SlideShare ist ein Scribd-Unternehmen logo
1 von 32
1
WHAT’S IN STORE FOR E-DISCOVERY IN 2015?
TOP 4 TRENDS TO WATCH
2
Join Today! aceds.org/join
Exclusive News and Analysis
Monthly Members-Only Webcasts
Networking with CEDS, Members
On-Demand Training
Resources
Jobs Board
bits + bytes Newsletter
Affinity Partner Discounts
“ACEDS provides an excellent, much needed forum
 to train, network and stay
current on critical information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
3
4
Presenters
Stephanie L. Giammarco leads BDO’s Forensic Technology Services
practice with more than 20 years of experience and a background in
accounting, information technology and criminology. Having worked
on some of the largest financial frauds to date, she has led teams
creating databases of millions of records, performed advanced data
analytics and provided testimony pertaining to damages and
electronically stored information.
Stephanie provides litigation and consulting services to organizations
and their counsel, including data analytics, computer forensics and
e-discovery services related to domestic and international matters
involving product liability, financial statement fraud, class action
lawsuits, internal investigations, securities fraud, employee and
vendor schemes, and breach of contract. She is skilled in the
collection, preservation and analysis of electronic evidence, as well
as the implementation of various e-discovery tools.
She has been deposed as a Rule 30(b)6 e-discovery witness and
testified before the Judicial Arbitration Services on the calculation
of damages in contract disputes. Stephanie has published and
presented on a range of computer forensics and e-discovery topics,
including before the Securities and Exchange Commission, Security
Industry Authority and National Futures Association.
Dan Meyers is a partner in Bracewell's New York office and a member
of Bracewell's Litigation Section. He has experience representing
private investment funds, financial institutions and energy
companies in a wide range of complex commercial disputes before
federal and state courts.
Dan's practice focuses on eDiscovery and information governance.
Dan assists clients in developing their eDiscovery policies and
procedures, implementing those policies in specific cases and
ensuring that his clients’ regulatory and dispute-based preservation
obligations are satisfied in a cost-effective and fully-defensible
manner.
Dan's practice areas also include corporate governance disputes
(including breach of fiduciary duty claims and shareholder disputes),
federal bankruptcy claims (including fraudulent transfer and
valuation disputes), securities claims, and state law contract and
business tort actions. He also has experience defending parent
corporations against claims of derivative liability for the alleged
debts of their subsidiaries or affiliates, whether under common law
theories of alter ego and veil piercing liability or statutory bases for
derivative corporate liability.
Stephanie L. Giammarco, CPA/CITP, CFE, CEDS
Partner, BDO Consulting
sgiammarco@bdo.com
Direct: 212-885-7439
Daniel S. Meyers
Partner, Bracewell & Giuliani
daniel.meyers@bgllp.com
Direct: 212-508-6107
5
Trend #1
Litigation readiness
6
What’s in store for e-discovery in 2015?
Litigation Readiness
7
What’s in store for e-discovery in 2015?
The Spoliation Sanctions “Gotcha Game”
Judge Shira Scheindlin: e-discovery sanctions need limits, “lest litigation
become a ‘gotcha’ game rather than a full and fair opportunity to air the merits
of a dispute.”
Pension Committee, 685 F. Supp. 2d 456 (S.D.N.Y. 2010)
8
What’s in store for e-discovery in 2015?
But a “ ‘Gotcha’ Game” is Exactly What Has Occurred
Sanctions for e-discovery Violations: By the Numbers, Duke L.J. (2010)
Electronic Discovery Year-End Update (2012), Gibson Dunn
9
What’s in store for e-discovery in 2015?
The Proliferation of Sanctions Motions Continues
In 2014, companies reported a 42% rise in cases in which they have had to
defend their preservation practices
-- Legal Hold Pro, Legal Hold & Data Preservation Benchmark Survey 2014
10
What’s in store for e-discovery in 2015?
Common Types of Sanctions
Monetary fines:
 Philip Morris sanctioned $2,750,000 for failing to preserve emails. U.S. v. Philip
Morris (D.C. 2004)
 Pharmaceutical companies sanctioned $931,500 for failing to preserve text
messages. In re Praxada (S.D.Ill. Dec. 2013)
Adverse Inference Instructions:
 “In practice, an adverse inference instruction often ends litigation—it is too
difficult a hurdle for the spoliator to overcome. The in terrorem effect of an
adverse inference is obvious. When a jury is instructed that it may infer that the
party who destroyed potentially relevant evidence did so out of a realization that
the evidence was unfavorable, the party suffering this instruction will be hard-
pressed to prevail on the merits.” Zubulake, 220 F.R.D. at 219-220
11
What’s in store for e-discovery in 2015?
“Preserve Everything” is Not the Answer
 It’s too expensive. Companies spend millions preserving ESI when litigation
is threatened, but never actually filed
– And even when litigation is filed, the cost of collecting, processing and reviewing
is compounded by large troves of legacy data
 It’s too risky. The more you store, the greater your exposure to a cyber
attack
12
What’s in store for e-discovery in 2015?
The Amended Federal Rules are an Incomplete and Unknown Answer
 They are not effective until December 2015
 It will be years before we know how the federal bench will interpret and
apply the new provisions
 Judges may “end run” the new restrictions through their “inherent power”
to sanction for spoliation
 The rules do not apply in state court proceedings, so businesses still will not
have uniform judicial standards against which to measure their conduct
13
What’s in store for e-discovery in 2015?
The Best Defense: a Litigation Readiness and Document Preservation
Plan
 A party seeking sanctions for the spoliation of ESI must demonstrate that the
data was lost with a “culpable state of mind” (i.e., negligence, recklessness
or willfulness)
 Maintaining a “comprehensive standard document preservation policy” is a
robust defense to any allegation of culpability
-- Research Fund. of SUNY v. Nektar Ther. (S.D.N.Y. 2013)
 The proposed federal amendments only bolster reliance on a Litigation
Readiness and Document Preservation Plan because it will be very difficult to
prove that a company maintaining and following such a plan “failed to take
reasonable steps” and/or “acted with intent to deprive” their adversary of
the ESI
14
What’s in store for e-discovery in 2015?
Anatomy of a Litigation Readiness Plan
 Audit of litigation and regulatory retention obligations
 Data map of the sources and locations of data
 Customizable form litigation hold letters
– For custodians, IT, HR and third parties
 Interview forms
 Standard release notices
 Centralized tracking of hold status
15
Trend # 2
Data analytics and visualization
16
What’s in store for e-discovery in 2015?
Data Analytics and Visualization
17
Data Analytics and Visualization
What’s in store for e-discovery in 2015?
The 4 V’s of Big Data
VOLUME VELOCITY VARIETY VERACITY
18
Data Analytics and Visualization
What’s in store for e-discovery in 2015?
The 4 A’s of E-Discovery Impact
ANALYTICS ASSESSMENT ACCELERATION ASSISTED
REVIEW
19
What’s in store for e-discovery in 2015?
Data Analytics and Visualization
 The results

