SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Social Media and the Future of E-
Discovery
Bruce Malter, CEDS
General Manager,
Merrill Corporation
Chicago
Presenter
• 23 years of technology-based experience in
professional services space
• Focus on litigation support and e-discovery
• Previously a solutions group leader at
Project Leadership Associates, where he
built and managed litigation support
practice
• Among first to earn Certified E-Discovery
Specialist credential
Bruce Malter, CEDS
General Manager
Merrill Corporation
• Overview of Social Media Today
• Current State in eDiscovery
• Case law
• Stored Communications Act (SCA)
• How to Collect
• What’s Next
• Questions
Agenda
Over 1 Billion Registered
Users
Over 100M Registered Users
Over 150 Other Social Media Websites
• Consumers continue to spend more time on social networks than on any other
category of sites—roughly 20 percent of their total time online via personal
computer (PC), and 30 percent of total time online via mobile.
• Total time spent on social media in the U.S. across PCs and mobile devices
increased 37 percent to 121 billion minutes in July 2012, compared to 88
billion in July 2011.
• Facebook remains the most-visited social network in the U.S. via PC (152.2
million visitors), mobile apps (78.4 million users) and mobile web (74.3 million
visitors), and is multiple times the size of the next largest social site across each
platform.
• 51% of people aged 25–34 used social networking in the office, more than any
other age group.
FACTS ON SOCIAL MEDIA
FACEBOOK
STATS
• If Facebook were a country, it would be the
third largest in the world with its 1.2 billion
monthly active users.
(Behind China and India)
• Companies are on social media. They are interacting and connecting
with customers through Facebook, Twitter and blogs.
• In a study last year, numbers on the conservative side show that 65%
of Fortune Global 100 companies have active Twitter accounts, and
54% have Facebook fan pages. One third of these companies have a
blog.
This is how companies are doing
business today. With this presence
online comes legal obligations to
capture and save these
communications.
SOCIAL MEDIA IN THE WORKPLACE
When asked what challenges Corporate Counsel (EDD
management) will face in the future
• 23% of respondents cited managing mobile and social
networking data
• Cost control came in second at 18%
• New regulations (e.g., Federal Rules of Civil Procedure
amendments) 15%
BDO – October 2014
SOCIAL MEDIA IN THE WORKPLACE
“Social media content is like all other content that is
created by companies and individuals and is subject to the
same rules, laws and customs ... In e-discovery, there is no
difference between social media and electronic or even
paper artifacts. The phrase to remember is "if it exists, it is
discoverable.“ Gartner projects that half of all companies
will have been asked to produce social networking site
content in e-discovery requests by the end of 2013.”
Gartner VP Deborah Logan
SOCIAL MEDIA IN EDISCOVERY
Courts across the United States have now
made clear that discovery of social media is fair
game.
At the same time, courts have consistently
found that litigants will not be permitted to
engage in social media fishing expeditions;
rather, litigants will be required to show that the
sites likely contain relevant material.
SOCIAL MEDIA EDISCOVERY TO DATE HAS
TRADITIONALLY BEEN USED IN:
• Personal Injury
• Family (Divorce) Law
• Employment Law
• Intellectual Property
• Criminal
• Copyright
• Non-Compete
• Trademark
• Securities
• Breach of Contact
• Privacy breach
Charter Practices Int’l, LLC. v. Robb
2014 WL 273855 (D. Conn. Jan. 23, 2014)
• Breach of Contract
• Defendant failed to produce Facebook
communications relating to the breach, and the
court compelled production of the posts.
• http://www.natlawreview.com/article/social-
media-discovery-increasingly-important-
commercial-litigation (June 27, 2014).
RECENT CASE LAW
Ingrid & Isabel, LLC v. Baby Be Mine, LLC, et al
2014 WL 1338480 (N.D. Cal. April 1, 2014)
• Trademark Infringement
• Court compelled production of all customer
comments on Defendant’s Facebook and Twitter
accounts regarding the Belly Band as evidence of the
trademark infringement.
• http://www.natlawreview.com/article/social-media-
discovery-increasingly-important-commercial-
litigation (June 27, 2014).
SEC Netflix Investigation Report
