SlideShare ist ein Scribd-Unternehmen logo
1 von 32
RIM on the Social Side
Natalie Alesi
www.legalerswelcome.com
nataliebethalesi@gmail.com
Definition: Social media includes web-
based and mobile technologies used to
turn communication into interactive
dialogue. …Social media is media for
social interaction as a super-set beyond
social communication. Enabled by
ubiquitously accessible and scalable
communication techniques, social media
has substantially changed the way
organizations, communities, and
individuals communicate.
FACT: Social networking is
the most popular online
activity worldwide. ~Nielsen
#
Founded 2003
150 million members
NYSE Symbol “LNKD”
47.6 million unique
monthly visitors
Founded 2006
845 million members
IPO filed Feb. 1, 2012
138.9 million unique
monthly visitors
Founded 2006
300 million members
300 million tweets/day
1.6 billion search
queries/day
Founded 2011
100 million members
In one day, G+ became
most popular free
iPhone app
http://youtu.be/Nwwq3l39lqk
Technology Will Kill
iPhone 2007
Apple App Store 2008
iPad 2010
ABA Model Rules 1.1 requires lawyers to be competent in representation of their clients.
Comment 6: Lawyers “should keep abreast of changes in the law and it’s practice”
Courts & Cases
I-Med Pharma v. Biomatrix (D.N.J 2011)
ediscovery case highlighting importance of knowing your clients computer system
Munster v. Groce (Ind. App 2005)
lawyers duty to Google as part of due diligence
Dubios v. Butler (Fl. App 2005)
Lawyers duty to use Internet resources as part of due diligence, not to use methods that have
gone “the way of the horse and buggy and the eight track stereo.”
Largent v. Reed, Case No. 2009-1823 (C.P. Franklin Nov. 8, 2011)
Pennsylvania court recently ruled that information posted by a party on their personal Facebook
page is discoverable and ordered the plaintiff to provide their user name and password to
enable the production of the information.
State of Connecticut vs. Eleck, 2011 WL 3278663 (Conn.App. 2011)
highlights the importance of employing best practices technology to collect, preserve and
produce social media evidence.
NEW YORK STATE BAR ASSOCIATION Committee on Professional Ethics Opinion # 843
(09/10/2010)
Q: May a lawyer view and access the Facebook or MySpace pages of a party other than his or
her client in pending litigation in order to secure information about that party for use in the
lawsuit, including impeachment material, if the lawyer does not “friend” the party and instead
relies on public pages posted by the party that are accessible to all members in the network?
A: A lawyer who represents a client in a pending litigation, and who has access to the Facebook
or MySpace network used by another party in litigation, may access and review the public social
network pages of that party to search for potential impeachment material. As long as the
lawyer does not "friend" the other party or direct a third person to do so, accessing the social
network pages of the party will not violate Rule 8.4 (prohibiting deceptive or misleading
conduct), Rule 4.1 (prohibiting false statements of fact or law), or Rule 5.3(b)(1) (imposing
responsibility on lawyers for unethical conduct by nonlawyers acting at their direction).