Increased
planning /
more
prepared
Increased
efficiency
Decreased
Cost
20
What’s in store for e-discovery in 2015?
Data Analytics and Visualization
21
What’s in store for e-discovery in 2015?
Data Analytics and Visualization
22
Trend # 3
Cross-border e-discovery
23
What’s in store for e-discovery in 2015?
Relevance of Foreign Privacy and Other “Blocking” Statutes to U.S.
E-Discovery
Scenario One: You are served with a document request seeking data that you
store on a foreign server located in a jurisdiction that prohibits the processing
or the cross-border transfer of that data. What do you do?
Scenario Two: Your adversary is trying to evade your document requests by
claiming that the relevant data is on a foreign server located in a jurisdiction
that prohibits the processing or the cross-border transfer of that data. What
can you do?
24
What’s in store for e-discovery in 2015?
Content of Foreign Privacy Laws
 Every jurisdiction is different. The “red flag” takeaway is to
exercise caution whenever production is sought of documents
stored in a foreign jurisdiction
 EU Privacy Directive
– Sets a floor that member states must adopt in their national laws
– Scope of “personal data”
– Prohibits the “processing” of data and also the transferring of
data to non-EU countries
– Permits exceptions, which should be reviewed carefully
25
What’s in store for e-discovery in 2015?
How U.S. Courts Address Foreign Obstacles to Production
The factors that US courts consider are:
1) the importance to the litigation of the documents or other information
requested;
2) the degree of specificity of the request;
3) whether the information originated in the United States;
4) the availability of alternative means of securing the information; and
5) the extent to which noncompliance with the request would undermine
important interests of the United States, or compliance with the request
would undermine important interests of the state where the information is
located.
Societe Nationale Industrielle Aerospatiale v. United States Dist. Court,
482 U.S. 522 (1987)
“Where the Money Goes” 2014 RAND Report
26
Trend #4
Mobile data challenges
27
What’s in store for e-discovery in 2015?
The Challenges of Preserving, Collecting and Processing Mobile Data
28
What’s in store for e-discovery in 2015?
The Challenges of Preserving, Collecting and Processing Mobile Data
29
What’s in store for e-discovery in 2015?
The Challenges of Preserving, Collecting and Processing Mobile Data
30
What’s in store for e-discovery in 2015?
The Challenges of Preserving, Collecting and Processing Mobile Data
31
What’s in store for e-discovery in 2015?
The Challenges of Preserving, Collecting and Processing Mobile Data
 The results

