E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing...
-
Upload
cengage-learning -
Category
Education
-
view
490 -
download
0
description
Transcript of E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing...
![Page 1: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/1.jpg)
E-Discovery: How do Litigation Hold, BYOD, and Privacy affect you?
By Amelia Phillips, PhDChair, Pure & Applied Science DivisionCIS and Computer Science DepartmentsRegional Director PRCCDCHighline Community CollegeSeattle WA
![Page 2: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/2.jpg)
Agenda
• Define E-Discovery• The challenge ahead• Who does this affect?• Privacy or corporate security• Current tools• New technology
![Page 3: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/3.jpg)
Defining E-Discovery
• “gathering electronically stored information (ESI) for use in litigation”
• Discovery happens daily and is the compulsary disclosure of data, facts and documents in civil and criminal cases.
• Legal council generally exists on both sides from the beginning
![Page 4: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/4.jpg)
Whose Perspective?
![Page 5: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/5.jpg)
Who needs to know about e-discovery?
Information Governance Reference Model
© edrm.net
![Page 6: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/6.jpg)
Potential Students / Target Audience
• IT / CIS Students• MIS Students• Paralegals• Business Managers• Production Managers
![Page 7: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/7.jpg)
Litigation Hold – what does that mean?
• If a litigation hold is in place– Backups cannot be over written or deleted– Physical files cannot be shredded– Files cannot be deleted– What happens to the BYODs?
• Corporate policies need to be in place– Educate the employees
![Page 8: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/8.jpg)
Tools of the Trade
![Page 9: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/9.jpg)
• Concordance• Discovery Assistant by IMAGEMaker• @LegalDiscovery• Catalyst CR• AD Summation iBlaze • Nextpoint Discovery Cloud • Sherpa Software Discovery Attender• And more
E-Discovery Tools
![Page 10: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/10.jpg)
Discovery Attender
![Page 11: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/11.jpg)
Finding email
![Page 12: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/12.jpg)
Choose Search Criteria
![Page 13: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/13.jpg)
Search Results
![Page 14: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/14.jpg)
Reverse Funnel Method
![Page 15: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/15.jpg)
De-Duping
![Page 16: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/16.jpg)
Email, Social media and Privacy
![Page 17: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/17.jpg)
• Clandestine affair• Sharing a login on Gmail but never
transmitting• Cyberstalking and threats
HICSS44
Why action was needed NOW
![Page 18: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/18.jpg)
• 2 Generals implicated• Over 30,000 documents most of which was email
examined• Exposed that Google had responded to over 7,000
requests from the US government from January to June 2012
Resulted in the following:
![Page 19: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/19.jpg)
• Requests from governments– 2009 - ~ 12,000– 2012 – over 21,000
• U.S. certainly highest• India• U.K.
Google Transparency Report
![Page 20: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/20.jpg)
What ever happened to the 4th Amendment?
![Page 21: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/21.jpg)
• Electronic Communications Privacy Act• Created in 1986• PCs were in their infancy– Hard drives were 10 to 20 MB– Easy drive at 60 MB was the largest in 1988– Files were 10 to 20 kb– Email was at a premium
ECPA
![Page 22: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/22.jpg)
• Accessing a computer or network without authorization or by exceeding authorization
• Accessing a computer or network to collect financial information, credit information, or other information from a government computer or any protected computer
• Making a computer or network unavailable for its intended use by a department of the U.S. government or another entity
ECPA lists as violations:
![Page 23: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/23.jpg)
• Transmitting programs, information, codes, or commands to intentionally cause harm or damage to networks or computers
• Accessing information on a computer or network to commit fraud or cause damage, whether intentionally or as a result of reckless actions
• Intentionally obtaining and trafficking in passwords• Threatening harm to a computer or network for use in
extortion or a similar practice
ECPA (more violations)
![Page 24: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/24.jpg)
• Stored Communications Act• Supplement ECPA• Offense.— Except as provided in subsection (c) of this section whoever
— • (1) intentionally accesses without authorization a facility through which
an electronic communication service is provided; or • (2) intentionally exceeds an authorization to access that facility;
and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.
SCA
![Page 25: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/25.jpg)
• Existing Law:
• 180 days old – considered abandoned
No warrant!
The Catch
![Page 26: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/26.jpg)
• Gmail• Yahoo mail• Dropbox• SkyDrive• Google docs• Google+
Online email and storage
![Page 27: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/27.jpg)
• Facebook• MySpace• Twitter• What laws apply here?