• Netflix’s CEO announced on his personal
Facebook account how many hours of
content had been streamed by customers the
prior month
• Drove Netflix’s stock price up because the
information had not yet been publicly
disclosed.
• The SEC clarified that companies are to
advise the investing public about the methods
of communication that they might use to make
such disclosures, including corporate web
sites, social media, blogs, or otherwise.”
• http://www.crowell.com/files/Data-Law-
Trends-Report-2014.pdf
RECENT CASE LAW
United States v. Hassan
742 F.3d 104, 132-34 (4th Cir. 2014)
• Finding Facebook pages self-authenticating as
certified domestic business records
• Government presented certifications from the
records custodians of Facebook and Google, verifying
that the evidence had been maintained as business
records in the course of regularly conducted business
activities.
• Then tracked the Facebook pages and accounts to
the mailing and email addresses of the purported
creators via IP addresses.
• The court found that this two-step process fulfilled
the requirements of Federal Rule of Evidence
902(11).
“ACLU-MN settles Facebook case with Minnewaska School District. School
forces Riley Stratton, 12 years old, to give her Facebook username and
password”
Patrick Snay Lost $80,000 Because Of His Daughter’s Facebook Post: “Mama
and Papa Snay won the case against Gulliver … Gulliver is now officially paying
for my vacation to Europe this summer. SUCK IT.”
Sheriff Goes On A Firing Spree Because Of Facebook “Likes”
This unnamed sheriff fired six of his workers for “liking” a Facebook page. Elections were
coming up, and the sheriff was upset that one of his employees liked his competitor’s
page.
The employees filed a suit against the sheriff, but the judge immediately dismissed it. The
case states, “It is the Court’s conclusion that merely ‘liking’ a Facebook page is insufficient
speech to merit constitutional protection.” It was overturned a few years later
RECENT CASES
THE STORED COMMUNICATIONS ACT (SCA)
18 U.S.C.§2702
• It was enacted as Title II of the Electronic Communications
Privacy Act of 1986 (ECPA).
• Federal law limiting the ability of Internet service providers to
disclose customer information.
• “(a)(1) a person or entity providing an electronic communication
service to the public shall not knowingly divulge to any person or
entity the contents of a communication while in electronic
storage by that service.”
• No exception for civil discovery subpoenas
http://www.americanbar.org/publications/blt/2014/01/01_d
ibianca.html
THE STORED COMMUNICATIONS ACT (SCA)
Party’s Obligation
• A responding party must produce relevant ESI within its
possession, custody, or control.
• SCA does not override the standard discovery process.
• A court can compel a party to execute an authorization
to release information associated with a user’s social
media account.
http://www.americanbar.org/publications/blt/2014
/01/01_dibianca.html
https://www.facebook.com/about/privacy/
THE STORED COMMUNICATIONS ACT
(SCA) 18 U.S.C.§2702
• Facebook’s Law Enforcement & Third Party Matters Policy:
• “Federal law does not allow parties to obtain account contents
(ex. messages, Timeline posts, photos) using subpoenas. See
the Stored Communications Act, 18 U.S.C.§2701 et seq.”
• Courts have not adopted a uniform approach to handling
requests for social network information.
http://www.americanbar.org/publications/blt/2014/01/01_dibianca.html
Crispin v. Christian Audigier, Inc.
717 F. Supp. 2d 965 (C.D. Cal. 2010)
• Plaintiff moved to quash subpoenas Defendant
served on 3rd party social media.
• Court held:
• As electronic communication
service (ECS) providers under
the SCA, they were
prohibited from disclosing.
• First case holding that some social network
information is protected from subpoenas under
the SCA
http://www.americanbar.org/publications/blt/2014/01/01_dibia
nca.html
http://associatesmind.com/2015/01/26/social-media-subpoena-
guide-2015-edition/
THE STORED COMMUNICATIONS ACT (SCA)
Case Law
Romano v. Steelcase Inc.
907 N.Y.S.2d 650, (Sup. Ct. 2010)
• Plaintiff claimed she was bedridden and
housebound, but her public Facebook posts
show her outside of the home.
• Defendant requested access to her private posts
• Court disregarded the SCA finding the request
within the scope of permissible discovery under
New York law.
• How do you go about seeking social
