SlideShare una empresa de Scribd logo
1 de 14
The Special Case of Email John Gregory and Dan MichalukJanuary 24, 2011
Outline Let’s deal with the following four challenges Managing email Locating email Accessing email Proving email
But First… What’s an Email Nowadays? Stored, text-based communications today SMTP communications – “classic email” Computer generated faxes Webmail, Webmail via social networking application Multi User Domains Text messages VOIP communications
Managing Email (The Litigator’s View) This is a problem for corporations Retention policies are key Email servers not ordinarily a business records repository Email can be on a “short list” for retention Pressure to move it off server, sometimes auto-delete  Limit: likely be relevant to reasonably anticipated litigation This can be a discovery or trial issue Remmington (1998) – Common law duty to preserve? Broccoli v. Echostar (2005) – 21-day retention of e-mails
Locating Email …on the corporate network in an investigation  Pre-confrontation Email server  Lotus Domino, MS Exchange, GroupWise Mobile messaging server BES Network “clients” Post-confrontation Mobile Devices Application-based communications Company owned peripheral storage devices
Locating Email …outside the corporate network Individual controlled Personal e-mail accounts Home computers Third-party controlled Telecommunications providers Application providers Alex Cameron’s presentation covered access to these sources
Accessing Email On the corporate network Law has recognized a virtually unfettered right of employer access Basis – ownership of system plus notification Likely to see a greater balancing of interests Corporations should consider Routine monitoring based on special grounds Periodic audits with controls Investigations based on reasonable suspicion
Accessing Email Recent cases Quon – 2010, Supreme Court of the United States R. v. Cole – 2009, Ontario Superior Court of Justice France v. Tfaily – 2010, Ontario Court of Appeal City of Ottawa – 2010, Divisional Court
Accessing Email Employee communicates with counsel on employer systems A practical problem for employer counsel among others Key Canadian cases Daniel Potter – 2005, Nova Scotia Supreme Court Eisses v. CPL – 2009, Ontario Superior Court of Justice Counsel’s obligations are clear But the ultimate right of access is a matter of fact Is it better to attack basis for privilege than argue waiver?
Proving Email Email problem #1 – You didn’t send that Employee alleges termination on basis of pregnancy Email pre-dates her pregnancy by two months showing bona fide intent to terminate Employee says the e-mail is fabricated How would you prove the email?
Proving Email Email problem #2 – I didn’t send that Agreement to arbitrate executed through intranet Execution by entering employee ID number plus password then clicking through Supervisors can reset passwords Supervisor resets password to help employee get access Email confirmation sent to employee Employee claims supervisor executed agreement and denies reading confirmation email How would you prove the email?
Proving Email Cloud based communications are harder to authenticate Authenticate (go to ISP and not ASP) Figure out and prove the “system” whose reliability one would like to count on (or at least appreciate) No standardization – every application works differently Consumer oriented – so less rigorous than business systems Proprietary – so code etc. are not readily available Surrounded by TP apps – Tweetdeck, thousands of FB suppliers, who, where and what are they? Are cloud providers in the ordinary course of business, i.e. should they be considered reliable?
Resources www.stephenmason.eu John’s webpage (linked through Slaw) www.allaboutinformation.ca George L. Paul, Foundations of Digital Evidence Charles Morgan, E-Mail Law
The Special Case of Email John Gregory and Dan MichalukJanuary 24, 2011

Más contenido relacionado

La actualidad más candente (12)

Email
EmailEmail
Email
 
Unit 5
Unit 5Unit 5
Unit 5
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Vapor Stream Value
Vapor Stream ValueVapor Stream Value
Vapor Stream Value
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
Case study 6
Case study 6Case study 6
Case study 6
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Audio Discovery by Albert Kassis
 Audio  Discovery by Albert Kassis  Audio  Discovery by Albert Kassis
Audio Discovery by Albert Kassis
 
What is a spam ?
What is a spam ?What is a spam ?
What is a spam ?
 
