SlideShare une entreprise Scribd logo
1  sur  25
Access to e-mails, text messages and
other ESI – policy issues for
organizations

Dan Michaluk
April 16, 2003
Outline

•   Control over and access to information -
    ideal, reality and solution
•   Policy issues for organizations
     •   Employee privacy
     •   Bring your own device (BYOD)
     •   Social media
     •   Cloud computing



Access to e-mails, text messages and other ESI
Ideal – physical separation by purpose

             Mine                         Yours




Access to e-mails, text messages and other ESI
Reality – intermingling and unclear purpose

•   Personal use of work systems puts personal
    information side-by-side work information
•   BYOD puts work information on personal devices
•   Corporate use of social media may put business
    information on multiple accounts in multiple forms
•   Cloud computing puts your work system on a
    computer with others’ work systems



Access to e-mails, text messages and other ESI
Solution – Use policy to achieve the ideal

•   Revert to a no personal use rule
•   Enforce a business tools for business rule
•   Restrict social media communications and archive
    everything
•   Own all computers running business applications




Access to e-mails, text messages and other ESI
Solution – Use law/policy to gain control

•   Your personal use does not preclude our access
•   We have the following rights over your device
•   (Simply may not be possible for information
    generated through social media applications)
•   Our service provider contracts must meet
    requirements that ensure we control our business
    information



Access to e-mails, text messages and other ESI
Policy issue #1 – Employee privacy
•   You’re on for an employer in a harassment case. The
    applicant has claimed $100,000, but you assess the
    employer’s worst case exposure at about $25,000 to
    $30,000. The applicant has pleaded that senior
    management, including the CEO, was complicit in the
    harassment. You ask your client contact to advise the CEO
    that you’ll need a copy of the CEO’s e-mail container file to
    do a proper review. “Huh, she says?” “Um, what if I write
    you a letter?” you respond.




Access to e-mails, text messages and other ESI
Policy issue #1 – Employee privacy

•   Q: I’m not Charter bound, does Cole matter?
•   A: Yes
     •   REP engages Charter search protection
     •   Also a prerequisite to arbitral protection
     •   Also a prerequisite to tort production




Access to e-mails, text messages and other ESI
Policy issue #1 – Employee privacy

•   Q: Is the REP finding distinguishable?
•   A: Not really
     •   No indication a better policy framework would have
         made a difference
     •   No mention of pictures of Cole’s wife or any unique
         personal information
     •   An REP likely won’t prevail over an effective
         prohibition on personal use – “reasonably expected”


Access to e-mails, text messages and other ESI
Policy issue #1 – Employee privacy

•   Policy implications of Cole
     •   The Court says…
          •   …the expectation is low
          •   … it’s based on one factor alone – personal use
          •   … employee choice weighs against the expectation***
     •   This invites transparency as the prevailing policy
     •   Management should be able to reserve rights by putting
         employees on notice
     •   The alternative is to recognize a right to employer-paid
         confidential computing services (not plausible)



Access to e-mails, text messages and other ESI
Policy issue #1 – Employee privacy

•   Policy implications of Cole
     •   The Court says…
          •   …the expectation is low
          •   … it’s based on one factor alone – personal use
          •   … employee choice weighs against the expectation***
     •   This invites transparency as the prevailing policy
     •   Management should be able to reserve rights by putting
         employees on notice
     •   The alternative is to recognize a right to employer-paid
         confidential computing services (not plausible)



Access to e-mails, text messages and other ESI
Policy issue #1 – Employee privacy

•   Practically, what tactics can we use to overcome
    this barrier to access?




Access to e-mails, text messages and other ESI
Policy issue #2 – BYOD

•   Pharma One has numerous sources of potentially
    relevant electronic information due to the
    corporate policy of allowing employees to utilize
    their own smartphones and other PDA devices for
    work. There is no formal “Bring Your Own Device”
    policy in place.




Access to e-mails, text messages and other ESI
Policy issue #2 – BYOD

•   BYOD done right means
     •   Achieving control through technology
     •   Achieving control through policy
     •   Via these means of control
          •   Knowing what work information resides on the device
          •   Knowing what work information resides only on the
              device
          •   Knowing how this information resides on the device
              (to address security and access)


Access to e-mails, text messages and other ESI
Policy issue #2 – BYOD

•   Thoughts on policy
     •   Highlighting the mutual exchange of benefits may
         help enforceability
     •   Deal with security and access
     •   Create access scenarios to develop language
     •   Be very transparent about needs that will likely lead
         to conflict



Access to e-mails, text messages and other ESI
Policy issue #3 – Social media

•   This should not be an e-discovery (access and
    control) problem for business
•   Good social media governance is about
    separating business use from personal use
•   Good social media governance is about
    controlling business social media accounts