media data in e-discovery?
• What are the best practices for
authenticating this data?
• What kind of software is used to
preserve social media data?
1. Print the page/screenshot
2. Download using Social Media Download tool
3. Software Applications
4. Forensics
HOW TO COLLECT FROM SOCIAL MEDIA
1. PRINT THE PAGE/SCREENSHOT
• Simple option
• Static printout of the page
• No metadata
• Similar to printing an email
• Not defensible
1. PRINT SCREEN
Missing Text
Comments/Like
not showing
Video – can’t watch
More Below
Links Don’t
Work
Overall
Appearance
No Meta
Data
Downloading Your Info
How can I download my information from Facebook?
You can download your information from your settings. To download your information:
1.Click at the top right of any Facebook page and select Settings
2.Click Download a copy of your Facebook data below your General Account Settings
3.Click Start My Archive
Because this download contains your profile information, you should keep it secure and be careful when storing, sending or uploading it to any
other services.
Learn more about what info is included in your download. If you don't have a Facebook account, you can make a data access request.
More info
Get help for mobile apps and browsers
Last edited about 4 months ago
Was this answer helpful? ·
Permalink · Share
Can I pick and choose which information I would like to download?
What security measures are in place to make sure someone else doesn’t download a copy of my information?
Learn more about what's included in your download.
2. USE SOCIAL MEDIA TOOLS
Downloading your Twitter archive
Downloading your Twitter archive to allows you to browse a snapshot of your Twitter information, starting with your
first Tweet.
To download and view your Twitter archive:
Go to your account settings by clicking on the profile icon at the top right of the page and selecting Settings from the
drop-down menu.
Click Request your archive.
When your download is ready, we'll send an email with a download link to the confirmed email address associated
with your Twitter account.
Once you receive the email, click the Go now button to download a .zip file of your Twitter archive.
Unzip the file and click index.html to view your archive in the browser of your choice.
Please note: It may take a few days for us to prepare the download of your Twitter archive.
2. USE SOCIAL MEDIA TOOLS
PROS
• Easy to get content from your page in one click
• You get all of the content from your page going back to the beginning of
your timeline
• The media is placed into separate folders -- there are folders for all of
your pics, for videos, etc.
CONS
• You only can download YOUR page
• The output does not look like the page itself
• Chain of custody is not maintained
• No context
• Difficult to generate a recognizable output
2. USE SOCIAL MEDIA TOOLS
• Captures the entire webpage
• Automatically Captures Metadata
• Content in one cloud account
• Integrates with Litigation Tools like Relativity
• Data is collected and indexed from social media streams, linked content and websites
through APIs, webmail connectors and direct web navigation.
• Authentication
• Search Capability
• Production
3. SOFTWARE APPLICATION
Forensic Collection
• Thorough and Accurate
• Current technology allows for continuous collection
• Preserves metadata fields pertaining to specific service
• Time Consuming
• More Expensive
4. FORENSICS
ADMISSIBILITY
“…(a screen capture) fails to identify who retrieved the website
printout, when and how the pages were printed, or… the contents
of the website on a certain date”
Gerald L. Rushfelt, US Magistrate Judge
(Toytrackerz LLC v. Koehler)
Maryland Approach
Permissible methodologies for authenticating social media
evidence:
1. Testimony of the creator,
2. Documentation of the internet history or hard drive of
the purported creator's computer, or
3. Information obtained directly from the social networking
site
ADMISSIBILITY
Authenticating Social Media Evidence
ADMISSIBILITY
Authenticating Social Media Evidence
Texas Approach
"a proponent can authenticate social media evidence using
any type of evidence so long as he or she can demonstrate
to the trial judge that a jury could reasonably find that the
proffered evidence is authentic.”
The next Generation and where Social
Media eDiscovery is going
Social Media and eDiscovery…
Contact Info
Bruce Malter
312-386-2278
bruce.malter@merrillcorp.com