http://www.nysba.org/AM/Template.cfm?Section=Ethics_Opinions&TEMPLA
TE=/CM/ContentDisplay.cfm&CONTENTID=43208
689 State and Federal Cases
Involved social media evidence
Myspace/Facebook = Criminal
Twitter/LinkedIn = Corporate Trade, secret
theft, copyright, trademark
What about a
Social Media
Policy?
Sample Social Media PolicyTemplate
http://www.jaffepr.com/about-us/industry-insight/white-papers/social-media-policy-template
Phone Dog vs. Noah Kravitz
Upcoming Webinar
Social Media eDiscovery Case Study &
Applicable Best Practices March 28th 2012
1 – 2 pm ET
http://www.d4discovery.com/2012/03/webinar-social-media-ediscovery-case-
study-applicable-best-practices/
Actionable Items
 Understand social media privacy
 Research software for preservation and archiving
of social media information
 Understand your firms social media policy / be on
the social media policy committee
 Create accounts on social media sites so you
understand
 Know where information is stored/devices where information
is stored in your firm with your attorneys
 Educate attorneys to think about where client information may be
stored (in the cloud, servers, devices, etc.)
 Adopt standards for how to use electronically stored
information, including social media.
 Know Recent Social Media Cases
(http://x1discovery.com/social_media_cases.html)
Twitter
@ediscoverygroup
@nextpointmike
@exterro
@nextpoint
@IEDiscovery
@LitSuppGuru
@eDiscJournal
@ComplexD
@GlobalEDDGroup
@bowtielaw
@nextpointlab
@d4discovery
LinkedIn Groups
ARMA International
RIM Professionals
eDiscovery
Women in eDiscovery
Men in dDiscovery
eDiscovery Networking Group
eDiscovery Plain and Simple
LegalIT e-Disc
Electronic Discovery Professionals
Enterprise eDiscovery in the Cloud
The Electronic Discovery Reference Model
Blogs of Interest
blog.x1discovery.com/
www.digitalreefinc.com/blog/
www.d4discovery.com/
e-discoveryserviceblog/
www.mofo.com/sociallyaware/
www.sociallyawareblog.com/
RIM and eDiscovery Social Resources
Sources for Presentation
• http://www.natlawreview.com/article/ediscovery-social-media
• http://x1discovery.com/video_webinar_duty_to_address.html
• http://www.nysba.org/AM/Template.cfm?Section=Ethics_Opinions&TEMP
LATE=/CM/ContentDisplay.cfm&CONTENTID=43208
• http://blog.x1discovery.com/2011/12/27/pennsylvania-courts-excellent-
whitepaper-on-social-media-discovery/
• http://blog.x1discovery.com/2012/02/08/a-real-world-social-media-
discovery-case-study-from-the-trenches/
• http://blog.x1discovery.com/2011/11/09/674-published-cases-involving-
social-media-evidence/
• http://bowtielaw.wordpress.com/2012/02/22/huge-hole-in-ediscovery-
process/
• http://bowtielaw.wordpress.com/2010/05/12/convicted-by-text-message-
overcoming-authentication-hearsay-objections
• http://www.digitalreefinc.com/blog/bid/82157/Recap-of-Digital-Reef-s-
Social-Media-White-Paper/
Law Firms and Social Media
FACT: Washington Post
20 percent of law firms have a full-time social media specialist
on staff, and about 40 percent said blogging and social
networking initiatives have helped the firm land new work.
Q & A
Direct email:
nataliebethalesi@gmail.com
Twitter
@legalerswelcome
LinkedIn
linkedin.com/in/nataliealesi
Facebook
facebook.com/legalerswelcome
Google+
gplus.to/nataliehuha
My Blog:
www.legalerswelcome.com

