27037-to-cloud-computing
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5
 
Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics
 
Office 365 Groups and Planner - Jump Start PM and Digital Collaboration
Office 365 Groups and Planner - Jump Start PM and Digital CollaborationOffice 365 Groups and Planner - Jump Start PM and Digital Collaboration
Office 365 Groups and Planner - Jump Start PM and Digital Collaboration
 
AI05 Analisis forense de sistemas
AI05 Analisis forense de sistemasAI05 Analisis forense de sistemas
AI05 Analisis forense de sistemas
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 

Ähnlich wie E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensicRahul Badekar
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeBoyarMiller
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 

Ähnlich wie E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference (20)

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Hackers
HackersHackers
Hackers
 

Mehr von Cengage Learning

Discovering History Through Digital Newspaper Collection
Discovering History Through Digital Newspaper CollectionDiscovering History Through Digital Newspaper Collection
Discovering History Through Digital Newspaper CollectionCengage Learning
 
Are Your Students Ready for Lab?
Are Your Students Ready for Lab?Are Your Students Ready for Lab?
Are Your Students Ready for Lab?Cengage Learning
 
5 Course Design Tips to Increase Engagement and Outcomes
5 Course Design Tips to Increase Engagement and Outcomes5 Course Design Tips to Increase Engagement and Outcomes
5 Course Design Tips to Increase Engagement and OutcomesCengage Learning
 
The Journey to Digital: Incorporating Technology to Strengthen Critical Minds
 The Journey to Digital: Incorporating Technology to Strengthen Critical Minds The Journey to Digital: Incorporating Technology to Strengthen Critical Minds
The Journey to Digital: Incorporating Technology to Strengthen Critical MindsCengage Learning
 
Google Drive Plus TexQuest Equals a Match Made in Research Heaven
Google Drive Plus TexQuest Equals a Match Made in Research HeavenGoogle Drive Plus TexQuest Equals a Match Made in Research Heaven
Google Drive Plus TexQuest Equals a Match Made in Research HeavenCengage Learning
 
Improving Time Management: Tips that Will Help College Students Start the Yea...
Improving Time Management: Tips that Will Help College Students Start the Yea...Improving Time Management: Tips that Will Help College Students Start the Yea...
Improving Time Management: Tips that Will Help College Students Start the Yea...Cengage Learning
 
Mind Tap Open Trial Cengage Learning
Mind Tap Open Trial Cengage LearningMind Tap Open Trial Cengage Learning
Mind Tap Open Trial Cengage LearningCengage Learning
 
Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...
Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...
Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...Cengage Learning
 
Taming the Digital Tiger: Implementing a Successful Digital or 1:1 Initiative
Taming the Digital Tiger: Implementing a Successful Digital or 1:1 InitiativeTaming the Digital Tiger: Implementing a Successful Digital or 1:1 Initiative
Taming the Digital Tiger: Implementing a Successful Digital or 1:1 InitiativeCengage Learning
 
Decimal and Fraction Jeopardy - A Game for Developmental Math
Decimal and Fraction Jeopardy - A Game for Developmental MathDecimal and Fraction Jeopardy - A Game for Developmental Math
Decimal and Fraction Jeopardy - A Game for Developmental MathCengage Learning
 
Game it up! Introducing Game Based Learning for Developmental Math
Game it up! Introducing Game Based Learning for Developmental MathGame it up! Introducing Game Based Learning for Developmental Math
Game it up! Introducing Game Based Learning for Developmental MathCengage Learning
 
Overcoming Textbook Fatigue
Overcoming Textbook FatigueOvercoming Textbook Fatigue
Overcoming Textbook FatigueCengage Learning
 
Adult Student Success: How Does Awareness Correlate to Program Completion?
Adult Student Success: How Does Awareness Correlate to Program Completion?Adult Student Success: How Does Awareness Correlate to Program Completion?
Adult Student Success: How Does Awareness Correlate to Program Completion?Cengage Learning
 
You're responsible for teaching, and your students are resonsible for learnin...
You're responsible for teaching, and your students are resonsible for learnin...You're responsible for teaching, and your students are resonsible for learnin...
You're responsible for teaching, and your students are resonsible for learnin...Cengage Learning
 
What is the Impact of the New Standard on the Intermediate Accounting Course?
What is the Impact of the New Standard on the Intermediate Accounting Course?What is the Impact of the New Standard on the Intermediate Accounting Course?
What is the Impact of the New Standard on the Intermediate Accounting Course?Cengage Learning
 