E Mail
E MailE Mail
E Mail
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 

Similar a Electronic Evidence - The Special Case of Email

L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
enukahansana
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
Dan Michaluk
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt show
Informz
 
2006 10 12email101106
2006 10 12email1011062006 10 12email101106
2006 10 12email101106
ddiicdd
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
Act-On Software
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
Act-On Software
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
bartholomeocoombs
 

Similar a Electronic Evidence - The Special Case of Email (20)

L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
Email and Document Retention for Investment Advisers
Email and Document Retention for Investment AdvisersEmail and Document Retention for Investment Advisers
Email and Document Retention for Investment Advisers
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt show
 
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
Combatiendo Amenazas de Seguridad en la Nube - WatchGuardCombatiendo Amenazas de Seguridad en la Nube - WatchGuard
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
 
2006 10 12email101106
2006 10 12email1011062006 10 12email101106
2006 10 12email101106
 
Email As A Datasource
Email As A DatasourceEmail As A Datasource
Email As A Datasource
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
Authentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real WorldAuthentication & Reputation, Adding Business Value In The Real World
Authentication & Reputation, Adding Business Value In The Real World
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
 
Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web App
 
Business Class Email Solutions
Business Class Email SolutionsBusiness Class Email Solutions
Business Class Email Solutions
 
Business Class Email Solutions - Cotton Rohrscheib
Business Class Email Solutions - Cotton RohrscheibBusiness Class Email Solutions - Cotton Rohrscheib
Business Class Email Solutions - Cotton Rohrscheib
 

Más de Dan Michaluk

Más de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Último

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Último (20)

KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 

Electronic Evidence - The Special Case of Email

  • 1. The Special Case of Email John Gregory and Dan MichalukJanuary 24, 2011
  • 2. Outline Let’s deal with the following four challenges Managing email Locating email Accessing email Proving email
  • 3. But First… What’s an Email Nowadays? Stored, text-based communications today SMTP communications – “classic email” Computer generated faxes Webmail, Webmail via social networking application Multi User Domains Text messages VOIP communications
  • 4. Managing Email (The Litigator’s View) This is a problem for corporations Retention policies are key Email servers not ordinarily a business records repository Email can be on a “short list” for retention Pressure to move it off server, sometimes auto-delete Limit: likely be relevant to reasonably anticipated litigation This can be a discovery or trial issue Remmington (1998) – Common law duty to preserve? Broccoli v. Echostar (2005) – 21-day retention of e-mails
  • 5. Locating Email …on the corporate network in an investigation Pre-confrontation Email server Lotus Domino, MS Exchange, GroupWise Mobile messaging server BES Network “clients” Post-confrontation Mobile Devices Application-based communications Company owned peripheral storage devices
  • 6. Locating Email …outside the corporate network Individual controlled Personal e-mail accounts Home computers Third-party controlled Telecommunications providers Application providers Alex Cameron’s presentation covered access to these sources
  • 7. Accessing Email On the corporate network Law has recognized a virtually unfettered right of employer access Basis – ownership of system plus notification Likely to see a greater balancing of interests Corporations should consider Routine monitoring based on special grounds Periodic audits with controls Investigations based on reasonable suspicion
  • 8. Accessing Email Recent cases Quon – 2010, Supreme Court of the United States R. v. Cole – 2009, Ontario Superior Court of Justice France v. Tfaily – 2010, Ontario Court of Appeal City of Ottawa – 2010, Divisional Court
  • 9. Accessing Email Employee communicates with counsel on employer systems A practical problem for employer counsel among others Key Canadian cases Daniel Potter – 2005, Nova Scotia Supreme Court Eisses v. CPL – 2009, Ontario Superior Court of Justice Counsel’s obligations are clear But the ultimate right of access is a matter of fact Is it better to attack basis for privilege than argue waiver?
  • 10. Proving Email Email problem #1 – You didn’t send that Employee alleges termination on basis of pregnancy Email pre-dates her pregnancy by two months showing bona fide intent to terminate Employee says the e-mail is fabricated How would you prove the email?
  • 11. Proving Email Email problem #2 – I didn’t send that Agreement to arbitrate executed through intranet Execution by entering employee ID number plus password then clicking through Supervisors can reset passwords Supervisor resets password to help employee get access Email confirmation sent to employee Employee claims supervisor executed agreement and denies reading confirmation email How would you prove the email?
  • 12. Proving Email Cloud based communications are harder to authenticate Authenticate (go to ISP and not ASP) Figure out and prove the “system” whose reliability one would like to count on (or at least appreciate) No standardization – every application works differently Consumer oriented – so less rigorous than business systems Proprietary – so code etc. are not readily available Surrounded by TP apps – Tweetdeck, thousands of FB suppliers, who, where and what are they? Are cloud providers in the ordinary course of business, i.e. should they be considered reliable?
  • 13. Resources www.stephenmason.eu John’s webpage (linked through Slaw) www.allaboutinformation.ca George L. Paul, Foundations of Digital Evidence Charles Morgan, E-Mail Law
  • 14. The Special Case of Email John Gregory and Dan MichalukJanuary 24, 2011