Weitere ähnliche Inhalte

Was ist angesagt?

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionChris Marsden
 
Privately Obscure
Privately ObscurePrivately Obscure
Privately Obscurelisafilipek
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011guillaume ereteo
 
INTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital WorldINTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital Worldedwardo
 
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Now Dentons
 
The Double Edge Sword of the Social Network
The Double Edge Sword of the Social NetworkThe Double Edge Sword of the Social Network
The Double Edge Sword of the Social NetworkMorris County NJ
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your companyActiance, Inc.
 
The case for social media management and archiving
The case for social media management and archivingThe case for social media management and archiving
The case for social media management and archivingActiance, Inc.
 
Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
 

Was ist angesagt? (20)

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
Privately Obscure
Privately ObscurePrivately Obscure
Privately Obscure
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
New Digital Divide And Frontier
New Digital Divide And FrontierNew Digital Divide And Frontier
New Digital Divide And Frontier
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Engaging Times
Engaging TimesEngaging Times
Engaging Times
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011
 
#Legal social
#Legal social#Legal social
#Legal social
 
INTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital WorldINTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital World
 
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
 
Real Estatate
Real EstatateReal Estatate
Real Estatate
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
The Double Edge Sword of the Social Network
The Double Edge Sword of the Social NetworkThe Double Edge Sword of the Social Network
The Double Edge Sword of the Social Network
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your company
 
The case for social media management and archiving
The case for social media management and archivingThe case for social media management and archiving
The case for social media management and archiving
 
Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communications
 

Andere mochten auch

Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull.com
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewLogikcull.com
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Logikcull.com
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastLogikcull.com
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy Logikcull.com
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastLogikcull.com
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull.com
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 

Andere mochten auch (9)

Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 

Ähnlich wie Social media and the future of e-discovery

Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachSiddhesh Shah
 
TexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media PresentationTexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media PresentationD. Todd Smith
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal InvestigationsIan Tausig
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebookrahul8793
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forMcPhearson TVHolden
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Mediajrfields
 
Friending The Statehouse
Friending The StatehouseFriending The Statehouse
Friending The StatehouseMark Headd
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataMatthew Stubenberg
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 

Ähnlich wie Social media and the future of e-discovery (20)

Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
TexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media PresentationTexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media Presentation
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal Investigations
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebook
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Friending The Statehouse
Friending The StatehouseFriending The Statehouse
Friending The Statehouse
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big Data
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 

Mehr von Logikcull.com

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Logikcull.com
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleLogikcull.com
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law UpdateLogikcull.com
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataLogikcull.com
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantLogikcull.com
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastLogikcull.com
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Logikcull.com
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 Logikcull.com
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesLogikcull.com
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastLogikcull.com
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastLogikcull.com
 
ACEDS-Kroll Ontrack 1-14-15 Webcast
ACEDS-Kroll Ontrack 1-14-15 WebcastACEDS-Kroll Ontrack 1-14-15 Webcast
ACEDS-Kroll Ontrack 1-14-15 WebcastLogikcull.com
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?Logikcull.com
 
ACEDS January 2015 Members Only Webcast
ACEDS January 2015 Members Only WebcastACEDS January 2015 Members Only Webcast
ACEDS January 2015 Members Only WebcastLogikcull.com
 
ACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesLogikcull.com
 
BDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastBDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastLogikcull.com
 
Reading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof SkillsReading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof SkillsLogikcull.com
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Logikcull.com
 

Mehr von Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
ACEDS-Kroll Ontrack 1-14-15 Webcast
ACEDS-Kroll Ontrack 1-14-15 WebcastACEDS-Kroll Ontrack 1-14-15 Webcast
ACEDS-Kroll Ontrack 1-14-15 Webcast
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
ACEDS January 2015 Members Only Webcast
ACEDS January 2015 Members Only WebcastACEDS January 2015 Members Only Webcast
ACEDS January 2015 Members Only Webcast
 
ACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast Slides
 
BDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastBDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 Webcast
 
Reading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof SkillsReading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof Skills
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 

Kürzlich hochgeladen

PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 

Kürzlich hochgeladen (20)

PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 

Social media and the future of e-discovery

  • 1. Social Media and the Future of E- Discovery Bruce Malter, CEDS General Manager, Merrill Corporation Chicago
  • 2.
  • 3. Presenter • 23 years of technology-based experience in professional services space • Focus on litigation support and e-discovery • Previously a solutions group leader at Project Leadership Associates, where he built and managed litigation support practice • Among first to earn Certified E-Discovery Specialist credential Bruce Malter, CEDS General Manager Merrill Corporation
  • 4. • Overview of Social Media Today • Current State in eDiscovery • Case law • Stored Communications Act (SCA) • How to Collect • What’s Next • Questions Agenda
  • 5.
  • 6.
  • 7. Over 1 Billion Registered Users Over 100M Registered Users Over 150 Other Social Media Websites
  • 8. • Consumers continue to spend more time on social networks than on any other category of sites—roughly 20 percent of their total time online via personal computer (PC), and 30 percent of total time online via mobile. • Total time spent on social media in the U.S. across PCs and mobile devices increased 37 percent to 121 billion minutes in July 2012, compared to 88 billion in July 2011. • Facebook remains the most-visited social network in the U.S. via PC (152.2 million visitors), mobile apps (78.4 million users) and mobile web (74.3 million visitors), and is multiple times the size of the next largest social site across each platform. • 51% of people aged 25–34 used social networking in the office, more than any other age group. FACTS ON SOCIAL MEDIA
  • 9.
  • 10. FACEBOOK STATS • If Facebook were a country, it would be the third largest in the world with its 1.2 billion monthly active users. (Behind China and India)
  • 11. • Companies are on social media. They are interacting and connecting with customers through Facebook, Twitter and blogs. • In a study last year, numbers on the conservative side show that 65% of Fortune Global 100 companies have active Twitter accounts, and 54% have Facebook fan pages. One third of these companies have a blog. This is how companies are doing business today. With this presence online comes legal obligations to capture and save these communications. SOCIAL MEDIA IN THE WORKPLACE
  • 12. When asked what challenges Corporate Counsel (EDD management) will face in the future • 23% of respondents cited managing mobile and social networking data • Cost control came in second at 18% • New regulations (e.g., Federal Rules of Civil Procedure amendments) 15% BDO – October 2014 SOCIAL MEDIA IN THE WORKPLACE
  • 13. “Social media content is like all other content that is created by companies and individuals and is subject to the same rules, laws and customs ... In e-discovery, there is no difference between social media and electronic or even paper artifacts. The phrase to remember is "if it exists, it is discoverable.“ Gartner projects that half of all companies will have been asked to produce social networking site content in e-discovery requests by the end of 2013.” Gartner VP Deborah Logan SOCIAL MEDIA IN EDISCOVERY
  • 14. Courts across the United States have now made clear that discovery of social media is fair game.
  • 15. At the same time, courts have consistently found that litigants will not be permitted to engage in social media fishing expeditions; rather, litigants will be required to show that the sites likely contain relevant material.
  • 16. SOCIAL MEDIA EDISCOVERY TO DATE HAS TRADITIONALLY BEEN USED IN: • Personal Injury • Family (Divorce) Law • Employment Law • Intellectual Property • Criminal • Copyright • Non-Compete • Trademark • Securities • Breach of Contact • Privacy breach
  • 17. Charter Practices Int’l, LLC. v. Robb 2014 WL 273855 (D. Conn. Jan. 23, 2014) • Breach of Contract • Defendant failed to produce Facebook communications relating to the breach, and the court compelled production of the posts. • http://www.natlawreview.com/article/social- media-discovery-increasingly-important- commercial-litigation (June 27, 2014). RECENT CASE LAW Ingrid & Isabel, LLC v. Baby Be Mine, LLC, et al 2014 WL 1338480 (N.D. Cal. April 1, 2014) • Trademark Infringement • Court compelled production of all customer comments on Defendant’s Facebook and Twitter accounts regarding the Belly Band as evidence of the trademark infringement. • http://www.natlawreview.com/article/social-media- discovery-increasingly-important-commercial- litigation (June 27, 2014).
  • 18. SEC Netflix Investigation Report • Netflix’s CEO announced on his personal Facebook account how many hours of content had been streamed by customers the prior month • Drove Netflix’s stock price up because the information had not yet been publicly disclosed. • The SEC clarified that companies are to advise the investing public about the methods of communication that they might use to make such disclosures, including corporate web sites, social media, blogs, or otherwise.” • http://www.crowell.com/files/Data-Law- Trends-Report-2014.pdf RECENT CASE LAW United States v. Hassan 742 F.3d 104, 132-34 (4th Cir. 2014) • Finding Facebook pages self-authenticating as certified domestic business records • Government presented certifications from the records custodians of Facebook and Google, verifying that the evidence had been maintained as business records in the course of regularly conducted business activities. • Then tracked the Facebook pages and accounts to the mailing and email addresses of the purported creators via IP addresses. • The court found that this two-step process fulfilled the requirements of Federal Rule of Evidence 902(11).
  • 19. “ACLU-MN settles Facebook case with Minnewaska School District. School forces Riley Stratton, 12 years old, to give her Facebook username and password” Patrick Snay Lost $80,000 Because Of His Daughter’s Facebook Post: “Mama and Papa Snay won the case against Gulliver … Gulliver is now officially paying for my vacation to Europe this summer. SUCK IT.” Sheriff Goes On A Firing Spree Because Of Facebook “Likes” This unnamed sheriff fired six of his workers for “liking” a Facebook page. Elections were coming up, and the sheriff was upset that one of his employees liked his competitor’s page. The employees filed a suit against the sheriff, but the judge immediately dismissed it. The case states, “It is the Court’s conclusion that merely ‘liking’ a Facebook page is insufficient speech to merit constitutional protection.” It was overturned a few years later RECENT CASES