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologyterlyn711
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011guillaume ereteo
 
Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceNathaniel Russell
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 
Social media ethics
Social media ethicsSocial media ethics
Social media ethicsRyan Squire
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
The Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in FundraisingThe Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in FundraisingUniversity of Victoria
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graphLisa Borodkin
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 

Was ist angesagt? (20)

Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Case Study
Case  StudyCase  Study
Case Study
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011
 
Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological Competence
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Polinter07
Polinter07Polinter07
Polinter07
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social media ethics
Social media ethicsSocial media ethics
Social media ethics
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
The Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in FundraisingThe Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in Fundraising
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graph
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 

Andere mochten auch

4. Didactica y Metodología Somáticas: J. L. Cervantes G.
4. Didactica y Metodología Somáticas: J. L. Cervantes G.4. Didactica y Metodología Somáticas: J. L. Cervantes G.
4. Didactica y Metodología Somáticas: J. L. Cervantes G.José Luis Cervantes Guzmán
 
Sesiónes 12a y 13a CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.
Sesiónes 12a y 13a  CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.Sesiónes 12a y 13a  CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.
Sesiónes 12a y 13a CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.José Luis Cervantes Guzmán
 

Andere mochten auch (6)

我的班級
我的班級我的班級
我的班級
 
1號 林長泰
1號 林長泰1號 林長泰
1號 林長泰
 
4. Didactica y Metodología Somáticas: J. L. Cervantes G.
4. Didactica y Metodología Somáticas: J. L. Cervantes G.4. Didactica y Metodología Somáticas: J. L. Cervantes G.
4. Didactica y Metodología Somáticas: J. L. Cervantes G.
 
