Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR

Page created by Kenneth Byrd
 
CONTINUE READING
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
877.557.4273
                                                 catalystsecure.com

       WEBINAR

Here Today, Gone Tomorrow:                     Thomas Gricks
                                               Robert D. Keeling
Preserving Ephemeral Evidence in E-Discovery
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
Today’s Presenters

        Robert D. Keeling        Tom Gricks
             Partner         Director, Data Analytics
         Sidley Austin LLP   Catalyst Cloud Services
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
Agenda

•   The characteristics of ephemeral messaging
•   The business benefits of ephemeral messaging
•   The risks of ephemeral messaging
•   Overview of applicable legal hold principles
•   Decisions and analysis
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
The Reality of Ephemeral Messaging
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
The Proliferation of Ephemeral Messaging Apps
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
Getting a Sense of Usage

                           http://www.businessofapps.com/data
                           /telegram-statistics/
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
Characteristics of Many Ephemeral Messaging Apps

•   End-to-end encryption
     - encrypted at rest and in transit
     - encryption keys are immediately deleted

•   Automatic message deletion
     - can be burn-on-read (BOR)
     - sender and recipient control
     - deletes from sender, recipient and server

•   Screenshot protection
     - notification
     - single line review
     - blank screen
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
End-to-End Encryption

          Encryption in transit

          End-to-end encryption

          End-to-end encryption (no service provider)
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
The Business Benefits of Ephemeral Messaging

•   Confidentiality & security
      - protect against cybersecurity threats
      - minimize sensitive ESI (e.g., HIPAA)

•   Data minimization
      - data storage
      - eDiscovery

•   Privacy by design
      - FTC; Dept. of Commerce
      - GDPR
Here Today, Gone Tomorrow: Preserving Ephemeral Evidence in E-Discovery WEBINAR
The Risks of Ephemeral Messaging

•   Negative Perception
•   IG recordkeeping
     - SEC
     - FINRA

•   Regulatory scrutiny
     - DOJ FCPA Corporate Enforcement Policy

•   ESI preservation
The DOJ FCPA Corporate Enforcement Policy

The following items will be required for a company to
receive full credit for timely and appropriate remediation…
• 2017
  Appropriate retention of business records, and prohibiting the
  improper destruction or deletion of business records,
  including prohibiting employees from using software that
  generates but does not appropriately retain business records or
  communications
• 2019
  Appropriate retention of business records, and prohibiting the
  improper destruction or deletion of business records, including
  implementing appropriate guidance and controls on the use of
  personal communications and ephemeral messaging platforms
  that undermine the company’s ability to appropriately retain
  business records or communications or otherwise comply with the
  company’s document retention policies or legal obligations
Applicable Legal Hold Principles
The Genesis of Modern Legal Holds

 “Once a party reasonably anticipates
 litigation, it must suspend its routine
 document retention/destruction policy and
 put in place a ‘litigation hold’.”

Zubulake v. UBS Warburg (“Zubulake IV”) 220 F.R.D. 212 (S.D.N.Y. 2003)

But see, Robert Keeling, Sometimes, Old Rules Know Best: Returning to Common Law Conceptions of
the Duty to Preserve in the Digital Information Age, Catholic University Law Review, (Winter 2018)
The Scope of Legal Holds – FRCP 37(e)
FAILURE TO PRESERVE ELECTRONICALLY STORED INFORMATION

If ESI that should have been preserved in the anticipation or conduct of litigation is lost
because a party failed to take reasonable steps to preserve it, and it cannot be restored
or replaced through additional discovery, the court:
(1) Upon finding prejudice, may order measures no greater than necessary to cure the
     prejudice; or
(2) only upon finding that the party acted with the intent to deprive another party of the
     information’s use in the litigation may:
     (A) presume that the lost information was unfavorable to the party ;
     (B) instruct the jury that it may or must presume the information was unfavorable to
           the party; or
     (C) dismiss the action or enter a default judgment.
The Sedona Guidelines

•   Original Guidelines issued in 2010
•   Team formed to update the Guidelines
    in 2017
•   Commentary released for public comment
    December 2018

The Sedona Conference Commentary on Legal Holds,
Second Edition: The Trigger & The Process, Public
Comment Version (Dec 2018).
Guideline 7: Implementing Preservation Obligations