  • 20. THE STORED COMMUNICATIONS ACT (SCA) 18 U.S.C.§2702 • It was enacted as Title II of the Electronic Communications Privacy Act of 1986 (ECPA). • Federal law limiting the ability of Internet service providers to disclose customer information. • “(a)(1) a person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service.” • No exception for civil discovery subpoenas http://www.americanbar.org/publications/blt/2014/01/01_d ibianca.html
  • 21. THE STORED COMMUNICATIONS ACT (SCA) Party’s Obligation • A responding party must produce relevant ESI within its possession, custody, or control. • SCA does not override the standard discovery process. • A court can compel a party to execute an authorization to release information associated with a user’s social media account. http://www.americanbar.org/publications/blt/2014 /01/01_dibianca.html https://www.facebook.com/about/privacy/
  • 22. THE STORED COMMUNICATIONS ACT (SCA) 18 U.S.C.§2702 • Facebook’s Law Enforcement & Third Party Matters Policy: • “Federal law does not allow parties to obtain account contents (ex. messages, Timeline posts, photos) using subpoenas. See the Stored Communications Act, 18 U.S.C.§2701 et seq.” • Courts have not adopted a uniform approach to handling requests for social network information. http://www.americanbar.org/publications/blt/2014/01/01_dibianca.html
  • 23. Crispin v. Christian Audigier, Inc. 717 F. Supp. 2d 965 (C.D. Cal. 2010) • Plaintiff moved to quash subpoenas Defendant served on 3rd party social media. • Court held: • As electronic communication service (ECS) providers under the SCA, they were prohibited from disclosing. • First case holding that some social network information is protected from subpoenas under the SCA http://www.americanbar.org/publications/blt/2014/01/01_dibia nca.html http://associatesmind.com/2015/01/26/social-media-subpoena- guide-2015-edition/ THE STORED COMMUNICATIONS ACT (SCA) Case Law Romano v. Steelcase Inc. 907 N.Y.S.2d 650, (Sup. Ct. 2010) • Plaintiff claimed she was bedridden and housebound, but her public Facebook posts show her outside of the home. • Defendant requested access to her private posts • Court disregarded the SCA finding the request within the scope of permissible discovery under New York law.
  • 24. • How do you go about seeking social media data in e-discovery? • What are the best practices for authenticating this data? • What kind of software is used to preserve social media data?
  • 25. 1. Print the page/screenshot 2. Download using Social Media Download tool 3. Software Applications 4. Forensics HOW TO COLLECT FROM SOCIAL MEDIA
  • 26. 1. PRINT THE PAGE/SCREENSHOT • Simple option • Static printout of the page • No metadata • Similar to printing an email • Not defensible
  • 27. 1. PRINT SCREEN Missing Text Comments/Like not showing Video – can’t watch More Below Links Don’t Work Overall Appearance No Meta Data
  • 28. Downloading Your Info How can I download my information from Facebook? You can download your information from your settings. To download your information: 1.Click at the top right of any Facebook page and select Settings 2.Click Download a copy of your Facebook data below your General Account Settings 3.Click Start My Archive Because this download contains your profile information, you should keep it secure and be careful when storing, sending or uploading it to any other services. Learn more about what info is included in your download. If you don't have a Facebook account, you can make a data access request. More info Get help for mobile apps and browsers Last edited about 4 months ago Was this answer helpful? · Permalink · Share Can I pick and choose which information I would like to download? What security measures are in place to make sure someone else doesn’t download a copy of my information? Learn more about what's included in your download. 2. USE SOCIAL MEDIA TOOLS
  • 29. Downloading your Twitter archive Downloading your Twitter archive to allows you to browse a snapshot of your Twitter information, starting with your first Tweet. To download and view your Twitter archive: Go to your account settings by clicking on the profile icon at the top right of the page and selecting Settings from the drop-down menu. Click Request your archive. When your download is ready, we'll send an email with a download link to the confirmed email address associated with your Twitter account. Once you receive the email, click the Go now button to download a .zip file of your Twitter archive. Unzip the file and click index.html to view your archive in the browser of your choice. Please note: It may take a few days for us to prepare the download of your Twitter archive. 2. USE SOCIAL MEDIA TOOLS
  • 30. PROS • Easy to get content from your page in one click • You get all of the content from your page going back to the beginning of your timeline • The media is placed into separate folders -- there are folders for all of your pics, for videos, etc. CONS • You only can download YOUR page • The output does not look like the page itself • Chain of custody is not maintained • No context • Difficult to generate a recognizable output 2. USE SOCIAL MEDIA TOOLS
  • 31. • Captures the entire webpage • Automatically Captures Metadata • Content in one cloud account • Integrates with Litigation Tools like Relativity • Data is collected and indexed from social media streams, linked content and websites through APIs, webmail connectors and direct web navigation. • Authentication • Search Capability • Production 3. SOFTWARE APPLICATION
  • 32. Forensic Collection • Thorough and Accurate • Current technology allows for continuous collection • Preserves metadata fields pertaining to specific service • Time Consuming • More Expensive 4. FORENSICS
  • 33. ADMISSIBILITY “…(a screen capture) fails to identify who retrieved the website printout, when and how the pages were printed, or… the contents of the website on a certain date” Gerald L. Rushfelt, US Magistrate Judge (Toytrackerz LLC v. Koehler)
  • 34. Maryland Approach Permissible methodologies for authenticating social media evidence: 1. Testimony of the creator, 2. Documentation of the internet history or hard drive of the purported creator's computer, or 3. Information obtained directly from the social networking site ADMISSIBILITY Authenticating Social Media Evidence
  • 35. ADMISSIBILITY Authenticating Social Media Evidence Texas Approach "a proponent can authenticate social media evidence using any type of evidence so long as he or she can demonstrate to the trial judge that a jury could reasonably find that the proffered evidence is authentic.”
  • 36. The next Generation and where Social Media eDiscovery is going
  • 37. Social Media and eDiscovery…

