Forensic Update

Reflections on information management within the legal and regulatory arena

Posts Tagged ‘cloud’

General Counsel Toolworks Forum: Data Governance & eDiscovery

Posted by Johnny Lee on December 1, 2011

Sponsored by Grant Thornton LLP’s Forensic & Litigation professionals, the Forum offers educational events and resources for today’s in-house counsel and corporate senior management. We collaborate with trial and transaction lawyers from some the nation’s leading law firms to bring you periodic complimentary webcasts addressing important financial, operational and legal issues that can impact your organization.

Each event will be supported by a customized Toolbox — documents and other resources offering guidance on the topics covered by the webcast.  The next Toolworks Forum will focus upon the state of the e-discovery marketplace; the importance of intelligent, proactive information and litigation management; and practical steps companies can take to reduce expenses and risks associated with civil litigation and government investigations.

This webinar event will be held on Thursday, January 19, 2012, and it will begin at 1:00pm Eastern time and continue for 90 minutes.  CLE credit has been applied for, and full details can be found here.  Johnny Lee, Director in Grant Thornton’s Forensic & Litigation practice, and Dante Stella, eDiscovery practice leader at Dykema Gossett, will present.

Advertisements

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Information Security, Investigations, Litigation Hold, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | 1 Comment »

Divorce Law ruling with potentially far-reaching eDiscovery implications…

Posted by Johnny Lee on November 10, 2011

Facebook-Divorce-Status-Update

A fascinating case from Connecticut may shake up the eDiscovery world.  About a month ago, Judge Kenneth Schluger ordered that soon-to-be-divorced couple Stephen and Courtney Gallion exchange the login information for their Facebook and dating websites.

Like many recent examples from the case law, the reasoning adopted by the court was that the content found within these accounts speaks directly to a matter before the bar.  Namely, Stephen Gallion is alleging that such content raises questions of parental fitness, something that speaks directly to the issue of custody in this divorce case, according to his divorce attorney Gary Traystman.

The reason this was elevated to the judge is that a prior agreement between the parties to share these account credentials broke down after evidence arose (according to Traystman) that Courtney Gallion had texted a friend, requesting that the recipient log into her accounts, delete some messages, and change some passwords.  The judge issued an injunction against such misbehavior, and he then ordered the parties’ attorneys to exchange passwords for such accounts held by both spouses as a furtherance to the discovery process.

Interestingly, this judicial order violates Facebook’s terms of service.  This raises questions of conflicting guidance, among others, though the parties are undoubtedly going to err on the side of listening to a judge.  As traditional notions of privacy continue to morph within the legal landscape, we will undoubtedly see more of these cases…so be careful what you put into your digital archiveno matter how private you believe it to be, it is both permanent and potentially discoverable.

Posted in Computer Forensics, eDiscovery, Fraud, Information Security, Investigations, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »

“Controlling your Data Avalanche” Webinar…

Posted by Johnny Lee on October 27, 2011

 

I am pleased to announce that I will join luminaries from Vedder Price, a prominent U.S. law firm, in a discussion on “Managing your Data Avalanche” on November 16, 2011.  This webinar will delve into strategies for satisfying an organization’s legal obligations associated with Records Retention, eDiscovery, Litigation Holds, and Data Privacy.

“All too often, companies approach their data management obligations reactively and in a piecemeal fashion. This need not be the case; in fact, companies can satisfy their legal obligations with greater certainty — and more economically — through comprehensive data management strategies.”

This Webinar will be of interest to General Counsel, Chief Compliance and Information Officers, and those with a key role in managing eDiscovery or litigation within an organization.  This Webinar will provide an overview of legal trends in data management, with a specific focus on social media, cloud computing, eDiscovery, litigation holds, and data breach preparedness and response.  We will discuss ways in which companies can better manage their data through proactive data-management strategies.

To register for this webinar, please click here.  (Login information and presentation materials will be sent to registrants prior to the webinar.)

Click to learn more about Grant Thornton’s Forensics, Investigations and Litigation practice.   Click to learn more about Vedder Price’s Records Management, eDiscovery and Data Privacy practice.

Posted in Announcement, Computer Forensics, Data Governance, ECM, eDiscovery, Forensic Accounting, Information Security, Investigations, Litigation Hold, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Excellent Session with the IT GRC experts at annual ISACA Conference…

Posted by Johnny Lee on October 26, 2011

ISACA_ITGRC-LogoLast week, I had the pleasure of presenting to a lively audience at the world’s leading conference for IT governance, risk and compliance professionals. The event, hosted at the Ritz-Carlton Hotel in Orlando by the good folks at ISACA, brought together a panoply of experts in the auditing, compliance, privacy, and information security space.

I presented on the subject of Data Governance and Electronic Discovery, and how these concepts represent “flip sides of the same coin.” What was particularly rewarding for me was the level of interest and participation during our interactive case study. Thanks to all who attended and participated last week…I enjoyed myself immensely, and I hope that you found it a rewarding discussion.