The ABCs Approach to Goal Setting and Implementation
The ABCs Approach to Goal Setting and ImplementationThe ABCs Approach to Goal Setting and Implementation
The ABCs Approach to Goal Setting and ImplementationCengage Learning
 
Competency-based Education: Out with the new, in with the old?
Competency-based Education: Out with the new, in with the old? Competency-based Education: Out with the new, in with the old?
Competency-based Education: Out with the new, in with the old? Cengage Learning
 
Student-to-Student Learning, Powered by FlashNotes
Student-to-Student Learning, Powered by FlashNotes Student-to-Student Learning, Powered by FlashNotes
Student-to-Student Learning, Powered by FlashNotes Cengage Learning
 
Creating Career Success: A Flexible Plan for the World of Work
Creating Career Success: A Flexible Plan for the World of WorkCreating Career Success: A Flexible Plan for the World of Work
Creating Career Success: A Flexible Plan for the World of WorkCengage Learning
 
Preparing Students for Career Success
Preparing Students for Career Success Preparing Students for Career Success
Preparing Students for Career Success Cengage Learning
 

Mehr von Cengage Learning (20)

Discovering History Through Digital Newspaper Collection
Discovering History Through Digital Newspaper CollectionDiscovering History Through Digital Newspaper Collection
Discovering History Through Digital Newspaper Collection
 
Are Your Students Ready for Lab?
Are Your Students Ready for Lab?Are Your Students Ready for Lab?
Are Your Students Ready for Lab?
 
5 Course Design Tips to Increase Engagement and Outcomes
5 Course Design Tips to Increase Engagement and Outcomes5 Course Design Tips to Increase Engagement and Outcomes
5 Course Design Tips to Increase Engagement and Outcomes
 
The Journey to Digital: Incorporating Technology to Strengthen Critical Minds
 The Journey to Digital: Incorporating Technology to Strengthen Critical Minds The Journey to Digital: Incorporating Technology to Strengthen Critical Minds
The Journey to Digital: Incorporating Technology to Strengthen Critical Minds
 
Google Drive Plus TexQuest Equals a Match Made in Research Heaven
Google Drive Plus TexQuest Equals a Match Made in Research HeavenGoogle Drive Plus TexQuest Equals a Match Made in Research Heaven
Google Drive Plus TexQuest Equals a Match Made in Research Heaven
 
Improving Time Management: Tips that Will Help College Students Start the Yea...
Improving Time Management: Tips that Will Help College Students Start the Yea...Improving Time Management: Tips that Will Help College Students Start the Yea...
Improving Time Management: Tips that Will Help College Students Start the Yea...
 
Mind Tap Open Trial Cengage Learning
Mind Tap Open Trial Cengage LearningMind Tap Open Trial Cengage Learning
Mind Tap Open Trial Cengage Learning
 
Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...
Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...
Getting Started with Enhanced WebAssign 8/11/15 Presented by: Mike Lafreniere...
 
Taming the Digital Tiger: Implementing a Successful Digital or 1:1 Initiative
Taming the Digital Tiger: Implementing a Successful Digital or 1:1 InitiativeTaming the Digital Tiger: Implementing a Successful Digital or 1:1 Initiative
Taming the Digital Tiger: Implementing a Successful Digital or 1:1 Initiative
 
Decimal and Fraction Jeopardy - A Game for Developmental Math
Decimal and Fraction Jeopardy - A Game for Developmental MathDecimal and Fraction Jeopardy - A Game for Developmental Math
Decimal and Fraction Jeopardy - A Game for Developmental Math
 
Game it up! Introducing Game Based Learning for Developmental Math
Game it up! Introducing Game Based Learning for Developmental MathGame it up! Introducing Game Based Learning for Developmental Math
Game it up! Introducing Game Based Learning for Developmental Math
 
Overcoming Textbook Fatigue
Overcoming Textbook FatigueOvercoming Textbook Fatigue
Overcoming Textbook Fatigue
 
Adult Student Success: How Does Awareness Correlate to Program Completion?
Adult Student Success: How Does Awareness Correlate to Program Completion?Adult Student Success: How Does Awareness Correlate to Program Completion?
Adult Student Success: How Does Awareness Correlate to Program Completion?
 