IDENTIFY all sources of potentially relevant data/reduce risk of spoliation
EMPLOY appropriate tools and software
UNDERSTAND what data is available
UTILIZE the information appropriately
32
Q & A
Stephanie L. Giammarco
Partner, BDO Consulting
sgiammarco@bdo.com
Direct: 212-885-7439
Daniel S. Meyers
Partner, Bracewell & Giuliani
daniel.meyers@bgllp.com
Direct: 212-508-6107

Weitere Àhnliche Inhalte

Was ist angesagt?

Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Zapproved
 
ZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB
 
What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17Arthur Garcia
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48Resilient Systems
 
International/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeInternational/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeEthan Burger
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White PaperKevin Featherly
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachFinancial Poise
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 

Was ist angesagt? (20)

Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
 
ZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB White Paper - Bringing e-Discovery In-house
ZyLAB White Paper - Bringing e-Discovery In-house
 
What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17What’s new in Fla. Bar 02.24.17
What’s new in Fla. Bar 02.24.17
 
When not if
When not ifWhen not if
When not if
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
International/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeInternational/Cross Border Legal Malpractice
International/Cross Border Legal Malpractice
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 

Andere mochten auch

Power point cuatro estaciones
Power point cuatro estacionesPower point cuatro estaciones
Power point cuatro estacionesNerea Montalvo
 
ДДтО Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°
ДДтО Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°Đ”Đ”Ń‚Đž Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°
ДДтО Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°rudi378
 
Social media dicks, rebecca
Social  media dicks, rebeccaSocial  media dicks, rebecca
Social media dicks, rebecca2121777
 
ekarup ppt
ekarup pptekarup ppt
ekarup ppteka rup
 
Safetypassport hydrostatics
Safetypassport hydrostaticsSafetypassport hydrostatics
Safetypassport hydrostaticsfiretraining
 
Perceiving and believing 6th session
Perceiving and believing 6th sessionPerceiving and believing 6th session
Perceiving and believing 6th sessionTAUSIQUE SHEIKH
 
Ori kathe c.a gastrico.
Ori kathe c.a gastrico.Ori kathe c.a gastrico.
Ori kathe c.a gastrico.Medicina Unerg
 
Manchester Cars BNI Presentation
Manchester Cars BNI PresentationManchester Cars BNI Presentation
Manchester Cars BNI PresentationBNI Bridgewater
 
Yeni microsoft power point sunusu (2)
Yeni microsoft power point sunusu (2)Yeni microsoft power point sunusu (2)
Yeni microsoft power point sunusu (2)safiye26
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
Orhan Pamuk, 8 Tahun Dipenjara Buku
Orhan Pamuk, 8 Tahun Dipenjara BukuOrhan Pamuk, 8 Tahun Dipenjara Buku
Orhan Pamuk, 8 Tahun Dipenjara BukuPindai Media
 
Nagesh_G
Nagesh_GNagesh_G
Nagesh_GNagesh G
 
Ulticon Builders Inc.: Its Corporate Social Re
  Ulticon Builders Inc.: Its Corporate Social Re  Ulticon Builders Inc.: Its Corporate Social Re
Ulticon Builders Inc.: Its Corporate Social Regianroces61
 
Marketing espionage
Marketing espionageMarketing espionage
Marketing espionageJen Methvin
 

Andere mochten auch (19)