Social Media
![Page 28: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/28.jpg)
• ArchiveSocial – compliant with– FINRA – Financial Industry Regulatory Authority– SEC – Securities and Exchange Commission– FOIA – Freedom of Information Act– FRCP – Federal Rules of Civil Procedure– SOX – Sarbanes-Oxley
• Other software– Actiance– X1 Discovery– Patrina Corporation– Reed Archives
Social Media Archiving
![Page 29: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/29.jpg)
BYOD, BYOA – whose line is it anyway?
![Page 30: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/30.jpg)
• Interconnected far beyond imagined• Business owner – Cell phone – Business computer
• One device compromised– Have everything
Mobile Devices
![Page 31: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/31.jpg)
• Someone logs in at a coffee shop– Shows up on their Facebook– Shows up on their Twitter
• U.S. based companies spend over $2 billion annually for such demographics
• What are your rights?
Who knows where you are?
![Page 32: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/32.jpg)
• 24 yr old Austrian law student– Asked for his Facebook history– Over 1200 pages long!– Included items he
• Never posted• Had deleted
• “Europe has come to the conclusion that none of the companies can be trusted,” said Simon Davies, the director of the London-based nonprofit Privacy International. “The European Commission is responding to public demand. There is a growing mood of despondency about the privacy issue.” (Semgupta, 2012)
EU Privacy Laws
![Page 33: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/33.jpg)
• The term Bring Your Own Device (BYOD) has become common in the language today.
• Includes cell phones, smart phones, Blackberry devices, palmtops, laptops, iPhones, iPads and items that are still be invented.
• Are they part of a litigation hold? • Does the employee have the right to delete their
personal information?
BYOD
![Page 34: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/34.jpg)
• Issued by and paid for by the company• Purchased and paid for by the employee• Purchased and paid for by visitors• Purchased and paid for by patients• And where is the information stored?
BYOD (cont’d)
![Page 35: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/35.jpg)
• The voicemail is stored on the servers of the provider• Text messages are saved on the device• Voicemail can be stored on some smart phones• Email is stored with the email server whether it be
Yahoo, Gmail, or corporate server• File attachments could be located on the corporate
servers, on the cloud or home machine.
BYOD (part 3)
![Page 36: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/36.jpg)
• Computers as closed containers• U.S. v. Reyes in New York 1996 – Privacy of data on a pager
• United States v. Knotts and United States v. Karo– U.S. Supreme Court– Tracking devices– On public street or in private dwelling
Mobile devices and the Law
![Page 37: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/37.jpg)
• Ohio State Supreme Court– 2009– Warrant needed to search a cell phone
• Oregon State Supreme Court– Schlossberg v. Solesbee – 2012– Search incident to arrest
Case Law on cell phones
![Page 38: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/38.jpg)
HICSS44
Search incident to
Arrest
![Page 39: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/39.jpg)
• Online Communications and Geolocation Protection Act (OCGPA)
• Before the House in March 2013• GPS• Warrant for all electronic messages regardless of age• Just approved this week in the Senate Subcommittee
HICSS44
New Proposed Law
![Page 40: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/40.jpg)
HICSS44
IRS Facebook
![Page 41: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/41.jpg)
• Lady boasted on her Facebook about her and her partner’s tax fraud
• Pictures of how much money they had made• 57 counts of tax fraud
HICSS44
Tax Fraud Pioneer
![Page 42: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/42.jpg)
• Can a company require that you make them a friend before they hire you?
• Can a company force you to give them your username and password on Facebook or MySpace to get a rating?
• Can conversations on social media be used against you?
• Can such exchanges hold up in court?
HICSS44
Social Media and Investigations
![Page 43: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/43.jpg)
New Technology
![Page 44: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/44.jpg)
Forensic Linguistics
• International Association of Forensic Linguists• Look for variations in the way things are phrased,
cadence, etc.• Very effective in spotting fraudulent documents
![Page 45: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/45.jpg)
Dealing with Multinational Corporations
• Every country must deal with email, mobile business and devices, data, ecommerce, Black Berries, and PDAS
• Privacy laws vary from country to country. • Chain of custody• Qualifications of examiners• Process and procedure
HCSS44
![Page 46: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/46.jpg)
• Unique law enforcement concerns regarding the location of potential digital evidence, its preservation, and its subsequent forensic analysis.
• For instance, if a customer or business becomes the target of a criminal investigation, they could migrate their working environment to a cloud environment.
• This would provide a means for the business to continue its routine operations while the migrated environment is forensically analyzed.4
• However, this is not without risk. The migrated data only represents a “snapshot” of when it was sent to the cloud.
Case proposed by John Barbara
![Page 47: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/47.jpg)
• Since the data can be stored anywhere in the world, its dispersal could be to a location or country where privacy laws are not readily enforced or non-existent.
• Establishing a chain of custody for the data would become difficult or impossible if its integrity and authenticity cannot be fully determined (where was it stored, who had access to view it, was there data leakage, commingling of data, etc.).