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Fraud, Information Security, Investigations, Litigation Hold, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Radio Show Appearance: Guest Expert on Business Fraud Awareness

Posted by Johnny Lee on September 6, 2011

ForensicUpdate editor, Johnny Lee, hit the airwaves again with colleague Philip Ratliff.  This time our host was Alan Butler, host of Atlanta’s Premier Business Talk Show “Butler on Business.”  Alan and co-host Jason Riddle facilitated a lively discussion covering a areas of concern to business owners and managers alike.

Listen as Philip Ratliff and Johnny Lee of Grant Thornton LLP’s Atlanta Forensics & Litigation practice comment on a broad variety of fraud issues facing organizations—especially in a down economy.  Segment one of the program can be found here; segment two can be found here. Please note that the views and opinions expressed are personal views and are not necessarily those of Grant Thornton; click here for more on this.

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Forensic Accounting, Fraud, Information Security, Investigations, Litigation Hold, Privacy, Records Retention, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Trick or Tweet? Radio show appearance discussing recent issues on social media…

Posted by Johnny Lee on July 27, 2011

“Social media follows you around. Unlike Vegas, what happens online stays online forever with participants, leaving behind a wake of electronic information. As millions of smart-phone, Twitter, and Facebook users take to the Internet to send messages and post updates, they may place themselves and their businesses at risk.”

ForensicUpdate editor recently hit the airwaves with colleague Philip Ratliff on San Diego’s popular legal talk radio show with Jeff Isaac, host of “The Lawyer in Blue Jeans” program, to illuminate the concerns and issues related to the risks of social media use by individuals and businesses alike.

Listen as Philip Ratliff and Johnny Lee of Grant Thornton LLP’s Atlanta Forensic & Litigation practice discuss social media risks that can become serious issues if not dealt with carefully. Please note that the views and opinions expressed are personal views and are not necessarily those of Grant Thornton; click here for more on this.

Posted in Announcement, Computer Forensics, Data Governance, ECM, eDiscovery, Fraud, Investigations, Privacy, Social Networking | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Evidence Spoliation Insurance…welcome news or moral hazard?

Posted by Johnny Lee on January 18, 2011

In early December, a division of Chartis Insurance (the artist formerly known as AIG), announced that it would offer a new insurance product focused upon evidence spoliation.  Interestingly, the product is designed to guard against claims arising from direct physical loss or damage to items that serve as material evidence in a legal proceeding.  Perhaps it’s the geek and the recovering attorney in me, but a couple of things are notable in this offering.

First, as with any insurance product, there must be a triggering event.  The event here is where the insured party is alleged to have breached its professional duty of care related to the preservation of property that is deemed to have evidentiary value.  The insurance would protect against liability for monetary damages and settlement, as well as defense costs for claims alleging a breach of professional duty.

Second, to be clear, this is not insurance that obviates the need for controls or proper handling of sensitive information, though the level of controls maturity will clearly affect how premia are rated.  This product, at least as initially introduced, does not appear to be aimed at entities protecting their own data.  This insurance offering appears to be geared toward organizations that are “conducting analysis on the property of others” and who, as a result of this analysis, may find themselves “exposed to spoliation as a separate tort” (i.e., sued for the harm caused by losing another party’s stuff—either by the party who owned the lost stuff or by a third party).  In legalese, this insurance protects against claims arising from the failure to preserve property of evidentiary value belonging to others that is in the care, custody, and control of the insured.  (Hint: Think engineering firm or research group conducting a form of benchmarking on data provided by a company.)

Despite the ostensible target market, it will be interesting to see how other vendors (especially so-called “cloud” vendors) react to this sort of insurance offering.  Indeed, there is the old saw—certainly trotted out with great frequency during the heyday of Sarbanes-Oxley compliance—that while you can outsource processes and services, you cannot outsource the risks related to same.  So, this leaves us with the question of whether the (potential) availability of such an insurance product to cloud vendors (and other third parties in possession of sensitive and valuable data) will decrease the diligence of these providers in the protection of these sensitive data.  An even bigger question is what companies hoping to outsource to such vendors should do about this.  It definitely will be an interesting area to monitor over the near term.

Posted in eDiscovery, Information Security, Privacy, Records Retention | Tagged: , , , , , , , , , , , , , , , , , , , , | 1 Comment »

Business Chronicle: Smart Data Management

Posted by Johnny Lee on January 6, 2011

“Are you seeking a competitive advantage for your business? Many companies need look no further than the mountains of information generated in the course of doing business and contained in their computer systems.

These days data management isn’t just about being able to respond to litigation, but using a wide range of information to operate more efficiently, better serve customers and sell more products.”

Click here for the full article, written by Randy Southerland of the Atlanta Business Chronicle.

Posted in ECM, Information Security, Records Retention | Tagged: , , , , , , , , , , , , , , , , , , | Leave a Comment »

 
%d bloggers like this: