SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Information Security in the eDiscovery Process
CLE Information For attorneys requiring CLE, a CLE Verification Code will be given verbally during this session.  Please pay close attention and write down the code for your records. You may need this code to get your CLE. If you have any questions, members of this panel will be in the networking lounge immediately following this session. Please save your questions and visit us there.  2
Panelist Introductions Aaron Crews eDiscovery Counsel LittlerMendelson P.C. 3
Panelist Introductions Mark Michels Former Litigation & eDiscovery Counsel Cisco Systems, Inc. 4
Panelist Introductions Doug Stewart Director of Technology Daegis 5
Panelist Introductions Andy Teichholz, Esq. Senior eDiscovery Consultant Daegis 6
Today’s Topics What are the information security risks? Why is a process driven approach to information security needed? Who should be responsible for information security in the eDiscovery process? What are the hallmarks and best practices of good information security in the eDiscovery process? What’s the best way to evaluate the information security practices of your eDiscovery partners? 7
Information Security Defined “Information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide: Integrity - guarding against improper information modification or destruction, and ensuring information non-repudiation and authenticity;  Confidentiality - preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and  Availability - ensuring timely and reliable access to and use of information.  44 U.S.C. § 3542(b)(1) 8
Risk and Responsibilities 9
The Dominant eDiscovery Risks Mind the Gap Hand-offs between parties  Changes / Exceptions / Rushes Information security red flags General Lack of Awareness Treating information security as an IT issue Uncontrolled Copies Shared Accounts / Uncontrolled Access Lack of audit trail  / Chain of Custody Productions Pre-production Information Security Protections Data destruction / sanitization at conclusion of litigation 10
Data Types / Controls HIPAA Export Controlled Data Privacy / EU / PII PCI Financial Regulations State laws / Regulations governing data breach notifications 11
Sample eDiscovery Risk Analysis  12 CP = Corporation | LF = Law Firm | SP = Service Provider Risk:  1 (low) to 5 (high) scale C = Confidentiality | I = Integrity |  A = Availability
Sample Risk Analysis (continued) People (very high) Process / Procedures (high) Technology (moderate) Transportation of data (very high) Production and copy sets (high) Presentation / Trial exhibits (high) 13
Why A Process Driven Approach Systematic Approach Risk Assessment and Treatment Collaborative / 360° View Continual Improvement Documented Audited Thoughtful & proactive, not ad hoc & reactive 14
Who is Responsible? Information security is not solely an IT issue Cross-functional teams including IT, operations, PM’s, specialists, records and legal A collaborative approach is needed Corporation(s) Law firm(s) Service Providers Define roles in project plan 15
Hallmarks & Best Practices Address info security in project plan  Ensure all parties understand obligations Enter protective orders / confidentiality agreements Encrypt all data when in transit Encrypt all deliverables 16
Hallmarks & Best Practices Limit access to business need Restrict and control copies Produce smallest volume of sensitive data Audit User permissions and access  Compliance with information security procedures 17
ND Cal Protective Order Levels CONFIDENTIAL (a) Outside counsel of record/employees; (b) Other parties’ employees (c) Experts; (d) The court and its personnel; and (e) Court reporters, professional consultants/vendors HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY (a), (c), (d) & (e) [above] In-house counsel with no competitive decision-making HIGHLY CONFIDENTIAL – SOURCE CODE  (a), (c), (d) & (e) [above]
ND Cal Source Code Provisions Inspection On secured computer  In a secured room with no Internet access or network access Party may not copy code onto any recordable media/device Copies Limited paper copies bates numbers and the label “HIGHLY CONFIDENTIAL - SOURCE CODE.” Receiving Party Maintain all paper copies of any printed copies in a secured, locked area. Maintain a record of individuals who inspected source code May make additional paper copies for pleadings, expert’s expert report or deposition May not create any electronic images of the paper copies
Export Control Protective Order Provisions Export Control. Disclosure of Protected Material shall be subject to all applicable laws and regulations relating to the export of technical data . . . , including the release of such technical data to foreign persons or nationals in the United States or elsewhere. The Producing Party shall be responsible for identifying any such controlled technical data, and the Receiving Party shall take measures necessary to ensure compliance.
HIPAA Protective Order Terms This Order  authorizes disclosure of Protected Health Information such disclosures pursuant to 45 C.F.R. § 164.512(e) of the Privacy Regulations issued pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Further, pursuant to 45 C.F.R. § 164.512(e)(1)(v), this Order is also a Qualified Protective Order and all parties and attorneys are hereby: (A) Prohibited from using or disclosing the protected health information for any purpose other than the litigation or proceeding for which such information was requested; and (B) Required to return to the covered entity or to destroy the protected health information (including all copies made) at the end of the litigation proceeding. This Order permits disclosure of confidential communications, made for the purposes of diagnosis or treatment of a patient’s mental or emotional condition, including alcohol or drug addiction, nor does this Order permit disclosure of records or information relating to HIV testing or sexually transmitted disease which are protected from discovery by any statute, court rule or decision. Nothing in this Order authorizes any party or any attorney for any party to release, disclose, exchange, submit, or share any Protected Health Information to any other person or entity not unrelated to this litigation.
Evaluating Info Security: Ask Questions  Make use of the RFI / RFP to ask information security questions Ask people, process and technology questions Audit / Inspect Trust with verification  Check references 22
Information Security Certifications ISO 27001 Auditable international standard with 133 controls  SAS 70 Less defined than ISO27001 but widely used in the US SSAE 16 Supersedes SAS 70  Additional requirements added EU Safe Harbor and Similar Certification needed to handle data from the EU and other jurisdictions 23
ISO 27001 Risk Assessment ISMS Policies and procedures to implement controls Scope must be defined Management sponsorship and review Continual improvement Scheduled internal and external audits User Awareness/Understanding of Obligations 24
Continual Improvement Quality & innovation cycle: TQM, Six Sigma, ISO 9000 & 27001 Source:  Shewhart / Deming
Thank You! Questions? Contact ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
Kashif Semple
 

