SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Government Investigations 2020:
Investigations Arising from Data Breach and
Privacy Concerns and Parallel Proceedings
THE AGENDA
REGISTER TODAY
800.260.4754
www.pli.edu/LGM0
FACULTY
CHAIR
Senior Program Attorney
Dana M. Berman
Priority Code: LGM0 FLY20
A Nonprofit Learning Organization
New York & Live Webcast January 31, 9:00 a.m. - 12:30 p.m. ET
Electronic information pervades our society. Corporations and other organizations create, store, and utilize
that information in all facets of business. Unfortunately, security can be breached and any breach can lead
to investigations by various government agencies at the federal and State levels. Those investigations may
lead to disputes about scope, variety and volume of electronic information to be produced.
This program will explore the role of electronic information through a hypothetical breach of a corporation’s
information that leads to an investigation. It will focus on the “what, why and how” an investigation is
conducted – from the viewpoint of the investigating agencies and of the corporate representatives charged
with responding to the investigation. The program will then consider a hypothetical class action that
parallels the investigation and how that parallel litigation interacts with the investigation.
Ronald J. Hedges
Dentons US LLP
New York City
For more information about PLI Privileged
Membership, visit www.pli.edu/membership
Scholarships are available to attend this program.
For information, visit learning.pli.edu/scholarship
Patrick Butts
Director of Legal Operations and
Information Governance
Hilltop Securities, Inc.
Dallas
Nicole Friedlander
Sullivan & Cromwell LLP
New York City
Manfred J. Gabriel
Holland & Knight LLP
New York City
Julie Lewis
President, CEO, and Founder
Digital Mountain, Inc.
Santa Clara, CA
Kathleen A. McGee
Lowenstein Sandler LLP
New York City
Kiran Patel
Dentons US LLP
New York City
Elizabeth Roper
Chief, Cybercrime and Identity Theft
Bureau
New York County District Attorney’s
Office
New York City
Christine Ryall
CFTC
Washington, DC
Erich P. Schork
Barnow and Associates, P.C.
Chicago
Hon. Lisa Margaret Smith
United States Magistrate Judge, SDNY
White Plains, NY
Jonathan E. Swerdloff
Consultant
Driven, Inc.
New York City
SCOPE AND LIMITS OF GOVERNMENT INVESTIGATION OF A DATA BREACH
•	 What conduct might give rise to a data breach investigation?
•	 Why is that conduct of a concern to an agency?
•	 What might be the scope of an investigation?
•	 What might the agency demand and what might the agency do with what is produced?
RESPONDING TO THE INVESTIGATION
•	 What should be the response to notice of an investigation?
•	 What compliance obligations might the notice create?
•	 What should be done to locate electronic information in response to a demand?
•	 What might a search look like?
•	 What should be done to produce electronic information in response to a demand?
•	 What alternative to production might exist?
PARALLEL CIVIL PROCEEDINGS
•	 What gives rise to parallel civil proceedings?
•	 When and why might parallel proceedings be stayed?
•	 How is information produced in investigations made available for civil proceedings?
•	 What is the relationship, if any, between an investigating agency and counsel for plaintiffs in a
parallel proceeding?
•	 What protections are available for information produced in investigations that may be subject to
attorney-client privilege and/or constitute work product?
January 31
PROGRAM LOCATION
PLI New York Center
1177 Avenue of the Americas, 2nd Floor, New York, NY 10036 (Entrance of W. 45th Street)
New York City Program	 #275701	 $895; Privileged Member Fee: $0

Weitere ähnliche Inhalte

Was ist angesagt?

Friending The Statehouse
Friending The StatehouseFriending The Statehouse
Friending The StatehouseMark Headd
 
Pew government-online-100427082251-phpapp02
Pew government-online-100427082251-phpapp02Pew government-online-100427082251-phpapp02
Pew government-online-100427082251-phpapp02Kirsten Deshler
 
Ecrea1d Schwate Jan Paper
Ecrea1d Schwate Jan PaperEcrea1d Schwate Jan Paper
Ecrea1d Schwate Jan Paperimec.archive
 
Dexa V03sept
Dexa V03septDexa V03sept
Dexa V03septrsandov
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuck Brooks
 
Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital LifeSusan Price
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...mysociety
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice InnovatieMarga van Rijssel
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)Han Woo PARK
 

Was ist angesagt? (20)

Friending The Statehouse
Friending The StatehouseFriending The Statehouse
Friending The Statehouse
 
Pew government-online-100427082251-phpapp02
Pew government-online-100427082251-phpapp02Pew government-online-100427082251-phpapp02
Pew government-online-100427082251-phpapp02
 
Ecrea1d Schwate Jan Paper
Ecrea1d Schwate Jan PaperEcrea1d Schwate Jan Paper
Ecrea1d Schwate Jan Paper
 
