Hi [[ session.user.profile.firstName ]]

Social Media & E-Discovery: Riches and Risks

The use of social media evidence in electronic discovery has escalated dramatically in the last year. There are indeed “nuggets of gold” in social media evidence, but you don’t necessarily mine them without peril. There’s a way to do it correctly and a way to get yourself in trouble, perhaps by inad
The use of social media evidence in electronic discovery has escalated dramatically in the last year. There are indeed “nuggets of gold” in social media evidence, but you don’t necessarily mine them without peril. There’s a way to do it correctly and a way to get yourself in trouble, perhaps by inadvertently doing something unethical or perhaps by simply not knowing how to obtain the evidence appropriately. Our experts will discuss the role of the Electronic Communications Privacy Act and the Stored Communications Act in dealing with social media evidence and they will also help you understand when to go to the social media provider and when to go to the user to procure your evidence. Case law is new in this area, but recent cases are instructive, and this session will discuss a few of the most noteworthy cases.
Recorded Nov 9 2010
46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sharon D. Nelson; Esq. and John W. Simek; Sensei Enterprises Inc., President and Vice President
Presentation preview: Social Media & E-Discovery: Riches and Risks
Recommended for you:
  • Date
  • Rating
  • Views
  • Moving Data Across Borders: No More Safe Harbors EDRM webinar, sponsored by Ipro Moving Data Across Borders: No More Safe Harbors EDRM webinar, sponsored by Ipro M. James Daley, Emily Fedeles, Kenneth J. Withers, George Socha, Tom Gelbmann Recorded: May 17 2016 63 mins
    When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.

    Speakers:
    * M. James Daley, Senior Counsel, Seyfarth Shaw LLP
    * Emily R. Fedeles, Associate, BakerHostetler
    * Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
  • Cybersecurity Threats and Client Confidential Data, Sponsored by Ipro Cybersecurity Threats and Client Confidential Data, Sponsored by Ipro Melinda McLellan, Will Auther, George Socha, Tom Gelbmann Recorded: May 10 2016 62 mins
    Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations

    Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.

    In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.

    Speakers:
    * William F. Auther, Partner, Bowman and Brooke LLP
    * Melinda L. McLellan, Counsel, BakerHostetler
  • Train as You Fight: The Value of Threat Simulations vs. Pen Testing Train as You Fight: The Value of Threat Simulations vs. Pen Testing Ryan Linn, Director of Advanced Tactics and Countermeasures Recorded: Apr 12 2016 59 mins
    Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.

    Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
    This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.

    We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
  • The Future of E-Discovery: An Analytics Revolution to See your Case More Clearly The Future of E-Discovery: An Analytics Revolution to See your Case More Clearly Krista Fuller, Ryan Bilbrey, George Socha, Tom Gelbmann Recorded: Mar 24 2016 60 mins
    Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:

    Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.

    Speakers:
    * Krista Fuller, Director of Product Management, LexisNexis
    * Ryan Bilbrey, Managing Director, OmniVere

    Moderators:
    * George Socha, Co-Founder, EDRM
    * Tom Gelbmann, Co-Founder, EDRM
  • Lessons Not Learned: Cybersecurity's Habitual Mistakes Lessons Not Learned: Cybersecurity's Habitual Mistakes Grayson Lenik, Nuix; Dan Haagman, NotSoSecure; Gregory J. Bautista, Wilson Elser LLP; Scott Sarafian, US Secret Service Recorded: Mar 23 2016 59 mins
    Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?

    Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.
  • EDRM webinar, "Catching the Third Wave of E-Discovery," sponsored by Zapproved EDRM webinar, "Catching the Third Wave of E-Discovery," sponsored by Zapproved Eric Hibbard, Jeremy Schaper, Barry C. O’Melia,George Socha, Tom Gelbmann Recorded: Mar 23 2016 60 mins
    Discovery has moved from the time of paper, to the on-premise era, and now to the cloud age. Join our speakers as they discuss the attributes of true e-discovery cloud solutions; compare the benefits and shortcomings of cloud versus more traditional approaches; and help corporate personnel understand how to catch that waving, moving their e-discovery to true cloud solutions.

