SlideShare una empresa de Scribd logo
1 de 26
Information Security in the eDiscovery Process
CLE Information For attorneys requiring CLE, a CLE Verification Code will be given verbally during this session.  Please pay close attention and write down the code for your records. You may need this code to get your CLE. If you have any questions, members of this panel will be in the networking lounge immediately following this session. Please save your questions and visit us there.  2
Panelist Introductions Aaron Crews eDiscovery Counsel LittlerMendelson P.C. 3
Panelist Introductions Mark Michels Former Litigation & eDiscovery Counsel Cisco Systems, Inc. 4
Panelist Introductions Doug Stewart Director of Technology Daegis 5
Panelist Introductions Andy Teichholz, Esq. Senior eDiscovery Consultant Daegis 6
Today’s Topics What are the information security risks? Why is a process driven approach to information security needed? Who should be responsible for information security in the eDiscovery process? What are the hallmarks and best practices of good information security in the eDiscovery process? What’s the best way to evaluate the information security practices of your eDiscovery partners? 7
Information Security Defined “Information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide: Integrity - guarding against improper information modification or destruction, and ensuring information non-repudiation and authenticity;  Confidentiality - preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and  Availability - ensuring timely and reliable access to and use of information.  44 U.S.C. § 3542(b)(1) 8
Risk and Responsibilities 9
The Dominant eDiscovery Risks Mind the Gap Hand-offs between parties  Changes / Exceptions / Rushes Information security red flags General Lack of Awareness Treating information security as an IT issue Uncontrolled Copies Shared Accounts / Uncontrolled Access Lack of audit trail  / Chain of Custody Productions Pre-production Information Security Protections Data destruction / sanitization at conclusion of litigation 10
Data Types / Controls HIPAA Export Controlled Data Privacy / EU / PII PCI Financial Regulations State laws / Regulations governing data breach notifications 11
Sample eDiscovery Risk Analysis  12 CP = Corporation | LF = Law Firm | SP = Service Provider Risk:  1 (low) to 5 (high) scale C = Confidentiality | I = Integrity |  A = Availability
Sample Risk Analysis (continued) People (very high) Process / Procedures (high) Technology (moderate) Transportation of data (very high) Production and copy sets (high) Presentation / Trial exhibits (high) 13
Why A Process Driven Approach Systematic Approach Risk Assessment and Treatment Collaborative / 360° View Continual Improvement Documented Audited Thoughtful & proactive, not ad hoc & reactive 14
Who is Responsible? Information security is not solely an IT issue Cross-functional teams including IT, operations, PM’s, specialists, records and legal A collaborative approach is needed Corporation(s) Law firm(s) Service Providers Define roles in project plan 15
Hallmarks & Best Practices Address info security in project plan  Ensure all parties understand obligations Enter protective orders / confidentiality agreements Encrypt all data when in transit Encrypt all deliverables 16
Hallmarks & Best Practices Limit access to business need Restrict and control copies Produce smallest volume of sensitive data Audit User permissions and access  Compliance with information security procedures 17
ND Cal Protective Order Levels CONFIDENTIAL (a) Outside counsel of record/employees; (b) Other parties’ employees (c) Experts; (d) The court and its personnel; and (e) Court reporters, professional consultants/vendors HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY (a), (c), (d) & (e) [above] In-house counsel with no competitive decision-making HIGHLY CONFIDENTIAL – SOURCE CODE  (a), (c), (d) & (e) [above]
ND Cal Source Code Provisions Inspection On secured computer  In a secured room with no Internet access or network access Party may not copy code onto any recordable media/device Copies Limited paper copies bates numbers and the label “HIGHLY CONFIDENTIAL - SOURCE CODE.” Receiving Party Maintain all paper copies of any printed copies in a secured, locked area. Maintain a record of individuals who inspected source code May make additional paper copies for pleadings, expert’s expert report or deposition May not create any electronic images of the paper copies
Export Control Protective Order Provisions Export Control. Disclosure of Protected Material shall be subject to all applicable laws and regulations relating to the export of technical data . . . , including the release of such technical data to foreign persons or nationals in the United States or elsewhere. The Producing Party shall be responsible for identifying any such controlled technical data, and the Receiving Party shall take measures necessary to ensure compliance.
HIPAA Protective Order Terms This Order  authorizes disclosure of Protected Health Information such disclosures pursuant to 45 C.F.R. § 164.512(e) of the Privacy Regulations issued pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Further, pursuant to 45 C.F.R. § 164.512(e)(1)(v), this Order is also a Qualified Protective Order and all parties and attorneys are hereby: (A) Prohibited from using or disclosing the protected health information for any purpose other than the litigation or proceeding for which such information was requested; and (B) Required to return to the covered entity or to destroy the protected health information (including all copies made) at the end of the litigation proceeding. This Order permits disclosure of confidential communications, made for the purposes of diagnosis or treatment of a patient’s mental or emotional condition, including alcohol or drug addiction, nor does this Order permit disclosure of records or information relating to HIV testing or sexually transmitted disease which are protected from discovery by any statute, court rule or decision. Nothing in this Order authorizes any party or any attorney for any party to release, disclose, exchange, submit, or share any Protected Health Information to any other person or entity not unrelated to this litigation.
Evaluating Info Security: Ask Questions  Make use of the RFI / RFP to ask information security questions Ask people, process and technology questions Audit / Inspect Trust with verification  Check references 22
Information Security Certifications ISO 27001 Auditable international standard with 133 controls  SAS 70 Less defined than ISO27001 but widely used in the US SSAE 16 Supersedes SAS 70  Additional requirements added EU Safe Harbor and Similar Certification needed to handle data from the EU and other jurisdictions 23
ISO 27001 Risk Assessment ISMS Policies and procedures to implement controls Scope must be defined Management sponsorship and review Continual improvement Scheduled internal and external audits User Awareness/Understanding of Obligations 24
Continual Improvement Quality & innovation cycle: TQM, Six Sigma, ISO 9000 & 27001 Source:  Shewhart / Deming
Thank You! Questions? Contact ,[object Object]