                  Factors that may be considered in determining the
                  scope of information that should be preserved
                  include the nature of the issues raised in the matter,
                  the accessibility of the information, the probative
                  value of the information, and the relative burdens
                  and costs of the preservation effort.
Guideline 7: Ephemeral Data, Specifically

                 Likewise, transient or ephemeral data not kept in the ordinary course of
                 business and that the organization may have no means of preserving
                 may not need to be preserved. Absent a showing of special need, The
                 Sedona Principles states that a responding party should not be
                 required to “preserve, review, or produce deleted, shadowed,
                 fragmented, or residual [ESI].” Similarly, many organizations have
                 made a good-faith decision to not retain information such as instant
                 messaging, chats, or voicemail messages in the ordinary course of
                 business so that, absent compelling circumstance or an order of the
                 court, there should be no expectation of preserving and producing
                 information from such sources.
Guideline 7: Supporting Materials

                     [W]hile the duty to preserve ephemeral data is very
                     narrow, a duty may exist where the responding party is
                     on notice that the ephemeral data is highly relevant and
                     unique, and where the burden and cost of preserving
                     the ephemeral data does not outweigh the value of its
                     preservation

                    Withers, Kenneth J., “Ephemeral Data” and the Duty to Preserve Discoverable
                    Electronically Stored Information, 37 U. Balt. Law Review, Vol. 37: Iss. 3, Article 4
Guideline 2: Have a Policy

                   Adopting and consistently following a
                   policy governing an organization’s
                   preservation obligations are factors
                   that may demonstrate reasonableness
                   and good faith.
Analysis & Considerations
Ethical Obligation of Technology Competence

•   ABA Model Rule 1.1
    A lawyer shall provide competent representation to a client.
    Competent representation requires the legal knowledge, skill,
    thoroughness and preparation reasonably necessary for the
    representation

•   Comment 8
    To maintain the requisite knowledge and skill, a lawyer should
    keep abreast of changes in the law and its practice, including the
    benefits and risks associated with relevant technology, engage in
    continuing study and education and comply with all continuing
    legal education requirements to which the lawyer is subject

…Be aware of the use and implications of
ephemeral messaging apps
The Reality of Negative Perceptions

•   The Mueller Report
    Further, the Office learned that some of the individuals we
    interviewed or whose conduct we investigated – including some
    associated with the Trump Campaign – deleted relevant
    communications or communicated during the relevant period
    using applications that feature encryption or that do not provide
    for long-term retention of data or communications records. In
    such cases, the Office was not able to corroborate witness
    statements through comparison to contemporaneous
    communications or fully question witnesses about statements that
    appeared inconsistent with other known facts.
Potential Regulatory Implications

•   Missouri Governor Eric Greitens
     - Greitens and 19 staffers used Confide and Silent Phone
     - Greitens was sued for violation of Sunshine Laws

•   City of Long Beach Police Department
     - police officers used TigerText to avoid public disclosure of
       conversations regarding, inter alia, police shootings
     - Through “extensive legal research,” it was concluded that
       messages sent on TigerText are “transitory” and not public
       records, so they are not subject to the city’s record retention
       policy, nor the California Public Records Act

     - Recommendation: develop policies for IM use; create a
       professional standards position to update; consider whether
       to archive messages or change expiration settings
Waymo v. Uber

•   Suit for trade secret misappropriation
•   Use of ephemeral messaging apps
      - Uber instructed employees to use Wickr to discuss
        its self-driving technology efforts
      - Uber employees used Wickr after the trigger for a
        legal hold
      - Waymo argued spoliation

•   Resolution
      - Waymo could cite the use of Wickr as a possible
        explanation for the failure to turn up more evidence
        of misappropriation
      - Uber was permitted to present evidence of legitimate
        business use
Potentially Available Data Sources

•   Wickr Enterprise
     - “configurable ephemerality”
     - individual control of retention periods

•   Metadata
     - some providers maintain metadata on servers (time, date,
       parties, contacts)

     - metadata may be available on devices

•   Screenshots/videos
The Elephant in the Room

     …treating ephemeral messages as
               conversations
Learn More

Visit catalystsecure.com
to find more resources:
•Guidance on best practices
•Webinars and podcasts
•Case studies
You can also read