Friday, August 29, 2008
Managing E-Discovery Consultants and Vendors Wisely
Close attorney supervision, good communication and strategic foresight remain necessary, however, to a successful relationship among the litigant, counsel and the e-vendor. Litigants and counsel must also certify the results of a vendor's work, and responsibilities under the procedural rules cannot simply be delegated away.
Vendors serve important functions: identifying available electronically stored information; translating information to a form that may be read or understood without actually changing the data; transferring information to an appropriate medium for production during the litigation process; and assisting with forensic analysis if necessary.
"Electronically stored information" under Fed. R. Civ. P. 26 and 34, and similar state rules, is broadly defined.
E-discovery vendors are able to provide expertise in identifying information, using sophisticated software to winnow duplicative or irrelevant information, to access it, and to translate it to a communicable form without changing delicate metadata or other information.
A vendor is able to canvass key employees in a streamlined manner and can efficiently identify relevant data-mines and the information needed for preservation.
Thursday, August 28, 2008
KAZEON UPGRADES eDISCOVERY
The company says that version 3.1 of Information Server IS1200-ECS introduces a new in-place legal hold, KazHold, and a new agent-less product for in-place analysis of and collection from laptops/desktops.
It says that these new products and functionality are key enhancements which will help organisations streamline collection, analysis and processing for proactive and reactive eDiscovery processes, ensuring that all relevant and necessary information for any litigation related activity is discovered, and that no data is spoiled
Wednesday, August 27, 2008
Do Computer Snoops Need PI Licenses?
But in a few states – Michigan, Texas, Florida, New York, Massachusetts, Oregon and Arizona -- the RIAA's investigators have come under attack by state governments or RIAA defendants. Reason: they are not licensed private investigators in their respective states. Michigan recently told (.pdf) MediaSentry it needed a license to continue practicing.
But demanding a private investigator's license doesn't make such sense for computer forensic work, according to the American Bar Association. In a recent report, the country's largest legal lobbying group urges the states to jettison the idea of, or licensing requirement for computer forensic specialists, especially since most state licensing boards don't demand education in such work
Tuesday, August 26, 2008
E-Discovery: Managing the Unmanageable
And so it begins. It will not be a good day. This message may be the call to arms in an electronic discovery battle that may materially affect your IT plans, projects, personnel and budget.
The critical qualifier is "may." The legal press is chock-full of articles, written by lawyers for lawyers, about how to manage e-discovery. Missing has been straightforward guidance for CIOs about their e-discovery management role. I hope to fill this gap by providing concrete and common-sense steps that you and your IT team can take to effectively manage the size and cost of e-discovery. The first step in this process is to understand some of the e-discovery rules of engagement.
Monday, August 25, 2008
Recent Cases Teach Valuable Lessons in E-Discovery
Cases involving million-dollar meltdowns, however, should remain the rare exception. Trial attorneys are becoming more adept at conducting e-discovery and can learn helpful lessons from recent cases. Recent e-discovery cases teach three important lessons: (1) properly plan for e-discovery; (2) cooperate with opposing counsel; and (3) correct any mistakes early in the case.
Friday, August 22, 2008
White House Lacks Comprehensive E-Mail Archive
President Bush's White House early on scrapped a custom archiving system that the Clinton administration had adopted under a federal court order. From 2001 to 2003, the Bush White House also recorded over computer backup tapes that provided a last line of defense for preserving e-mails, even though a similar practice landed the Clinton administration in legal trouble.
As a result, several years' worth of electronic communication may have been lost, potentially including e-mails documenting administration actions in the run-up to the Iraq war.
White House officials said last week that they have "no reason to believe" that any e-mails were deliberately destroyed or are missing. But over the past year, they have acknowledged problems with archiving, saving and finding e-mails dating from early in the administration until at least 2005.
Wednesday, August 20, 2008
Women in E-Discovery Announce First Career and Technology Expo
The Career and Technology Expo will feature 29 vendor booths and a demonstration room where a number of products and solutions by vendors, such as Catalyst, Clearwell, Stratify, IPRO and others, will be presented for 30 minutes each. In addition, there will be a resume preparation room and an interview room where recruiters and consulting companies will impart interview and resume tips on a one-on-one basis.