Power point cuatro estaciones
Power point cuatro estacionesPower point cuatro estaciones
Power point cuatro estaciones
 
ДДтО Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°
ДДтО Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°Đ”Đ”Ń‚Đž Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°
ДДтО Đ±Đ»ĐŸĐșĐ°ĐŽĐœĐŸĐłĐŸ Đ›Đ”ĐœĐžĐłŃ€Đ°ĐŽĐ°
 
Social media dicks, rebecca
Social  media dicks, rebeccaSocial  media dicks, rebecca
Social media dicks, rebecca
 
Aprendizajes colaborativos
Aprendizajes colaborativosAprendizajes colaborativos
Aprendizajes colaborativos
 
ekarup ppt
ekarup pptekarup ppt
ekarup ppt
 
ASIANOW - Asiaweek
ASIANOW - AsiaweekASIANOW - Asiaweek
ASIANOW - Asiaweek
 
Safetypassport hydrostatics
Safetypassport hydrostaticsSafetypassport hydrostatics
Safetypassport hydrostatics
 
Pas presentation lessons learnt
Pas presentation   lessons learntPas presentation   lessons learnt
Pas presentation lessons learnt
 
Perceiving and believing 6th session
Perceiving and believing 6th sessionPerceiving and believing 6th session
Perceiving and believing 6th session
 
Ori kathe c.a gastrico.
Ori kathe c.a gastrico.Ori kathe c.a gastrico.
Ori kathe c.a gastrico.
 
Manchester Cars BNI Presentation
Manchester Cars BNI PresentationManchester Cars BNI Presentation
Manchester Cars BNI Presentation
 
Yeni microsoft power point sunusu (2)
Yeni microsoft power point sunusu (2)Yeni microsoft power point sunusu (2)
Yeni microsoft power point sunusu (2)
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Orhan Pamuk, 8 Tahun Dipenjara Buku
Orhan Pamuk, 8 Tahun Dipenjara BukuOrhan Pamuk, 8 Tahun Dipenjara Buku
Orhan Pamuk, 8 Tahun Dipenjara Buku
 
Nagesh_G
Nagesh_GNagesh_G
Nagesh_G
 
BPR
BPRBPR
BPR
 
Bsa 376 week 5 dq 1
Bsa 376 week 5 dq 1Bsa 376 week 5 dq 1
Bsa 376 week 5 dq 1
 
Ulticon Builders Inc.: Its Corporate Social Re
  Ulticon Builders Inc.: Its Corporate Social Re  Ulticon Builders Inc.: Its Corporate Social Re
Ulticon Builders Inc.: Its Corporate Social Re
 
Marketing espionage
Marketing espionageMarketing espionage
Marketing espionage
 

Ähnlich wie What is in store for e-discovery in 2015?

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastLogikcull.com
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy ComplianceFinancial Poise
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...NationalUnderwriter
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Shawn Tuma
 
Cyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency servicesCyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency servicesVFIS
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocDavid Haines
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
BEA Presentation
BEA PresentationBEA Presentation
BEA PresentationGlenn E. Davis
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalJ. David Morris
 
BDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastBDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastLogikcull.com
 

Ähnlich wie What is in store for e-discovery in 2015? (20)

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Cyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency servicesCyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency services
 
Cyber liability and public entities infographic
Cyber liability and public entities infographic Cyber liability and public entities infographic
Cyber liability and public entities infographic
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.Doc
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Behind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco FinalBehind The Firewall In-House E Disco Final
Behind The Firewall In-House E Disco Final
 
BDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastBDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 Webcast
 

Mehr von Logikcull.com

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Logikcull.com
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleLogikcull.com
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law UpdateLogikcull.com
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull.com
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull.com
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewLogikcull.com
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Logikcull.com
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastLogikcull.com
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastLogikcull.com
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy Logikcull.com
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataLogikcull.com
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantLogikcull.com
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Logikcull.com
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 Logikcull.com
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesLogikcull.com
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastLogikcull.com
 

Mehr von Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 

KĂŒrzlich hochgeladen

äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠSS A
 
äž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠäž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠE LSS
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
äž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„ćžƒéČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„ćžƒéČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠäž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„枃éČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„ćžƒéČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠE LSS
 
äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠSS A
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
CALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 

KĂŒrzlich hochgeladen (20)

Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆè„żæŸłć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 
äž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠäž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆćˆ©ć…čć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
äž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„ćžƒéČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„ćžƒéČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠäž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„枃éČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆç‰›æŽ„ćžƒéČć…‹æ–Żć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 
äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
äž€æŻ”äž€ćŽŸç‰ˆæ—§é‡‘ć±±ć·žç«‹ć€§ć­ŠæŻ•äžšèŻć­ŠäœèŻäčŠ
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
CALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➄8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 

What is in store for e-discovery in 2015?