Was ist angesagt? (17)

Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network Conference
 
Staying Out of the Crosshairs
Staying Out of the CrosshairsStaying Out of the Crosshairs
Staying Out of the Crosshairs
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Ht t17
Ht t17Ht t17
Ht t17
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Best practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsBest practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'ts
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
 
Data security
Data securityData security
Data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
 

Andere mochten auch

Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)
leolemes
 

Andere mochten auch (6)

Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 

Ähnlich wie Information Security in the eDiscovery Process

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
learfield
 

Ähnlich wie Information Security in the eDiscovery Process (20)

Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
SOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core PrinciplesSOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core Principles
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 

Mehr von Daegis

5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
Daegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
Daegis
 

Mehr von Daegis (11)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Information Security in the eDiscovery Process

  • 1. Information Security in the eDiscovery Process
  • 2. CLE Information For attorneys requiring CLE, a CLE Verification Code will be given verbally during this session.  Please pay close attention and write down the code for your records. You may need this code to get your CLE. If you have any questions, members of this panel will be in the networking lounge immediately following this session. Please save your questions and visit us there. 2
  • 3. Panelist Introductions Aaron Crews eDiscovery Counsel LittlerMendelson P.C. 3
  • 4. Panelist Introductions Mark Michels Former Litigation & eDiscovery Counsel Cisco Systems, Inc. 4
  • 5. Panelist Introductions Doug Stewart Director of Technology Daegis 5
  • 6. Panelist Introductions Andy Teichholz, Esq. Senior eDiscovery Consultant Daegis 6
  • 7. Today’s Topics What are the information security risks? Why is a process driven approach to information security needed? Who should be responsible for information security in the eDiscovery process? What are the hallmarks and best practices of good information security in the eDiscovery process? What’s the best way to evaluate the information security practices of your eDiscovery partners? 7
  • 8. Information Security Defined “Information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide: Integrity - guarding against improper information modification or destruction, and ensuring information non-repudiation and authenticity; Confidentiality - preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and Availability - ensuring timely and reliable access to and use of information. 44 U.S.C. § 3542(b)(1) 8
  • 10. The Dominant eDiscovery Risks Mind the Gap Hand-offs between parties Changes / Exceptions / Rushes Information security red flags General Lack of Awareness Treating information security as an IT issue Uncontrolled Copies Shared Accounts / Uncontrolled Access Lack of audit trail / Chain of Custody Productions Pre-production Information Security Protections Data destruction / sanitization at conclusion of litigation 10
  • 11. Data Types / Controls HIPAA Export Controlled Data Privacy / EU / PII PCI Financial Regulations State laws / Regulations governing data breach notifications 11
  • 12. Sample eDiscovery Risk Analysis 12 CP = Corporation | LF = Law Firm | SP = Service Provider Risk: 1 (low) to 5 (high) scale C = Confidentiality | I = Integrity | A = Availability
  • 13. Sample Risk Analysis (continued) People (very high) Process / Procedures (high) Technology (moderate) Transportation of data (very high) Production and copy sets (high) Presentation / Trial exhibits (high) 13
  • 14. Why A Process Driven Approach Systematic Approach Risk Assessment and Treatment Collaborative / 360° View Continual Improvement Documented Audited Thoughtful & proactive, not ad hoc & reactive 14