Dexa V03sept
Dexa V03septDexa V03sept
Dexa V03sept
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMIT
 
FuhSen
FuhSenFuhSen
FuhSen
 
Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital Life
 
Sunshine 2.0
Sunshine 2.0Sunshine 2.0
Sunshine 2.0
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Polinter07
Polinter07Polinter07
Polinter07
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice Innovatie
 
Bo rothstein
Bo rothsteinBo rothstein
Bo rothstein
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)
 
Technology progress
Technology progressTechnology progress
Technology progress
 

Ähnlich wie Pli government investigations 2020

Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
 
Tisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White PaperTisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White PaperKatie Weir
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0Jmschwietz1
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxchristalgrieg
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataMatthew Stubenberg
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawMatt Johnson
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social NetworkCarol Spencer
 

Ähnlich wie Pli government investigations 2020 (20)

Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
 
Tisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White PaperTisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White Paper
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Be a Better Business Watchdog -- CAR for Business Journalists
Be a Better Business Watchdog -- CAR for Business JournalistsBe a Better Business Watchdog -- CAR for Business Journalists
Be a Better Business Watchdog -- CAR for Business Journalists
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big Data
 
199408.pdf
199408.pdf199408.pdf
199408.pdf
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network2012: NJ GMIS: The Double Edge Sword of the Social Network
2012: NJ GMIS: The Double Edge Sword of the Social Network
 

Kürzlich hochgeladen

5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理ss
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书irst
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量acyefsa
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 

Kürzlich hochgeladen (20)

5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 

Pli government investigations 2020

  • 1. Government Investigations 2020: Investigations Arising from Data Breach and Privacy Concerns and Parallel Proceedings THE AGENDA REGISTER TODAY 800.260.4754 www.pli.edu/LGM0 FACULTY CHAIR Senior Program Attorney Dana M. Berman Priority Code: LGM0 FLY20 A Nonprofit Learning Organization New York & Live Webcast January 31, 9:00 a.m. - 12:30 p.m. ET Electronic information pervades our society. Corporations and other organizations create, store, and utilize that information in all facets of business. Unfortunately, security can be breached and any breach can lead to investigations by various government agencies at the federal and State levels. Those investigations may lead to disputes about scope, variety and volume of electronic information to be produced. This program will explore the role of electronic information through a hypothetical breach of a corporation’s information that leads to an investigation. It will focus on the “what, why and how” an investigation is conducted – from the viewpoint of the investigating agencies and of the corporate representatives charged with responding to the investigation. The program will then consider a hypothetical class action that parallels the investigation and how that parallel litigation interacts with the investigation. Ronald J. Hedges Dentons US LLP New York City For more information about PLI Privileged Membership, visit www.pli.edu/membership Scholarships are available to attend this program. For information, visit learning.pli.edu/scholarship Patrick Butts Director of Legal Operations and Information Governance Hilltop Securities, Inc. Dallas Nicole Friedlander Sullivan & Cromwell LLP New York City Manfred J. Gabriel Holland & Knight LLP New York City Julie Lewis President, CEO, and Founder Digital Mountain, Inc. Santa Clara, CA Kathleen A. McGee Lowenstein Sandler LLP New York City Kiran Patel Dentons US LLP New York City Elizabeth Roper Chief, Cybercrime and Identity Theft Bureau New York County District Attorney’s Office New York City Christine Ryall CFTC Washington, DC Erich P. Schork Barnow and Associates, P.C. Chicago Hon. Lisa Margaret Smith United States Magistrate Judge, SDNY White Plains, NY Jonathan E. Swerdloff Consultant Driven, Inc. New York City SCOPE AND LIMITS OF GOVERNMENT INVESTIGATION OF A DATA BREACH • What conduct might give rise to a data breach investigation? • Why is that conduct of a concern to an agency? • What might be the scope of an investigation? • What might the agency demand and what might the agency do with what is produced? RESPONDING TO THE INVESTIGATION • What should be the response to notice of an investigation? • What compliance obligations might the notice create? • What should be done to locate electronic information in response to a demand? • What might a search look like? • What should be done to produce electronic information in response to a demand? • What alternative to production might exist? PARALLEL CIVIL PROCEEDINGS • What gives rise to parallel civil proceedings? • When and why might parallel proceedings be stayed? • How is information produced in investigations made available for civil proceedings? • What is the relationship, if any, between an investigating agency and counsel for plaintiffs in a parallel proceeding? • What protections are available for information produced in investigations that may be subject to attorney-client privilege and/or constitute work product? January 31 PROGRAM LOCATION PLI New York Center 1177 Avenue of the Americas, 2nd Floor, New York, NY 10036 (Entrance of W. 45th Street) New York City Program #275701 $895; Privileged Member Fee: $0