Access to e-mails, text messages and other ESI
Policy issue #3 – Social media

•   Good social media governance is about
    separating business use from personal use
     •   You don’t speak for us unless we give you
         permission
     •   If you’re not a communication pro, you’ll need to
         apply for a license based on a project description
     •   Oh yes, include a disclaimer if there’s any risk
         someone will think you’re speaking for us


Access to e-mails, text messages and other ESI
Policy issue #3 – Social media

•   Typically, if you control the password you control
    the information. But…
     •   Security vulnerability because many social media
         applications don’t allow for administrator privileges
     •   Retention rules may change
     •   Special means of extraction may change
     •   Presentation of information may change



Access to e-mails, text messages and other ESI
Policy issue #3 – Social media

•   Where we likely stand on plaintiffs claiming injury
     •   Photos of physical activity will often be producible
     •   Production of photos of joy and happiness may often
         be resisted successfully
     •   Counsel should focus on what data objects in a
         social profile are producible, not the profile itself
     •   Comments associated with relevant photos and
         videos should arguably be produced


Access to e-mails, text messages and other ESI
Policy issue #4 – The cloud

•   A threat to timely access to reliable information
     •   Providers default to low cost and not service
     •   Investigations and e-discovery are afterthoughts
     •   Specialized forensic data capture services are rare
     •   Logs and other forensic data can be intermingled
     •   Proprietary software can make interpretation hard
     •   Access restrictions create a chain of custody issue
     •   Laws of other jurisdictions may be restrictive

Access to e-mails, text messages and other ESI
Policy issue #4 – The cloud

•   The solution is simple (in theory)
     •   Outsourcing process: requirements
         definition, vendor selection, contracting and due
         diligence
     •   Legal and security should insert themselves into
         every step of the process
     •   Legal and security should be prepared to
         compromise because the cloud is the cloud and
         physical control is supreme

Access to e-mails, text messages and other ESI
Policy issue #4 – The cloud

•   The solution is simple (in theory)
     •   Understand the system and the data it generates
     •   Create investigation/e-discovery scenarios
     •   Develop requirements
     •   Prioritize requirements
     •   Discuss requirements
     •   Ensure requirements can be met



Access to e-mails, text messages and other ESI
Policy issue #4 – The cloud

•   Key questions
     •   In what jurisdiction(s) will the data reside?
     •   How is the data stored at application and system
         levels?
     •   Can our data be extracted independently from
         others’ data? What does extraction mean?
     •   What forensic data do we want? Will you make it
         available to us? How?


Access to e-mails, text messages and other ESI
Policy issue #4 – The cloud

•   Key questions (con’t)
     •   Will your employees give evidence to establish chain
         of custody?
     •   How fast can you make all this happen?
     •   How much will all this cost?




Access to e-mails, text messages and other ESI
Access to e-mails, text messages and
other ESI – policy issues for
organizations

Dan Michaluk
April 16, 2003

Contenu connexe

Tendances

Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEnercare Inc.
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and techwtidwell
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technologyEzzy Izzuddin
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringDan Michaluk
 
The ins and outs of the e-FOI process
The ins and outs of the e-FOI processThe ins and outs of the e-FOI process
The ins and outs of the e-FOI processDan Michaluk
 
Privacy tort and your workplace
Privacy tort and your workplacePrivacy tort and your workplace
Privacy tort and your workplaceDan Michaluk
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2Damo Ward
 
Privacy in the usa Workplace
Privacy in the usa Workplace Privacy in the usa Workplace
Privacy in the usa Workplace David F Amakobe
 
ethical issues,social issues
 ethical issues,social issues ethical issues,social issues
ethical issues,social issuesbhavesh lande
 
Ethics and software engineering
Ethics and software engineeringEthics and software engineering
Ethics and software engineeringSolomon Nsumba
 

Tendances (20)

Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the Law
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technology
 
Ethic02
Ethic02Ethic02
Ethic02
 
presentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoringpresentation to lawyers and practicioners on e-mail monitoring
presentation to lawyers and practicioners on e-mail monitoring
 
The ins and outs of the e-FOI process
The ins and outs of the e-FOI processThe ins and outs of the e-FOI process
The ins and outs of the e-FOI process
 
Privacy tort and your workplace
Privacy tort and your workplacePrivacy tort and your workplace
Privacy tort and your workplace
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2
 
Privacy in the usa Workplace
Privacy in the usa Workplace Privacy in the usa Workplace
Privacy in the usa Workplace
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
ethical issues,social issues
 ethical issues,social issues ethical issues,social issues
ethical issues,social issues
 
Ethics and software engineering
Ethics and software engineeringEthics and software engineering
Ethics and software engineering
 

En vedette

Responding to Data Breaches
Responding to Data BreachesResponding to Data Breaches
Responding to Data BreachesDan Michaluk
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breachDan Michaluk
 