JJ Barbara (slide 2)
![Page 48: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/48.jpg)
• There are also potential forensic issues when the customer or user exits a cloud application.
• Items subject to forensic analysis, such as registry entries, temporary files, and other artifacts (which are stored in the virtual environment) are lost - making malicious activity difficult to substantiate:
JJ Barbara (slide 3)
![Page 49: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/49.jpg)
• Over time, it's expected that clouds will contain more and more evidence of criminal activity.
• The NIJ, recently revealed plans to fund research into improved electronic forensics in several areas, including the cloud.
• Cloud providers and customers need to set up their infrastructures to meet these lawful requests or face fines and other legal repercussions. – do so without violating local privacy laws or accidentally giving away
competitive secrets.
George Lawton’s Opinion
![Page 50: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/50.jpg)
• The demands of cloud forensics could prove costly as lawsuits and investigations become more complex.
• A 2009 study by McKinsey & Company – electronic discovery requests were growing by 50% annually. – Growth in e-discovery spending from $2.7 billion in 2007 to
$4.6 billion in 2010, according to a Socha Consulting LLC survey.
Lawton (slide 2)
![Page 51: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/51.jpg)
• The U.S. government has also attempted to expand the scope of data that can be lawfully requested without a warrant through a National Security Letter (NSL).
• In August, the Obama administration requested to add "electronic communication transaction records" to the data included in an NSL, – Require providers to include the addresses a user has emailed, the times
and dates of transactions, and possibly a user's browser history. – Have to ensure that the provider's infrastructure can deliver on these
requests in a timely manner.
Lawton (slide 3)
![Page 52: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/52.jpg)
• "Cloud forensics is difficult because there are challenges with multi-tenant hosting, synchronization problems and techniques for segregating the data in the logs,"
• "Right now, most of the cloud service providers are not open to talking about this because they don't know the issue ."
Lawton (slide 4)
![Page 53: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/53.jpg)
Privacy Laws• USA citizens take the expectation of privacy for granted• Privilege “according to UK common law … allows a person
to refuse to testify on a matter or to withhold information” – Includes self incrimination– Legal counsel privilege– Statements made without prejudice
• China and Japan (and other non-English speaking nations) have laws that are significantly different
HICSS44
![Page 54: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/54.jpg)
Objectives of any Investigation
• That evidence obtained can hold up in court• That the examiner can hold up under scrutiny
HICSS44
![Page 55: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/55.jpg)
The Expert• What qualifies a person as a digital forensic expert?• The qualifications of the person examining the evidence
should be easily identifiable in all parts of the world• On the international front, many use vendor certifications. • In the US, several states - against the resolution of the
American Bar Association (ABA) - instituted requirements that all computer forensics investigators be licensed private investigators.
HICSS44
![Page 56: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/56.jpg)
The Expert (cont’d)• “Is it a state or federal matter to qualify digital investigators?” • The global economy and international crime require an
international standard that is beyond the boundaries of vendor certification
• The ISFCE has created certifications which are accepted in many countries.
• SANS has created a body of knowledge that constitutes what is needed for a person qualified in the field.
HICSS44
![Page 57: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/57.jpg)
• ISO 27037:2012• October 2012• Digital Evidence First Responder (DEFR) as the one
who collects the evidence, chain of custody, and storage of digital evidence
• Gives guidelines for transmission of ESI
New ISO standard
![Page 58: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/58.jpg)
Technology and E-evidence
• Email investigations– Whose server are things located on? – How was it transmitted? – When is a wiretap law needed? – When are you dealing with stored messages? – How to put laws in place that addresses these issues is
another challenge.
HICSS44
![Page 59: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/59.jpg)
• Cloud-based electronic discovery tools might help to keep these costs down.
• Companies including Orange, Autonomy, Clearwell and Kazeon have launched hosted services for collecting, preserving and analyzing digital evidence.
• Gartner research director Debra Logan said she expects that many corporations will start investing in e-discovery infrastructure and that, by 2012, companies without this infrastructure will spend 33% more to meet these requests.
Technology and E-Evidence
![Page 60: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/60.jpg)
What laws affect what you do?
![Page 61: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/61.jpg)
DEMO of Law database
![Page 62: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/62.jpg)
![Page 63: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/63.jpg)
• E-discovery is here to stay• New challenges• Affects legal, business, and IT students /
professionals alike• Needs to become part of the curriculum• Global issue
Summary
![Page 64: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/64.jpg)
Questions?
![Page 65: E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference](https://reader038.fdocuments.net/reader038/viewer/2022103016/55559853d8b42a8e1f8b4eb8/html5/thumbnails/65.jpg)