Sesiónes 12a y 13a CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.
Sesiónes 12a y 13a  CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.Sesiónes 12a y 13a  CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.
Sesiónes 12a y 13a CAPACIDAD CORPORAL EXPRESIVA_Dr. J. L. Cervantes G.
 
1. Hologogía Somática J. L. Cervantes G.
1. Hologogía Somática J. L. Cervantes G.1. Hologogía Somática J. L. Cervantes G.
1. Hologogía Somática J. L. Cervantes G.
 
3. Educación Somática: J. L. Cervantes G.
3. Educación Somática: J. L. Cervantes G.3. Educación Somática: J. L. Cervantes G.
3. Educación Somática: J. L. Cervantes G.
 

Ähnlich wie Rim on the social side

Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxwilcockiris
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Is ethical business possible in future
Is ethical business possible in futureIs ethical business possible in future
Is ethical business possible in futureSAKIBBAGWAN1
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Social Networking: An Introduction
Social Networking: An IntroductionSocial Networking: An Introduction
Social Networking: An IntroductionMary Jenkins
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010Twittercrisis
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile Cori Faklaris
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaPatrick McCormick
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeStacey Burke
 
Learning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementLearning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementPatrick McCormick
 

Ähnlich wie Rim on the social side (20)

Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Is ethical business possible in future
Is ethical business possible in futureIs ethical business possible in future
Is ethical business possible in future
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Social Networking: An Introduction
Social Networking: An IntroductionSocial Networking: An Introduction
Social Networking: An Introduction
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Network Society & Open Government
Network Society & Open GovernmentNetwork Society & Open Government
Network Society & Open Government
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
The Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital LifeThe Social Butterfly: Your Client's Digital Life
The Social Butterfly: Your Client's Digital Life
 
Review questions
Review questionsReview questions
Review questions
 
Learning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementLearning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagement
 

Mehr von Natalie Alesi

Social Media University: Ramping Up Your Social Media Community Part 1
Social Media University: Ramping Up Your Social Media Community Part 1Social Media University: Ramping Up Your Social Media Community Part 1
Social Media University: Ramping Up Your Social Media Community Part 1Natalie Alesi
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatterNatalie Alesi
 
Social media linkedin - ilta
Social media   linkedin - iltaSocial media   linkedin - ilta
Social media linkedin - iltaNatalie Alesi
 
Ethical social media marketing for lawyers june 20
Ethical social media marketing for lawyers june 20Ethical social media marketing for lawyers june 20
Ethical social media marketing for lawyers june 20Natalie Alesi
 
10 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v210 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v2Natalie Alesi
 
Hdi business of being social session
Hdi   business of being social sessionHdi   business of being social session
Hdi business of being social sessionNatalie Alesi
 

Mehr von Natalie Alesi (8)

Social Media University: Ramping Up Your Social Media Community Part 1
Social Media University: Ramping Up Your Social Media Community Part 1Social Media University: Ramping Up Your Social Media Community Part 1
Social Media University: Ramping Up Your Social Media Community Part 1
 
Twitter noise
Twitter noiseTwitter noise
Twitter noise
 
Social media rocketmatter
Social media rocketmatterSocial media rocketmatter
Social media rocketmatter
 
Social media linkedin - ilta
Social media   linkedin - iltaSocial media   linkedin - ilta
Social media linkedin - ilta
 
Ethical social media marketing for lawyers june 20
Ethical social media marketing for lawyers june 20Ethical social media marketing for lawyers june 20
Ethical social media marketing for lawyers june 20
 