You're responsible for teaching, and your students are resonsible for learnin...
You're responsible for teaching, and your students are resonsible for learnin...You're responsible for teaching, and your students are resonsible for learnin...
You're responsible for teaching, and your students are resonsible for learnin...
 
What is the Impact of the New Standard on the Intermediate Accounting Course?
What is the Impact of the New Standard on the Intermediate Accounting Course?What is the Impact of the New Standard on the Intermediate Accounting Course?
What is the Impact of the New Standard on the Intermediate Accounting Course?
 
The ABCs Approach to Goal Setting and Implementation
The ABCs Approach to Goal Setting and ImplementationThe ABCs Approach to Goal Setting and Implementation
The ABCs Approach to Goal Setting and Implementation
 
Competency-based Education: Out with the new, in with the old?
Competency-based Education: Out with the new, in with the old? Competency-based Education: Out with the new, in with the old?
Competency-based Education: Out with the new, in with the old?
 
Student-to-Student Learning, Powered by FlashNotes
Student-to-Student Learning, Powered by FlashNotes Student-to-Student Learning, Powered by FlashNotes
Student-to-Student Learning, Powered by FlashNotes
 
Creating Career Success: A Flexible Plan for the World of Work
Creating Career Success: A Flexible Plan for the World of WorkCreating Career Success: A Flexible Plan for the World of Work
Creating Career Success: A Flexible Plan for the World of Work
 
Preparing Students for Career Success
Preparing Students for Career Success Preparing Students for Career Success
Preparing Students for Career Success
 

Kürzlich hochgeladen

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Kürzlich hochgeladen (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference

  • 1. E-Discovery: How do Litigation Hold, BYOD, and Privacy affect you? By Amelia Phillips, PhD Chair, Pure & Applied Science Division CIS and Computer Science Departments Regional Director PRCCDC Highline Community College Seattle WA
  • 2. Agenda • Define E-Discovery • The challenge ahead • Who does this affect? • Privacy or corporate security • Current tools • New technology
  • 3. Defining E-Discovery • “gathering electronically stored information (ESI) for use in litigation” • Discovery happens daily and is the compulsary disclosure of data, facts and documents in civil and criminal cases. • Legal council generally exists on both sides from the beginning
  • 5. Who needs to know about e-discovery? Information Governance Reference Model © edrm.net
  • 6. Potential Students / Target Audience • IT / CIS Students • MIS Students • Paralegals • Business Managers • Production Managers
  • 7. Litigation Hold – what does that mean? • If a litigation hold is in place – Backups cannot be over written or deleted – Physical files cannot be shredded – Files cannot be deleted – What happens to the BYODs? • Corporate policies need to be in place – Educate the employees
  • 8. Tools of the Trade
  • 9. • Concordance • Discovery Assistant by IMAGEMaker • @LegalDiscovery • Catalyst CR • AD Summation iBlaze • Nextpoint Discovery Cloud • Sherpa Software Discovery Attender • And more E-Discovery Tools
  • 16. Email, Social media and Privacy
  • 17. • Clandestine affair • Sharing a login on Gmail but never transmitting • Cyberstalking and threats HICSS44 Why action was needed NOW
  • 18. • 2 Generals implicated • Over 30,000 documents most of which was email examined • Exposed that Google had responded to over 7,000 requests from the US government from January to June 2012 Resulted in the following:
  • 19. • Requests from governments – 2009 - ~ 12,000 – 2012 – over 21,000 • U.S. certainly highest • India • U.K. Google Transparency Report
  • 20. What ever happened to the 4th Amendment?
  • 21. • Electronic Communications Privacy Act • Created in 1986 • PCs were in their infancy – Hard drives were 10 to 20 MB – Easy drive at 60 MB was the largest in 1988 – Files were 10 to 20 kb – Email was at a premium ECPA
  • 22. • Accessing a computer or network without authorization or by exceeding authorization • Accessing a computer or network to collect financial information, credit information, or other information from a government computer or any protected computer • Making a computer or network unavailable for its intended use by a department of the U.S. government or another entity ECPA lists as violations:
  • 23. • Transmitting programs, information, codes, or commands to intentionally cause harm or damage to networks or computers • Accessing information on a computer or network to commit fraud or cause damage, whether intentionally or as a result of reckless actions • Intentionally obtaining and trafficking in passwords • Threatening harm to a computer or network for use in extortion or a similar practice ECPA (more violations)
  • 24. • Stored Communications Act • Supplement ECPA • Offense.— Except as provided in subsection (c) of this section whoever— • (1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or • (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section. SCA
  • 25. • Existing Law: • 180 days old – considered abandoned No warrant! The Catch
  • 26. • Gmail • Yahoo mail • Dropbox • SkyDrive • Google docs • Google+ Online email and storage
  • 27. • Facebook • MySpace • Twitter • What laws apply here? Social Media
  • 28. • ArchiveSocial – compliant with – FINRA – Financial Industry Regulatory Authority – SEC – Securities and Exchange Commission – FOIA – Freedom of Information Act – FRCP – Federal Rules of Civil Procedure – SOX – Sarbanes-Oxley • Other software – Actiance – X1 Discovery – Patrina Corporation – Reed Archives Social Media Archiving
  • 29. BYOD, BYOA – whose line is it anyway?
  • 30. • Interconnected far beyond imagined • Business owner – Cell phone – Business computer • One device compromised – Have everything Mobile Devices
  • 31. • Someone logs in at a coffee shop – Shows up on their Facebook – Shows up on their Twitter • U.S. based companies spend over $2 billion annually for such demographics • What are your rights? Who knows where you are?
  • 32. • 24 yr old Austrian law student – Asked for his Facebook history – Over 1200 pages long! – Included items he • Never posted • Had deleted • “Europe has come to the conclusion that none of the companies can be trusted,” said Simon Davies, the director of the London- based nonprofit Privacy International. “The European Commission is responding to public demand. There is a growing mood of despondency about the privacy issue.” (Semgupta, 2012) EU Privacy Laws
  • 33. • The term Bring Your Own Device (BYOD) has become common in the language today. • Includes cell phones, smart phones, Blackberry devices, palmtops, laptops, iPhones, iPads and items that are still be invented. • Are they part of a litigation hold? • Does the employee have the right to delete their personal information? BYOD
  • 34. • Issued by and paid for by the company • Purchased and paid for by the employee • Purchased and paid for by visitors • Purchased and paid for by patients • And where is the information stored? BYOD (cont’d)
  • 35. • The voicemail is stored on the servers of the provider • Text messages are saved on the device • Voicemail can be stored on some smart phones • Email is stored with the email server whether it be Yahoo, Gmail, or corporate server • File attachments could be located on the corporate servers, on the cloud or home machine. BYOD (part 3)
  • 36. • Computers as closed containers • U.S. v. Reyes in New York 1996 – Privacy of data on a pager • United States v. Knotts and United States v. Karo – U.S. Supreme Court – Tracking devices – On public street or in private dwelling Mobile devices and the Law
  • 37. • Ohio State Supreme Court – 2009 – Warrant needed to search a cell phone • Oregon State Supreme Court – Schlossberg v. Solesbee – 2012 – Search incident to arrest Case Law on cell phones
  • 39. • Online Communications and Geolocation Protection Act (OCGPA) • Before the House in March 2013 • GPS • Warrant for all electronic messages regardless of age • Just approved this week in the Senate Subcommittee HICSS44 New Proposed Law
  • 41. • Lady boasted on her Facebook about her and her partner’s tax fraud • Pictures of how much money they had made • 57 counts of tax fraud HICSS44 Tax Fraud Pioneer