    Presenters:

    * Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems
    * Jeremy Schaper, Chief Technology Officer, BlueStar Case Solutions
    * Barry C. O’Melia, Chief Operations Officer, Digital WarRoom

    Moderators:

    George Socha, Co-Founder, EDRM
    Tom Gelbmann, Co-Founder, EDRM
  • Thomson Reuters Introduces eDiscovery Point Thomson Reuters Introduces eDiscovery Point Keith Schrodt, James Jarvis, George Socha Recorded: Feb 16 2016 63 mins
    Discover what attorneys and litigation support managers are high-fiving about. They’re excited about Thomson Reuters’ new, and dare to say revolutionary ediscovery platform: eDiscovery Point. A new ediscovery platform that allows users simultaneously upload and process data; access that data within minutes; achieve accurate search results within seconds of performing a complex search query; as well as several other time and costs saving functionalities like advanced data analysis and predictive coding. Attend this webinar to see how eDiscovery Point will make ediscovery easier for you.

    Speakers:
    * Keith Schrodt, JD, MBA; Marketing Manager, Legal Managed Solutions; Thomson Reuters
    * James Jarvis; Vice President, Product & Partner Management; Thomson Reuters

    Moderator: George Socha
  • Fighting Cyberespionage: Protecting Enterprise from the Enemy Outside & Within Fighting Cyberespionage: Protecting Enterprise from the Enemy Outside & Within Keith Lowry, Nuix SVP Threat Intelligence; Chris Pogue, Nuix SVP CyberThreat Analysis; Amie Taal, Cybersecurity Expert Recorded: Dec 17 2015 59 mins
    The protection of your organization's trade secrets, collected PII data, and confidential matters are your top priority. The same is an attractive asset for thousands of hackers around the world looking to profit or gain a competitive advantage that could damage the integrity and success of your organization’s objectives.

    In this webinar, join three seasoned cybersecurity experts as they present the trends in cyberespionage and discuss:

    • What makes organizations vulnerable to cyberespionage
    • Why cyberespionage activity can vary across industries based on hacking drivers
    • How a combined security approach that focuses not just on external threat actors but also privileged insiders can help identify spying activity in the enterprise
  • EDRM webinar, "State of the Industry: TAR & Analytics End of Year Report" EDRM webinar, "State of the Industry: TAR & Analytics End of Year Report" Greg Buckles, Tammy Doss, George Socha, Tom Gelbmann Recorded: Dec 10 2015 62 mins
    It’s universally accepted that technology assisted review (TAR) speeds review and reduces costs, but many attorneys are still loathe to use it. In the eDJ Group’s recently released 2015 PC-TAR survey, nearly 40% of respondents say they are using TAR less than 5% of the time on their cases. While a majority of respondents say they have tried it, it’s clear that TAR hasn’t crossed the chasm as a go to tool for the legal community yet. Join Greg Buckles, eDJ co-founder and Tammy Doss, VP of Business Operations at Ipro, as they dig into what the survey and interview findings show for analytics and TAR usage and trends as we move into 2016.
  • EDRM webinar, “Practical Options for US Litigators and Investigators Dealing wit EDRM webinar, “Practical Options for US Litigators and Investigators Dealing wit Jo Sherman, Dominic Jaar, George Socha, Tom Gelbmann Recorded: Dec 3 2015 62 mins
    Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.

    Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.

    While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.

    How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?

    Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Social Media & E-Discovery: Riches and Risks
  • Live at: Nov 9 2010 7:00 pm
  • Presented by: Sharon D. Nelson; Esq. and John W. Simek; Sensei Enterprises Inc., President and Vice President
  • From:
Your email has been sent.
or close
You must be logged in to email this