SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Not Just Another E-Discovery Presentation January 26, 2010 Carla Ashley Sarah Brehm
Where are we now?
Where have we come from?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is ESI?
What has changed?
Not a new concept ,[object Object],[object Object],[object Object]
A new example… text messages ,[object Object],[object Object],[object Object],[object Object],[object Object]
2009 Trends ,[object Object],[object Object],[object Object],[object Object],[object Object]
2009 Case Law Overview
Preservation & Spoliation
State & Federal Statutes
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Louisiana Code of Civil Procedure
[object Object],[object Object],[object Object],[object Object],Electronic Warrants
Federal Rule of Civil Procedure 26 ,[object Object],[object Object]
Federal Law: Rules 26, 16, and Form 35 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Federal Claw-Back ,[object Object],[object Object],[object Object]
Email Waiver ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rules 34 & 37 ,[object Object],[object Object],[object Object]
When does duty to preserve begin? ,[object Object],[object Object]
2-Tier Analysis ,[object Object],[object Object],[object Object],[object Object]
Reasonably accessible? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Courts Expect ,[object Object],[object Object],[object Object],[object Object],[object Object]
This Rule Has Teeth ,[object Object],[object Object],[object Object],[object Object]
Recent Cases – Sanctions ,[object Object],[object Object],[object Object],[object Object]
When dismissal may be warranted ,[object Object],[object Object]
Bad Boys ,[object Object],[object Object],[object Object]
Pesky little clause ,[object Object],[object Object],[object Object]
Attorneys Sanctioned ,[object Object],[object Object],[object Object],[object Object]
Ediscovery Expert Ordered ,[object Object],[object Object],[object Object]
Justify Your Methods -  Maggette ,[object Object],[object Object],[object Object]
The Death Penalty ,[object Object],[object Object],[object Object]
Blank is Suspicious ,[object Object],[object Object],[object Object]
Adverse Inferences ,[object Object],[object Object],[object Object],[object Object]
more  Keithley ,[object Object],[object Object]
Good Faith – Lessons from  Qualcomm ,[object Object],[object Object]
Ethical Implications ,[object Object],[object Object]
Parting thoughts ,[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]sumit saurav
 
Ten Tenets of CISO Success
Ten Tenets of CISO SuccessTen Tenets of CISO Success
Ten Tenets of CISO SuccessFrank Kim
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Escalating complexity: DevOps learnings from Air France 447
Escalating complexity: DevOps learnings from Air France 447Escalating complexity: DevOps learnings from Air France 447
Escalating complexity: DevOps learnings from Air France 447Lindsay Holmwood
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Secure software development presentation
Secure software development presentationSecure software development presentation
Secure software development presentationMahdi Dolati
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaEdureka!
 

Was ist angesagt? (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]Fileless Malware [Cyber Security]
Fileless Malware [Cyber Security]
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Ten Tenets of CISO Success
Ten Tenets of CISO SuccessTen Tenets of CISO Success
Ten Tenets of CISO Success
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Escalating complexity: DevOps learnings from Air France 447
Escalating complexity: DevOps learnings from Air France 447Escalating complexity: DevOps learnings from Air France 447
Escalating complexity: DevOps learnings from Air France 447
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Secure software development presentation
Secure software development presentationSecure software development presentation
Secure software development presentation
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | Edureka
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Ähnlich wie EDiscovery Presentation

E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competencejcassd619
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008John Jablonski
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?WileyReinLLP
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizurerlhicksjr
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsJohn Jablonski
 

Ähnlich wie EDiscovery Presentation (20)

Daniel day
Daniel dayDaniel day
Daniel day
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
E Discovery
E DiscoveryE Discovery
E Discovery
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal Holds
 

EDiscovery Presentation

Hinweis der Redaktion

  1. Corporate technologies – in recent study conducted by Kroll, only 50% of companies have updated their ESI discovery policies to include commonly utilized corporate technologies such as mobile devices, social networking sites, virtualization and IM (as of 2006, 81% of corporate executives were connected through mobile devices all the time and 76% of Fortune 100 companies are using social media platforms aka twitter – twitter top social media platform as of 8/3/09 www.mashable.com). Even the president stays connected - Barack Obama is first president to have PDA (wonder if he’s ever butt-dialed anyone)
  2. Many companies have document retention policies, but much less are ready to implement a discovery plan once discovery begins (conflicting priorities between legal dept. and IT), corporations trying to handle more cases with fewer resources, pressure to decrease costs while at the same time minimizing risks
  3. 1354- Reasonably accessible – undue burden or cost (insert from paper), for motion to compel BOP on person from whom production is sought (not requesting party), if they show it’s not reasonably accessible, then BOP shifts to requesting party to show good cause why production should be ordered – court may specify conditions, including allocation of cost 1424 – absolute prohibition on attorney opinion work product (CTA expand) 1425 – not discoverable absent showing of exceptional circumstances that impractical to obtain from other sources- DOES NOT preclude discovery of facts or data expert relied upon (if document contains both – can redact) 1460 – when business recs consist of ESI – you can produce as regularly maintained, or have option for inspection when burden on the same for each party 1461 – 2007 changes to 1461 and 1462 – requesting party, within scope of 1422 and 1425 can now inspect and copy the product of a computer (such as paper printout or copy on disc), no initial right to inspect computer (unless the producing party chooses to or under 1462E a court compels production) 1462(E) – specifying form (native format – metadata included – be careful what you wish for) when ESI production insufficient or not in compliance, file motion to compel – court may allow inspect, copy, test, and sample the designated ESI within scope of 1422 and 1425 1471 – good faith requirement (sanctions can’t be imposed when ESI has been lost due to routine, good faith operation of an electronic information system absent exceptional circumstances) 1551 – similar to F.R.C.P. 26 meet and confer – issues related to ESI, including forms of production – may order non-complying party to pay costs