“We are very excited to be bringing both men and women in the legal industry together to educate, support and network with one another,” stated Parvaneh Daneshman, Co-chair of the event and Senior Project Manager at ONSITE3. “The e-discovery industry is growing so rapidly and is changing very quickly. It is great to get a group of leaders and innovators together to discuss hot topics and issues facing them and the rest of the market every day. We expect this to be a great forum for sharing ideas and expertise.”
Black Hat 2008 Aftermath
The most popular presentation at Black Hat 2008 was on the Internetwide DNS vulnerability discovered by Dan Kaminsky, director of penetration testing for IOActive. Over 2,000 attendees packed into an 800-person capacity room to hear Mr. Kaminsky tell the intriguing story of how he had been working on a nonsecurity related, Web-caching project for a friend at Wikipedia.
DNS cache poisoning is a technique that allows a hacker to introduce forged DNS information into other DNS servers. The result of a DNS cache poisoning attack allows the hacker to take control of portions of the Internet or redirect all users of a search engine to malicious content.
Everyone knows that e-mail spam is a huge problem that all of us are subjected to on almost a daily basis. What you may not know is how e-mail spam is directly linked to phishing and botnets. Phishing e-mails attempt to steal personally identifiable information from unsuspecting computers by getting them to open a "Trojaned" attachment or follow a link to a malicious Web site. Botnets are a collection of hacked computers remotely controlled by individuals for nefarious purposes.
Typically the hacker or "bot herder" will use the computer under their control for denial-of-service attacks often associated with extortion or massive spamming as part of a phishing effort. There were a number of different presentations addressing how phishing and botnets, in conjunction with e-mail spam, are used by hackers.
Black Hat also covered the latest trends and security implications of server virtualization and introduced visual forensic analysis in a session entitled: "Visual Computer Forensic Analysis," by Greg Conti and Erik Dean. In upcoming articles we will look more at this cutting-edge technique and the tools being developed around, it as well as delve into the dangers of social networking sites, phishing and botnet schemes, and SSL VPN security.
Thursday, August 14, 2008
Poll: Execs Believe E-Data Becoming Unmanageable
"Discovery is a very serious issue to business today," Bruce Hartley, a director in the Analytic and Forensic Technology practice of Deloitte FAS, said. "There are real stakes and real penalties associated with poorly handled discovery. In the past few years, we have seen cases where defendants have faced jail time and millions of dollars in sanctions or penalties."
"Strategic steps should be taken so that electronic discovery can be handled correctly," he said.
Deloitte recommends that companies create an e-discovery program and communicate it to all departments. That would include records management policies and document retention schedules. The firm also recommends that companies map their data systems and data sources.
Reduce litigation risk, cut costs with proactive eDiscovery
What’s driving those costs? Part of it is an increase in the number of lawsuits. Part of it are the new regulations that enterprises have to comply with in the wake of Enron, WorldCom, and Tyco. But probably the most important factor driving the increase in legal discovery costs is the rapid growth of electronic data that is generated and stored by companies as part of their ongoing business operations. While technology has made our lives at work easier and more productive, it has also contributed to the proliferation of electronically stored information (ESI). To make things more complicated, as much as 90% of all that information is unstructured and unmanaged. Most companies do not have well defined information management policies in place to manage the explosive growth of this data. This is a recipe that can lead to huge litigation costs later for companies when they have to reactively dig through mountains of information to provide timely responses for eDiscovery requests.
Monday, August 4, 2008
E-Discovery Faces a Language Barrier
John Tredennick is a lawyer and technologist, but lately he's been worrying about some odd things. Like the fact that Japanese is written with a combination of three different types of scripts, or that many languages run their words together without breaks between them. Trivia like this is usually of interest to linguists, but it has become a serious issue and nuisance for lawyers like Tredennick. That's because litigation is increasingly taking on international components, and legal technologists are struggling to incorporate foreign language documents into litigation.
Legal technology experts say that discovery in languages other than English have only recently begun to flood the system. "It's a trend that's simply exploded. Two years ago, if you'd asked me about foreign language electronic evidence, I would've said, 'yep, it's coming,'" says Tredennick, CEO of Catalyst Repository Systems, an e-discovery vendor. "But since then it's swelled to a flood. Back then I would've said the volume of such evidence was about zero terabytes. Now we see tens of terabytes of documents in languages other than English."