Más contenido relacionado

La actualidad más candente

Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceEric Vanderburg
 
Staying Out of the Crosshairs
Staying Out of the CrosshairsStaying Out of the Crosshairs
Staying Out of the CrosshairsJoAnna Cheshire
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziKashif Semple
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposureabodiford
 
Best practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsBest practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsOnlineCompliance Panel
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...Graematter Inc
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsTripwire
 

La actualidad más candente (17)

Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network Conference
 
Staying Out of the Crosshairs
Staying Out of the CrosshairsStaying Out of the Crosshairs
Staying Out of the Crosshairs
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Ht t17
Ht t17Ht t17
Ht t17
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Best practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsBest practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'ts
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
Regulatory Intelligence Series - How to find Predicate Devices SOFIE compared...
 
Data security
Data securityData security
Data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
 

Destacado

Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)leolemes
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CloudIDSummit
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 

Destacado (6)

Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)Information Security Risks Management Maturity Model (ISRM3)
Information Security Risks Management Maturity Model (ISRM3)
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 

Similar a Information Security in the eDiscovery Process

Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...JustinFinch11
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
SOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core PrinciplesSOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core PrinciplesShyamMishra72
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceFintan Swanton
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityCynergisTek, Inc.
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxcomstarndt
 

Similar a Information Security in the eDiscovery Process (20)

Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
SOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core PrinciplesSOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core Principles
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 

Más de Daegis

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITDaegis
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to AvoidDaegis
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & ArchivingDaegis
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted ArchiveDaegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDaegis
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Daegis
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best DefenseDaegis
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewDaegis
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...Daegis
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesDaegis
 

Más de Daegis (11)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Último

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Information Security in the eDiscovery Process