  • 1. 1 WHAT’S IN STORE FOR E-DISCOVERY IN 2015? TOP 4 TRENDS TO WATCH
  • 2. 2 Join Today! aceds.org/join Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes Newsletter Affinity Partner Discounts “ACEDS provides an excellent, much needed forum
 to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3. 3
  • 4. 4 Presenters Stephanie L. Giammarco leads BDO’s Forensic Technology Services practice with more than 20 years of experience and a background in accounting, information technology and criminology. Having worked on some of the largest financial frauds to date, she has led teams creating databases of millions of records, performed advanced data analytics and provided testimony pertaining to damages and electronically stored information. Stephanie provides litigation and consulting services to organizations and their counsel, including data analytics, computer forensics and e-discovery services related to domestic and international matters involving product liability, financial statement fraud, class action lawsuits, internal investigations, securities fraud, employee and vendor schemes, and breach of contract. She is skilled in the collection, preservation and analysis of electronic evidence, as well as the implementation of various e-discovery tools. She has been deposed as a Rule 30(b)6 e-discovery witness and testified before the Judicial Arbitration Services on the calculation of damages in contract disputes. Stephanie has published and presented on a range of computer forensics and e-discovery topics, including before the Securities and Exchange Commission, Security Industry Authority and National Futures Association. Dan Meyers is a partner in Bracewell's New York office and a member of Bracewell's Litigation Section. He has experience representing private investment funds, financial institutions and energy companies in a wide range of complex commercial disputes before federal and state courts. Dan's practice focuses on eDiscovery and information governance. Dan assists clients in developing their eDiscovery policies and procedures, implementing those policies in specific cases and ensuring that his clients’ regulatory and dispute-based preservation obligations are satisfied in a cost-effective and fully-defensible manner. Dan's practice areas also include corporate governance disputes (including breach of fiduciary duty claims and shareholder disputes), federal bankruptcy claims (including fraudulent transfer and valuation disputes), securities claims, and state law contract and business tort actions. He also has experience defending parent corporations against claims of derivative liability for the alleged debts of their subsidiaries or affiliates, whether under common law theories of alter ego and veil piercing liability or statutory bases for derivative corporate liability. Stephanie L. Giammarco, CPA/CITP, CFE, CEDS Partner, BDO Consulting sgiammarco@bdo.com Direct: 212-885-7439 Daniel S. Meyers Partner, Bracewell & Giuliani daniel.meyers@bgllp.com Direct: 212-508-6107
  • 6. 6 What’s in store for e-discovery in 2015? Litigation Readiness
  • 7. 7 What’s in store for e-discovery in 2015? The Spoliation Sanctions “Gotcha Game” Judge Shira Scheindlin: e-discovery sanctions need limits, “lest litigation become a ‘gotcha’ game rather than a full and fair opportunity to air the merits of a dispute.” Pension Committee, 685 F. Supp. 2d 456 (S.D.N.Y. 2010)
  • 8. 8 What’s in store for e-discovery in 2015? But a “ ‘Gotcha’ Game” is Exactly What Has Occurred Sanctions for e-discovery Violations: By the Numbers, Duke L.J. (2010) Electronic Discovery Year-End Update (2012), Gibson Dunn
  • 9. 9 What’s in store for e-discovery in 2015? The Proliferation of Sanctions Motions Continues In 2014, companies reported a 42% rise in cases in which they have had to defend their preservation practices -- Legal Hold Pro, Legal Hold & Data Preservation Benchmark Survey 2014
  • 10. 10 What’s in store for e-discovery in 2015? Common Types of Sanctions Monetary fines:  Philip Morris sanctioned $2,750,000 for failing to preserve emails. U.S. v. Philip Morris (D.C. 2004)  Pharmaceutical companies sanctioned $931,500 for failing to preserve text messages. In re Praxada (S.D.Ill. Dec. 2013) Adverse Inference Instructions:  “In practice, an adverse inference instruction often ends litigation—it is too difficult a hurdle for the spoliator to overcome. The in terrorem effect of an adverse inference is obvious. When a jury is instructed that it may infer that the party who destroyed potentially relevant evidence did so out of a realization that the evidence was unfavorable, the party suffering this instruction will be hard- pressed to prevail on the merits.” Zubulake, 220 F.R.D. at 219-220
  • 11. 11 What’s in store for e-discovery in 2015? “Preserve Everything” is Not the Answer  It’s too expensive. Companies spend millions preserving ESI when litigation is threatened, but never actually filed – And even when litigation is filed, the cost of collecting, processing and reviewing is compounded by large troves of legacy data  It’s too risky. The more you store, the greater your exposure to a cyber attack