  • 15. Who is Responsible? Information security is not solely an IT issue Cross-functional teams including IT, operations, PM’s, specialists, records and legal A collaborative approach is needed Corporation(s) Law firm(s) Service Providers Define roles in project plan 15
  • 16. Hallmarks & Best Practices Address info security in project plan Ensure all parties understand obligations Enter protective orders / confidentiality agreements Encrypt all data when in transit Encrypt all deliverables 16
  • 17. Hallmarks & Best Practices Limit access to business need Restrict and control copies Produce smallest volume of sensitive data Audit User permissions and access Compliance with information security procedures 17
  • 18. ND Cal Protective Order Levels CONFIDENTIAL (a) Outside counsel of record/employees; (b) Other parties’ employees (c) Experts; (d) The court and its personnel; and (e) Court reporters, professional consultants/vendors HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY (a), (c), (d) & (e) [above] In-house counsel with no competitive decision-making HIGHLY CONFIDENTIAL – SOURCE CODE (a), (c), (d) & (e) [above]
  • 19. ND Cal Source Code Provisions Inspection On secured computer In a secured room with no Internet access or network access Party may not copy code onto any recordable media/device Copies Limited paper copies bates numbers and the label “HIGHLY CONFIDENTIAL - SOURCE CODE.” Receiving Party Maintain all paper copies of any printed copies in a secured, locked area. Maintain a record of individuals who inspected source code May make additional paper copies for pleadings, expert’s expert report or deposition May not create any electronic images of the paper copies
  • 20. Export Control Protective Order Provisions Export Control. Disclosure of Protected Material shall be subject to all applicable laws and regulations relating to the export of technical data . . . , including the release of such technical data to foreign persons or nationals in the United States or elsewhere. The Producing Party shall be responsible for identifying any such controlled technical data, and the Receiving Party shall take measures necessary to ensure compliance.
  • 21. HIPAA Protective Order Terms This Order authorizes disclosure of Protected Health Information such disclosures pursuant to 45 C.F.R. § 164.512(e) of the Privacy Regulations issued pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Further, pursuant to 45 C.F.R. § 164.512(e)(1)(v), this Order is also a Qualified Protective Order and all parties and attorneys are hereby: (A) Prohibited from using or disclosing the protected health information for any purpose other than the litigation or proceeding for which such information was requested; and (B) Required to return to the covered entity or to destroy the protected health information (including all copies made) at the end of the litigation proceeding. This Order permits disclosure of confidential communications, made for the purposes of diagnosis or treatment of a patient’s mental or emotional condition, including alcohol or drug addiction, nor does this Order permit disclosure of records or information relating to HIV testing or sexually transmitted disease which are protected from discovery by any statute, court rule or decision. Nothing in this Order authorizes any party or any attorney for any party to release, disclose, exchange, submit, or share any Protected Health Information to any other person or entity not unrelated to this litigation.
  • 22. Evaluating Info Security: Ask Questions Make use of the RFI / RFP to ask information security questions Ask people, process and technology questions Audit / Inspect Trust with verification Check references 22
  • 23. Information Security Certifications ISO 27001 Auditable international standard with 133 controls SAS 70 Less defined than ISO27001 but widely used in the US SSAE 16 Supersedes SAS 70 Additional requirements added EU Safe Harbor and Similar Certification needed to handle data from the EU and other jurisdictions 23
  • 24. ISO 27001 Risk Assessment ISMS Policies and procedures to implement controls Scope must be defined Management sponsorship and review Continual improvement Scheduled internal and external audits User Awareness/Understanding of Obligations 24
  • 25. Continual Improvement Quality & innovation cycle: TQM, Six Sigma, ISO 9000 & 27001 Source: Shewhart / Deming
  • 26.
  • 27. Mark Michels – mnpm2190@gmail.com
  • 28. Doug Stewart – dstewart@daegis.com
  • 29. Andy Teichholz – ateichholz@daegis.com