  • 1. Information Security in the eDiscovery Process
  • 2. CLE Information For attorneys requiring CLE, a CLE Verification Code will be given verbally during this session.  Please pay close attention and write down the code for your records. You may need this code to get your CLE. If you have any questions, members of this panel will be in the networking lounge immediately following this session. Please save your questions and visit us there. 2
  • 3. Panelist Introductions Aaron Crews eDiscovery Counsel LittlerMendelson P.C. 3
  • 4. Panelist Introductions Mark Michels Former Litigation & eDiscovery Counsel Cisco Systems, Inc. 4
  • 5. Panelist Introductions Doug Stewart Director of Technology Daegis 5
  • 6. Panelist Introductions Andy Teichholz, Esq. Senior eDiscovery Consultant Daegis 6
  • 7. Today’s Topics What are the information security risks? Why is a process driven approach to information security needed? Who should be responsible for information security in the eDiscovery process? What are the hallmarks and best practices of good information security in the eDiscovery process? What’s the best way to evaluate the information security practices of your eDiscovery partners? 7
  • 8. Information Security Defined “Information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide: Integrity - guarding against improper information modification or destruction, and ensuring information non-repudiation and authenticity; Confidentiality - preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and Availability - ensuring timely and reliable access to and use of information. 44 U.S.C. § 3542(b)(1) 8
  • 10. The Dominant eDiscovery Risks Mind the Gap Hand-offs between parties Changes / Exceptions / Rushes Information security red flags General Lack of Awareness Treating information security as an IT issue Uncontrolled Copies Shared Accounts / Uncontrolled Access Lack of audit trail / Chain of Custody Productions Pre-production Information Security Protections Data destruction / sanitization at conclusion of litigation 10
  • 11. Data Types / Controls HIPAA Export Controlled Data Privacy / EU / PII PCI Financial Regulations State laws / Regulations governing data breach notifications 11
  • 12. Sample eDiscovery Risk Analysis 12 CP = Corporation | LF = Law Firm | SP = Service Provider Risk: 1 (low) to 5 (high) scale C = Confidentiality | I = Integrity | A = Availability
  • 13. Sample Risk Analysis (continued) People (very high) Process / Procedures (high) Technology (moderate) Transportation of data (very high) Production and copy sets (high) Presentation / Trial exhibits (high) 13
  • 14. Why A Process Driven Approach Systematic Approach Risk Assessment and Treatment Collaborative / 360° View Continual Improvement Documented Audited Thoughtful & proactive, not ad hoc & reactive 14
  • 15. Who is Responsible? Information security is not solely an IT issue Cross-functional teams including IT, operations, PM’s, specialists, records and legal A collaborative approach is needed Corporation(s) Law firm(s) Service Providers Define roles in project plan 15
  • 16. Hallmarks & Best Practices Address info security in project plan Ensure all parties understand obligations Enter protective orders / confidentiality agreements Encrypt all data when in transit Encrypt all deliverables 16
  • 17. Hallmarks & Best Practices Limit access to business need Restrict and control copies Produce smallest volume of sensitive data Audit User permissions and access Compliance with information security procedures 17
  • 18. ND Cal Protective Order Levels CONFIDENTIAL (a) Outside counsel of record/employees; (b) Other parties’ employees (c) Experts; (d) The court and its personnel; and (e) Court reporters, professional consultants/vendors HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY (a), (c), (d) & (e) [above] In-house counsel with no competitive decision-making HIGHLY CONFIDENTIAL – SOURCE CODE (a), (c), (d) & (e) [above]
  • 19. ND Cal Source Code Provisions Inspection On secured computer In a secured room with no Internet access or network access Party may not copy code onto any recordable media/device Copies Limited paper copies bates numbers and the label “HIGHLY CONFIDENTIAL - SOURCE CODE.” Receiving Party Maintain all paper copies of any printed copies in a secured, locked area. Maintain a record of individuals who inspected source code May make additional paper copies for pleadings, expert’s expert report or deposition May not create any electronic images of the paper copies
  • 20. Export Control Protective Order Provisions Export Control. Disclosure of Protected Material shall be subject to all applicable laws and regulations relating to the export of technical data . . . , including the release of such technical data to foreign persons or nationals in the United States or elsewhere. The Producing Party shall be responsible for identifying any such controlled technical data, and the Receiving Party shall take measures necessary to ensure compliance.
  • 21. HIPAA Protective Order Terms This Order authorizes disclosure of Protected Health Information such disclosures pursuant to 45 C.F.R. § 164.512(e) of the Privacy Regulations issued pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Further, pursuant to 45 C.F.R. § 164.512(e)(1)(v), this Order is also a Qualified Protective Order and all parties and attorneys are hereby: (A) Prohibited from using or disclosing the protected health information for any purpose other than the litigation or proceeding for which such information was requested; and (B) Required to return to the covered entity or to destroy the protected health information (including all copies made) at the end of the litigation proceeding. This Order permits disclosure of confidential communications, made for the purposes of diagnosis or treatment of a patient’s mental or emotional condition, including alcohol or drug addiction, nor does this Order permit disclosure of records or information relating to HIV testing or sexually transmitted disease which are protected from discovery by any statute, court rule or decision. Nothing in this Order authorizes any party or any attorney for any party to release, disclose, exchange, submit, or share any Protected Health Information to any other person or entity not unrelated to this litigation.
  • 22. Evaluating Info Security: Ask Questions Make use of the RFI / RFP to ask information security questions Ask people, process and technology questions Audit / Inspect Trust with verification Check references 22
  • 23. Information Security Certifications ISO 27001 Auditable international standard with 133 controls SAS 70 Less defined than ISO27001 but widely used in the US SSAE 16 Supersedes SAS 70 Additional requirements added EU Safe Harbor and Similar Certification needed to handle data from the EU and other jurisdictions 23
  • 24. ISO 27001 Risk Assessment ISMS Policies and procedures to implement controls Scope must be defined Management sponsorship and review Continual improvement Scheduled internal and external audits User Awareness/Understanding of Obligations 24
  • 25. Continual Improvement Quality & innovation cycle: TQM, Six Sigma, ISO 9000 & 27001 Source: Shewhart / Deming
  • 26.
  • 27. Mark Michels – mnpm2190@gmail.com
  • 28. Doug Stewart – dstewart@daegis.com
  • 29. Andy Teichholz – ateichholz@daegis.com