  • 12. 12 What’s in store for e-discovery in 2015? The Amended Federal Rules are an Incomplete and Unknown Answer  They are not effective until December 2015  It will be years before we know how the federal bench will interpret and apply the new provisions  Judges may “end run” the new restrictions through their “inherent power” to sanction for spoliation  The rules do not apply in state court proceedings, so businesses still will not have uniform judicial standards against which to measure their conduct
  • 13. 13 What’s in store for e-discovery in 2015? The Best Defense: a Litigation Readiness and Document Preservation Plan  A party seeking sanctions for the spoliation of ESI must demonstrate that the data was lost with a “culpable state of mind” (i.e., negligence, recklessness or willfulness)  Maintaining a “comprehensive standard document preservation policy” is a robust defense to any allegation of culpability -- Research Fund. of SUNY v. Nektar Ther. (S.D.N.Y. 2013)  The proposed federal amendments only bolster reliance on a Litigation Readiness and Document Preservation Plan because it will be very difficult to prove that a company maintaining and following such a plan “failed to take reasonable steps” and/or “acted with intent to deprive” their adversary of the ESI
  • 14. 14 What’s in store for e-discovery in 2015? Anatomy of a Litigation Readiness Plan  Audit of litigation and regulatory retention obligations  Data map of the sources and locations of data  Customizable form litigation hold letters – For custodians, IT, HR and third parties  Interview forms  Standard release notices  Centralized tracking of hold status
  • 15. 15 Trend # 2 Data analytics and visualization
  • 16. 16 What’s in store for e-discovery in 2015? Data Analytics and Visualization
  • 17. 17 Data Analytics and Visualization What’s in store for e-discovery in 2015? The 4 V’s of Big Data VOLUME VELOCITY VARIETY VERACITY
  • 18. 18 Data Analytics and Visualization What’s in store for e-discovery in 2015? The 4 A’s of E-Discovery Impact ANALYTICS ASSESSMENT ACCELERATION ASSISTED REVIEW
  • 19. 19 What’s in store for e-discovery in 2015? Data Analytics and Visualization  The results
 Increased planning / more prepared Increased efficiency Decreased Cost
  • 20. 20 What’s in store for e-discovery in 2015? Data Analytics and Visualization
  • 21. 21 What’s in store for e-discovery in 2015? Data Analytics and Visualization
  • 23. 23 What’s in store for e-discovery in 2015? Relevance of Foreign Privacy and Other “Blocking” Statutes to U.S. E-Discovery Scenario One: You are served with a document request seeking data that you store on a foreign server located in a jurisdiction that prohibits the processing or the cross-border transfer of that data. What do you do? Scenario Two: Your adversary is trying to evade your document requests by claiming that the relevant data is on a foreign server located in a jurisdiction that prohibits the processing or the cross-border transfer of that data. What can you do?
  • 24. 24 What’s in store for e-discovery in 2015? Content of Foreign Privacy Laws  Every jurisdiction is different. The “red flag” takeaway is to exercise caution whenever production is sought of documents stored in a foreign jurisdiction  EU Privacy Directive – Sets a floor that member states must adopt in their national laws – Scope of “personal data” – Prohibits the “processing” of data and also the transferring of data to non-EU countries – Permits exceptions, which should be reviewed carefully
  • 25. 25 What’s in store for e-discovery in 2015? How U.S. Courts Address Foreign Obstacles to Production The factors that US courts consider are: 1) the importance to the litigation of the documents or other information requested; 2) the degree of specificity of the request; 3) whether the information originated in the United States; 4) the availability of alternative means of securing the information; and 5) the extent to which noncompliance with the request would undermine important interests of the United States, or compliance with the request would undermine important interests of the state where the information is located. Societe Nationale Industrielle Aerospatiale v. United States Dist. Court, 482 U.S. 522 (1987) “Where the Money Goes” 2014 RAND Report
  • 27. 27 What’s in store for e-discovery in 2015? The Challenges of Preserving, Collecting and Processing Mobile Data
  • 28. 28 What’s in store for e-discovery in 2015? The Challenges of Preserving, Collecting and Processing Mobile Data
  • 29. 29 What’s in store for e-discovery in 2015? The Challenges of Preserving, Collecting and Processing Mobile Data
  • 30. 30 What’s in store for e-discovery in 2015? The Challenges of Preserving, Collecting and Processing Mobile Data
  • 31. 31 What’s in store for e-discovery in 2015? The Challenges of Preserving, Collecting and Processing Mobile Data  The results
 IDENTIFY all sources of potentially relevant data/reduce risk of spoliation EMPLOY appropriate tools and software UNDERSTAND what data is available UTILIZE the information appropriately
  • 32. 32 Q & A Stephanie L. Giammarco Partner, BDO Consulting sgiammarco@bdo.com Direct: 212-885-7439 Daniel S. Meyers Partner, Bracewell & Giuliani daniel.meyers@bgllp.com Direct: 212-508-6107