10 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v210 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v2
 
Hdi business of being social session
Hdi   business of being social sessionHdi   business of being social session
Hdi business of being social session
 
Iltasm101 webinar
Iltasm101 webinarIltasm101 webinar
Iltasm101 webinar
 

Kürzlich hochgeladen

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

Rim on the social side

  • 1. RIM on the Social Side Natalie Alesi www.legalerswelcome.com nataliebethalesi@gmail.com
  • 2. Definition: Social media includes web- based and mobile technologies used to turn communication into interactive dialogue. …Social media is media for social interaction as a super-set beyond social communication. Enabled by ubiquitously accessible and scalable communication techniques, social media has substantially changed the way organizations, communities, and individuals communicate.
  • 3. FACT: Social networking is the most popular online activity worldwide. ~Nielsen #
  • 4.
  • 5.
  • 6. Founded 2003 150 million members NYSE Symbol “LNKD” 47.6 million unique monthly visitors Founded 2006 845 million members IPO filed Feb. 1, 2012 138.9 million unique monthly visitors Founded 2006 300 million members 300 million tweets/day 1.6 billion search queries/day Founded 2011 100 million members In one day, G+ became most popular free iPhone app
  • 8. iPhone 2007 Apple App Store 2008 iPad 2010
  • 9.
  • 10. ABA Model Rules 1.1 requires lawyers to be competent in representation of their clients. Comment 6: Lawyers “should keep abreast of changes in the law and it’s practice”
  • 12. I-Med Pharma v. Biomatrix (D.N.J 2011) ediscovery case highlighting importance of knowing your clients computer system
  • 13. Munster v. Groce (Ind. App 2005) lawyers duty to Google as part of due diligence
  • 14. Dubios v. Butler (Fl. App 2005) Lawyers duty to use Internet resources as part of due diligence, not to use methods that have gone “the way of the horse and buggy and the eight track stereo.”
  • 15. Largent v. Reed, Case No. 2009-1823 (C.P. Franklin Nov. 8, 2011) Pennsylvania court recently ruled that information posted by a party on their personal Facebook page is discoverable and ordered the plaintiff to provide their user name and password to enable the production of the information.
  • 16. State of Connecticut vs. Eleck, 2011 WL 3278663 (Conn.App. 2011) highlights the importance of employing best practices technology to collect, preserve and produce social media evidence.
  • 17.
  • 18. NEW YORK STATE BAR ASSOCIATION Committee on Professional Ethics Opinion # 843 (09/10/2010) Q: May a lawyer view and access the Facebook or MySpace pages of a party other than his or her client in pending litigation in order to secure information about that party for use in the lawsuit, including impeachment material, if the lawyer does not “friend” the party and instead relies on public pages posted by the party that are accessible to all members in the network? A: A lawyer who represents a client in a pending litigation, and who has access to the Facebook or MySpace network used by another party in litigation, may access and review the public social network pages of that party to search for potential impeachment material. As long as the lawyer does not "friend" the other party or direct a third person to do so, accessing the social network pages of the party will not violate Rule 8.4 (prohibiting deceptive or misleading conduct), Rule 4.1 (prohibiting false statements of fact or law), or Rule 5.3(b)(1) (imposing responsibility on lawyers for unethical conduct by nonlawyers acting at their direction). http://www.nysba.org/AM/Template.cfm?Section=Ethics_Opinions&TEMPLA TE=/CM/ContentDisplay.cfm&CONTENTID=43208
  • 19. 689 State and Federal Cases Involved social media evidence Myspace/Facebook = Criminal Twitter/LinkedIn = Corporate Trade, secret theft, copyright, trademark
  • 20.
  • 21. What about a Social Media Policy?
  • 22. Sample Social Media PolicyTemplate http://www.jaffepr.com/about-us/industry-insight/white-papers/social-media-policy-template Phone Dog vs. Noah Kravitz
  • 23.
  • 24.
  • 25.
  • 26. Upcoming Webinar Social Media eDiscovery Case Study & Applicable Best Practices March 28th 2012 1 – 2 pm ET http://www.d4discovery.com/2012/03/webinar-social-media-ediscovery-case- study-applicable-best-practices/
  • 27. Actionable Items  Understand social media privacy  Research software for preservation and archiving of social media information  Understand your firms social media policy / be on the social media policy committee  Create accounts on social media sites so you understand  Know where information is stored/devices where information is stored in your firm with your attorneys  Educate attorneys to think about where client information may be stored (in the cloud, servers, devices, etc.)  Adopt standards for how to use electronically stored information, including social media.  Know Recent Social Media Cases (http://x1discovery.com/social_media_cases.html)
  • 28. Twitter @ediscoverygroup @nextpointmike @exterro @nextpoint @IEDiscovery @LitSuppGuru @eDiscJournal @ComplexD @GlobalEDDGroup @bowtielaw @nextpointlab @d4discovery LinkedIn Groups ARMA International RIM Professionals eDiscovery Women in eDiscovery Men in dDiscovery eDiscovery Networking Group eDiscovery Plain and Simple LegalIT e-Disc Electronic Discovery Professionals Enterprise eDiscovery in the Cloud The Electronic Discovery Reference Model Blogs of Interest blog.x1discovery.com/ www.digitalreefinc.com/blog/ www.d4discovery.com/ e-discoveryserviceblog/ www.mofo.com/sociallyaware/ www.sociallyawareblog.com/ RIM and eDiscovery Social Resources
  • 29. Sources for Presentation • http://www.natlawreview.com/article/ediscovery-social-media • http://x1discovery.com/video_webinar_duty_to_address.html • http://www.nysba.org/AM/Template.cfm?Section=Ethics_Opinions&TEMP LATE=/CM/ContentDisplay.cfm&CONTENTID=43208 • http://blog.x1discovery.com/2011/12/27/pennsylvania-courts-excellent- whitepaper-on-social-media-discovery/ • http://blog.x1discovery.com/2012/02/08/a-real-world-social-media- discovery-case-study-from-the-trenches/ • http://blog.x1discovery.com/2011/11/09/674-published-cases-involving- social-media-evidence/ • http://bowtielaw.wordpress.com/2012/02/22/huge-hole-in-ediscovery- process/ • http://bowtielaw.wordpress.com/2010/05/12/convicted-by-text-message- overcoming-authentication-hearsay-objections • http://www.digitalreefinc.com/blog/bid/82157/Recap-of-Digital-Reef-s- Social-Media-White-Paper/
  • 30. Law Firms and Social Media FACT: Washington Post 20 percent of law firms have a full-time social media specialist on staff, and about 40 percent said blogging and social networking initiatives have helped the firm land new work.
  • 31. Q & A