Ci admin law addressing the privacy interests of affected individuals nov 2...
Ci admin law   addressing the privacy interests of affected individuals nov 2...Ci admin law   addressing the privacy interests of affected individuals nov 2...
Ci admin law addressing the privacy interests of affected individuals nov 2...Dan Michaluk
 
Developing your social media policies amcto presentation
Developing your social media policies amcto presentationDeveloping your social media policies amcto presentation
Developing your social media policies amcto presentationDan Michaluk
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment LawDan Michaluk
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Dan Michaluk
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityDan Michaluk
 
Ee defamation prejudice
Ee defamation prejudiceEe defamation prejudice
Ee defamation prejudiceDan Michaluk
 
Draft alberta lc slides
Draft alberta lc slidesDraft alberta lc slides
Draft alberta lc slidesDan Michaluk
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesDan Michaluk
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014Dan Michaluk
 
E-mail as Evdience
E-mail as EvdienceE-mail as Evdience
E-mail as EvdienceDan Michaluk
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Dan Michaluk
 
CACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law ReviewCACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law ReviewDan Michaluk
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013Dan Michaluk
 

En vedette (18)

Responding to Data Breaches
Responding to Data BreachesResponding to Data Breaches
Responding to Data Breaches
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
 
Ci admin law addressing the privacy interests of affected individuals nov 2...
Ci admin law   addressing the privacy interests of affected individuals nov 2...Ci admin law   addressing the privacy interests of affected individuals nov 2...
Ci admin law addressing the privacy interests of affected individuals nov 2...
 
Developing your social media policies amcto presentation
Developing your social media policies amcto presentationDeveloping your social media policies amcto presentation
Developing your social media policies amcto presentation
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment Law
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
 
Ee defamation prejudice
Ee defamation prejudiceEe defamation prejudice
Ee defamation prejudice
 
Draft alberta lc slides
Draft alberta lc slidesDraft alberta lc slides
Draft alberta lc slides
 
Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
E-mail as Evdience
E-mail as EvdienceE-mail as Evdience
E-mail as Evdience
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
CACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law ReviewCACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law Review
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 

Similaire à Osgoode pdp e discovery certificate slides

3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxCallplanetsDeveloper
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxTimBee1
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxTimBee1
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptRogerPrimo2
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxgemaherd
 

Similaire à Osgoode pdp e discovery certificate slides (20)

3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptx
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Information privacy
Information privacyInformation privacy
Information privacy
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 