Hinweis der Redaktion

  1. Hello and welcome to this ACEDS webcast, What’s in Store for E-Discovery in 2015, presented by BDO. I`m your host Robert Hilson of ACEDS, and we have a good one for you today, so let me go quickly through a couple of announcements and then I`ll turn it over to our presenters.
  2. You might have heard, ACEDS is now owned and managed by Barbri, the leading provider of legal education in the US and abroad – and we have a nice new logo and website to prove it. If you haven’t visited ACEDS.org in the last few weeks, I encourage you to do that
 ACEDS is a membership association committed to promoting e-discovery skill and competence through training, education, and networking, and we offer the Certified E-Discovery Specialist credential, which is held by more than a thousand practitioners in the US and globally. You can join today and start receiving a number of benefits exclusive to our members, including news content, members-only webcasts, our bits+bytes newsletter, a members directory, and special benefits from our affinity partners, which now include EDRM and Tru Staffing Partners.
  3. Also, ACEDS will be holding its annual conference September 29 to 30 at the Gaylord National Resort in Washington, DC. A live certification prep course will precede the conference, as always, on the 28th. And we expect another first-class show. We’ve announced a number of great speakers, including US district Judge Xavier Rodriguez and Paul Grimm, Magistrate Judge Judge Waxse and Judge Thomas Vanaskie, who sits on the Third Circuit Court of Appeals. We just announced some new panels as well, and I encourage everyone on the call to visit ediscoveryconference.com to get more information.
  4. Okay, let`s get started. We have two great presenters for you today. Stephanie Giammarco is a partner at BDO Consulting where she leads BDO’s Forensic Technology Services Practice. She brings more than 20 years of experience and a background in accounting, information technology and criminology to that role. Stephanie has worked on some of the largest financial frauds to date, and has led teams creating databases of millions of records, performed advanced data analytics and provided testimony pertaining to damages and ESI. Stephanie is also CEDS certified and a member of the ACEDS Advisory Board, and we are glad to host her and her great company BDO again. Stephanie, thanks for being here. Stephanie is joined by Dan Meyers, a partner in Bracewell & Giuliani`s New York office where he has represented private investment funds, financial institutions and energy companies in a wide range of complex commercial disputes before federal and state courts. His practice focuses on e-discovery and information governance, particularly on assisting clients in developing their e-discovery policies and procedures, implementing those policies in specific cases and ensuring regulatory and dispute-based preservation obligations are satisfied in a cost-effective and fully defensible manner. Dan, thanks for being here to today. It`s good to have you. Before we begin, I want to encourage everyone on the call to ask questions. We will get to them at the end of the presentation if time allows. Okay, Stephanie, I will turn it over to you.
  5. Note re: debate about encrypted devices in law enforcement