Hinweis der Redaktion

  1. there is new exploitation of these media for communication that will ultimately give rise to discoverableinformation and the subject matter of litigation
  2. defendants hired an expert to conduct a keyword search of plaintiff’s computer network, servers, and related storage devices. Per the court's order, plaintiff was to produce the results of the examination. There were more than 50 search terms, and many were also run in French. Moreover, “the search was not limited to targeted document custodians or relevant time periods. Indeed, the search was not even limited to active files.” The search was instead run “across all data on the computer system” including unallocated space. Unsurprisingly, the results were voluminous, returning 64,382,929 hits in unallocated space alone which represented approximately 95 million pages of data.Following a telephonic hearing, the Magistrate Judge entered an order permitting plaintiff to withhold data found in the unallocated space and allowing defendants to seek reimbursement for the costs incurred in extracting and searching that data. Among other things, the order was based on findings that the burden of the review would outweigh any potential benefit and that the likelihood of finding relevant, admissible evidence was “minimal.”
  3. in a recent Indiana decision, the court was incredulous that the plaintiff failed to “Google” themissing defendant (Joe Groce) as part of his due diligence process. The court stated, “We do note that thereis no evidence in this case of a public records or Internet search for Groce…to find him. In fact, we [the judge]discovered, upon entering ‘Joe Groce Indiana’ into the Google™ search engine, an address for Groce thatdiffered from either address used in this case, as well as an apparent obituary for Groce’s mother that listednumerous surviving relatives who might have known his whereabouts.” The court upheld the defendant’sclaim of insufficient service of process and affirmed the dismissal of the case. Munster v. Groce, 829 N.E.2d 52(Ind. App. 2005) available at http://caselaw.lp.findlaw.com/data2/indianastatecases/app/06080501mpb.pdf.
  4. the court noted that the investigative technique of merely calling directory assistanceto find a missing defendant
  5. The case arose out of a chain-reaction automobile vs. motorcycle accident from which the plaintiffs allegedly suffered serious and permanent physical and mental injuries. However, the Facebook public timeline page of one of the plaintiffs featured content that contradicted her claims of serious injury, including several photographs showing her enjoying life with her family and a status update about going to the gym. Based upon this information, Defendant moved to compel disclosure of Plaintiff’s Facebook username and password. The ruling determined that no social media privacy privilege exists: “No court has recognized such a privilege, and neither will we.” Information on Facebook is shared with third parties and, thus, there is no reasonable expectation of privacy in such information. As Judge Walsh explained, “[o]nly the uninitiated or foolish could believe that Facebook is an online lockbox of secrets.”
  6. In this case, defendant Robert Eleck sought to admit Facebook evidence at trial that would have impeached a prosecution witness, Simone Judway.  Judway denied authorship of the Facebook messages in question, claiming someone must have hacked her account, even though the evidence revealed that the hacking occurred after the subject messages were sent.  The court determined that Eleck, who offered only a simple printout of the Facebook items, failed to adequately authenticate the data, ruling that “it was incumbent on the defendant, as the proponent, to advance other foundational proof to authenticate that the proffered messages did, in fact, come from Judway and not simply from her Facebook account.” The court cited precedent cases where emails, chat logs and texts were properly admitted based upon their supporting and unique metadata and other circumstantial evidence that provide “identifying characteristics.” See, e.g. United States v. Siddiqui, 235 F.3d1318, 1322-23 (11th Cir.2000) (e-mails properly authenticated when they included defendant’s e-mail address, the reply function automatically dialed defendant’s e-mail address as sender, messages contained factual details known to defendant, messages included defendant’s 625*625 nickname, and other metadata.) Dickens v. State, 175 Md.App. 231, 927 A.2d 32, 36-38 (2007) (threatening text messages received by victim on cell phone were properly authenticated when circumstantial evidence provided adequate proof message was sent by defendant); In re F.P., 878 A.2d91, 93-95 (Pa.Super.Ct.2005) (instant messages properly authenticated through circumstantial evidence including screen names and context of messages and surrounding circumstances).When lawyers and their service providers rely on simple screen captures, printouts or even compliance archiving solutions that fail to collect and preserve all key metadata to admit social media into evidence, they run a significant risk of having key evidence in support of their client’s case disallowed by the court.
  7. Storing records, electronically, and retention policies…
  8. The crux of the lawsuit is that Kravitz was paid as a product reviewer and video blogger for PhoneDog from April 2006 through October 2010, and that this position included posting tweets on a Twitter account called @PhoneDog_Noah. After Kravitz left PhoneDog, he changed the name of the account to @noahkravitz, and kept its followers instead of relinquishing the account and its followers over to PhoneDog as was requested of him. On November 28, 2011, the complaint survived a motion to dismiss filed by Kravitz with the magistrate judge allowing the claims for misappropriation of trade secrets and conversion to stand, and giving PhoneDog leave to file amended claims for intentional interference with prospective economic advantage and negligent interference with prospective economic advantage. On the tortious interference claims, the court held that PhoneDog failed to allege how Kravitz continuing to use the Twitter account in his own name disrupted the purported relationships between PhoneDog and the Twitter users, or how it resulted in economic harm – two essential elements for these claims.