Plus de Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 

Plus de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Dernier

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 

Dernier (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 

Osgoode pdp e discovery certificate slides

  • 1. Access to e-mails, text messages and other ESI – policy issues for organizations Dan Michaluk April 16, 2003
  • 2. Outline • Control over and access to information - ideal, reality and solution • Policy issues for organizations • Employee privacy • Bring your own device (BYOD) • Social media • Cloud computing Access to e-mails, text messages and other ESI
  • 3. Ideal – physical separation by purpose Mine Yours Access to e-mails, text messages and other ESI
  • 4. Reality – intermingling and unclear purpose • Personal use of work systems puts personal information side-by-side work information • BYOD puts work information on personal devices • Corporate use of social media may put business information on multiple accounts in multiple forms • Cloud computing puts your work system on a computer with others’ work systems Access to e-mails, text messages and other ESI
  • 5. Solution – Use policy to achieve the ideal • Revert to a no personal use rule • Enforce a business tools for business rule • Restrict social media communications and archive everything • Own all computers running business applications Access to e-mails, text messages and other ESI
  • 6. Solution – Use law/policy to gain control • Your personal use does not preclude our access • We have the following rights over your device • (Simply may not be possible for information generated through social media applications) • Our service provider contracts must meet requirements that ensure we control our business information Access to e-mails, text messages and other ESI
  • 7. Policy issue #1 – Employee privacy • You’re on for an employer in a harassment case. The applicant has claimed $100,000, but you assess the employer’s worst case exposure at about $25,000 to $30,000. The applicant has pleaded that senior management, including the CEO, was complicit in the harassment. You ask your client contact to advise the CEO that you’ll need a copy of the CEO’s e-mail container file to do a proper review. “Huh, she says?” “Um, what if I write you a letter?” you respond. Access to e-mails, text messages and other ESI
  • 8. Policy issue #1 – Employee privacy • Q: I’m not Charter bound, does Cole matter? • A: Yes • REP engages Charter search protection • Also a prerequisite to arbitral protection • Also a prerequisite to tort production Access to e-mails, text messages and other ESI
  • 9. Policy issue #1 – Employee privacy • Q: Is the REP finding distinguishable? • A: Not really • No indication a better policy framework would have made a difference • No mention of pictures of Cole’s wife or any unique personal information • An REP likely won’t prevail over an effective prohibition on personal use – “reasonably expected” Access to e-mails, text messages and other ESI
  • 10. Policy issue #1 – Employee privacy • Policy implications of Cole • The Court says… • …the expectation is low • … it’s based on one factor alone – personal use • … employee choice weighs against the expectation*** • This invites transparency as the prevailing policy • Management should be able to reserve rights by putting employees on notice • The alternative is to recognize a right to employer-paid confidential computing services (not plausible) Access to e-mails, text messages and other ESI
  • 11. Policy issue #1 – Employee privacy • Policy implications of Cole • The Court says… • …the expectation is low • … it’s based on one factor alone – personal use • … employee choice weighs against the expectation*** • This invites transparency as the prevailing policy • Management should be able to reserve rights by putting employees on notice • The alternative is to recognize a right to employer-paid confidential computing services (not plausible) Access to e-mails, text messages and other ESI
  • 12. Policy issue #1 – Employee privacy • Practically, what tactics can we use to overcome this barrier to access? Access to e-mails, text messages and other ESI
  • 13. Policy issue #2 – BYOD • Pharma One has numerous sources of potentially relevant electronic information due to the corporate policy of allowing employees to utilize their own smartphones and other PDA devices for work. There is no formal “Bring Your Own Device” policy in place. Access to e-mails, text messages and other ESI
  • 14. Policy issue #2 – BYOD • BYOD done right means • Achieving control through technology • Achieving control through policy • Via these means of control • Knowing what work information resides on the device • Knowing what work information resides only on the device • Knowing how this information resides on the device (to address security and access) Access to e-mails, text messages and other ESI
  • 15. Policy issue #2 – BYOD • Thoughts on policy • Highlighting the mutual exchange of benefits may help enforceability • Deal with security and access • Create access scenarios to develop language • Be very transparent about needs that will likely lead to conflict Access to e-mails, text messages and other ESI
  • 16. Policy issue #3 – Social media • This should not be an e-discovery (access and control) problem for business • Good social media governance is about separating business use from personal use • Good social media governance is about controlling business social media accounts Access to e-mails, text messages and other ESI
  • 17. Policy issue #3 – Social media • Good social media governance is about separating business use from personal use • You don’t speak for us unless we give you permission • If you’re not a communication pro, you’ll need to apply for a license based on a project description • Oh yes, include a disclaimer if there’s any risk someone will think you’re speaking for us Access to e-mails, text messages and other ESI
  • 18. Policy issue #3 – Social media • Typically, if you control the password you control the information. But… • Security vulnerability because many social media applications don’t allow for administrator privileges • Retention rules may change • Special means of extraction may change • Presentation of information may change Access to e-mails, text messages and other ESI
  • 19. Policy issue #3 – Social media • Where we likely stand on plaintiffs claiming injury • Photos of physical activity will often be producible • Production of photos of joy and happiness may often be resisted successfully • Counsel should focus on what data objects in a social profile are producible, not the profile itself • Comments associated with relevant photos and videos should arguably be produced Access to e-mails, text messages and other ESI
  • 20. Policy issue #4 – The cloud • A threat to timely access to reliable information • Providers default to low cost and not service • Investigations and e-discovery are afterthoughts • Specialized forensic data capture services are rare • Logs and other forensic data can be intermingled • Proprietary software can make interpretation hard • Access restrictions create a chain of custody issue • Laws of other jurisdictions may be restrictive Access to e-mails, text messages and other ESI
  • 21. Policy issue #4 – The cloud • The solution is simple (in theory) • Outsourcing process: requirements definition, vendor selection, contracting and due diligence • Legal and security should insert themselves into every step of the process • Legal and security should be prepared to compromise because the cloud is the cloud and physical control is supreme Access to e-mails, text messages and other ESI
  • 22. Policy issue #4 – The cloud • The solution is simple (in theory) • Understand the system and the data it generates • Create investigation/e-discovery scenarios • Develop requirements • Prioritize requirements • Discuss requirements • Ensure requirements can be met Access to e-mails, text messages and other ESI
  • 23. Policy issue #4 – The cloud • Key questions • In what jurisdiction(s) will the data reside? • How is the data stored at application and system levels? • Can our data be extracted independently from others’ data? What does extraction mean? • What forensic data do we want? Will you make it available to us? How? Access to e-mails, text messages and other ESI
  • 24. Policy issue #4 – The cloud • Key questions (con’t) • Will your employees give evidence to establish chain of custody? • How fast can you make all this happen? • How much will all this cost? Access to e-mails, text messages and other ESI
  • 25. Access to e-mails, text messages and other ESI – policy issues for organizations Dan Michaluk April 16, 2003