Hinweis der Redaktion

  1. Welcome everyone to this ACEDS Members Only webcast, Social Media and the Future of E-Discovery. I’m Robert Hilson of ACEDS and I’m joined today by one of the first people to earn the CEDS credential. I will introduce him in just a moment. I do want to tell you first about our upcoming conference.
  2. We will be holding our 6th annual event from September 29 to 30 at the Gaylord National Resort in National Harbor, MD. A live certification prep course will precede the conference on the 28th. And we expect this to be our best show yet. We’ve announced a number of great speakers, including those you see on your screen. Earlier this month, we announced that retired US magistrate Judge Nan Nolan, who is now at JAMS, will be presenting, as well as Jeff Jacobson, the Director of the New Jersey Division of Law. They will join Judge Grimm, Judge Waxse, Judge Xavier Rodriguez and Judge Thomas Vanaskie among others. You can visit ediscoveryconference.com and learn more about the program and the topics we`ll cover. ACEDS members and CEDS get the best rates.
  3. Alright, let’s get started. Our presenter today is Bruce Malter. Bruce is a general manager at Merrill Corporation in Chicago. He brings more than 20 years of litigation support and e-discovery experience to that position. An expert in project management, he previously worked at Project Leadership Associates, where he built and managed that company’s e-discovery practice. He has presented to ACEDS members many times, on webcasts and at our conferences, and we are very happy to have him back today. Bruce, thanks for being here. Before we get started, I do want to encourage everyone on the call to ask questions. I will be fielding them throughout the presentation.
  4. http://www.americanbar.org/publications/blt/2014/01/01_dibianca.html
  5. http://www.americanbar.org/publications/blt/2014/01/01_dibianca.html
  6. http://www.americanbar.org/publications/blt/2014/01/01_dibianca.html
  7. http://www.americanbar.org/publications/blt/2014/01/01_dibianca.html
  8. Once you obtain the social media evidence, the question is “is it admissible in court?” There is a split among the courts on the appropriate standard for admissibility. There are 2 approaches.
  9. This is a higher standard than the TX Approach. Requires the proponent of evidence to offer proof that the posts are authentic.
  10. Under the TX Approach, you do not have to necessarily prove the evidence is authentic, so long as a jury could reasonably find it authentic. Can use ANY form of verification available under the Rules of Evidence.