  • 42. • Can a company require that you make them a friend before they hire you? • Can a company force you to give them your username and password on Facebook or MySpace to get a rating? • Can conversations on social media be used against you? • Can such exchanges hold up in court? HICSS44 Social Media and Investigations
  • 44. Forensic Linguistics • International Association of Forensic Linguists • Look for variations in the way things are phrased, cadence, etc. • Very effective in spotting fraudulent documents
  • 45. Dealing with Multinational Corporations • Every country must deal with email, mobile business and devices, data, ecommerce, Black Berries, and PDAS • Privacy laws vary from country to country. • Chain of custody • Qualifications of examiners • Process and procedure HCSS44
  • 46. • Unique law enforcement concerns regarding the location of potential digital evidence, its preservation, and its subsequent forensic analysis. • For instance, if a customer or business becomes the target of a criminal investigation, they could migrate their working environment to a cloud environment. • This would provide a means for the business to continue its routine operations while the migrated environment is forensically analyzed.4 • However, this is not without risk. The migrated data only represents a “snapshot” of when it was sent to the cloud. Case proposed by John Barbara
  • 47. • Since the data can be stored anywhere in the world, its dispersal could be to a location or country where privacy laws are not readily enforced or non-existent. • Establishing a chain of custody for the data would become difficult or impossible if its integrity and authenticity cannot be fully determined (where was it stored, who had access to view it, was there data leakage, commingling of data, etc.). JJ Barbara (slide 2)
  • 48. • There are also potential forensic issues when the customer or user exits a cloud application. • Items subject to forensic analysis, such as registry entries, temporary files, and other artifacts (which are stored in the virtual environment) are lost - making malicious activity difficult to substantiate: JJ Barbara (slide 3)
  • 49. • Over time, it's expected that clouds will contain more and more evidence of criminal activity. • The NIJ, recently revealed plans to fund research into improved electronic forensics in several areas, including the cloud. • Cloud providers and customers need to set up their infrastructures to meet these lawful requests or face fines and other legal repercussions. – do so without violating local privacy laws or accidentally giving away competitive secrets. George Lawton’s Opinion
  • 50. • The demands of cloud forensics could prove costly as lawsuits and investigations become more complex. • A 2009 study by McKinsey & Company – electronic discovery requests were growing by 50% annually. – Growth in e-discovery spending from $2.7 billion in 2007 to $4.6 billion in 2010, according to a Socha Consulting LLC survey. Lawton (slide 2)
  • 51. • The U.S. government has also attempted to expand the scope of data that can be lawfully requested without a warrant through a National Security Letter (NSL). • In August, the Obama administration requested to add "electronic communication transaction records" to the data included in an NSL, – Require providers to include the addresses a user has emailed, the times and dates of transactions, and possibly a user's browser history. – Have to ensure that the provider's infrastructure can deliver on these requests in a timely manner. Lawton (slide 3)
  • 52. • "Cloud forensics is difficult because there are challenges with multi-tenant hosting, synchronization problems and techniques for segregating the data in the logs," • "Right now, most of the cloud service providers are not open to talking about this because they don't know the issue ." Lawton (slide 4)
  • 53. Privacy Laws • USA citizens take the expectation of privacy for granted • Privilege “according to UK common law … allows a person to refuse to testify on a matter or to withhold information” – Includes self incrimination – Legal counsel privilege – Statements made without prejudice • China and Japan (and other non-English speaking nations) have laws that are significantly different HICSS44
  • 54. Objectives of any Investigation • That evidence obtained can hold up in court • That the examiner can hold up under scrutiny HICSS44
  • 55. The Expert • What qualifies a person as a digital forensic expert? • The qualifications of the person examining the evidence should be easily identifiable in all parts of the world • On the international front, many use vendor certifications. • In the US, several states - against the resolution of the American Bar Association (ABA) - instituted requirements that all computer forensics investigators be licensed private investigators. HICSS44
  • 56. The Expert (cont’d) • “Is it a state or federal matter to qualify digital investigators?” • The global economy and international crime require an international standard that is beyond the boundaries of vendor certification • The ISFCE has created certifications which are accepted in many countries. • SANS has created a body of knowledge that constitutes what is needed for a person qualified in the field. HICSS44
  • 57. • ISO 27037:2012 • October 2012 • Digital Evidence First Responder (DEFR) as the one who collects the evidence, chain of custody, and storage of digital evidence • Gives guidelines for transmission of ESI New ISO standard
  • 58. Technology and E-evidence • Email investigations – Whose server are things located on? – How was it transmitted? – When is a wiretap law needed? – When are you dealing with stored messages? – How to put laws in place that addresses these issues is another challenge. HICSS44
  • 59. • Cloud-based electronic discovery tools might help to keep these costs down. • Companies including Orange, Autonomy, Clearwell and Kazeon have launched hosted services for collecting, preserving and analyzing digital evidence. • Gartner research director Debra Logan said she expects that many corporations will start investing in e-discovery infrastructure and that, by 2012, companies without this infrastructure will spend 33% more to meet these requests. Technology and E-Evidence
  • 60. What laws affect what you do?
  • 61. DEMO of Law database
  • 62.
  • 63. • E-discovery is here to stay • New challenges • Affects legal, business, and IT students / professionals alike • Needs to become part of the curriculum • Global issue Summary