Ch 13 - Privacy Issues in Civil Litigation and Governmental Investigations Flashcards

1
Q

Disclosures required by law

A

FDA requires health professionals and drug manufacturers to report serious adverse events assoc. with use of FDA regulated item

OSHA requires reporting info about certain workplace injuries and illness.

States can require reporting certain types of injuries/conditions - abuse, gun wounds, contagious diseases.

Recall HIPAA allows PHI to be disclosed if required by law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disclosures permitted by law

A
  • HIPAA - required to discloses to data subject and to HHS in enforcement action.
  • Computer/Hacker trespasser - Section 217 of USA PATRIOT Act permits, not require owner/operator of computer system to provide access to law enforcement to communications if –
    1. O/O authorizes interception of hacker’s communications on the computer
    2. Investigator acting under color of law
    3. Reasonable grounds to believe contents will be relevant to investigation.
    4. such interception not acquire other communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disclosures forbidden by law (unless consented to)

A
  • State law evidentiary privileges – eg. atty- can prohibit client, doctor-patient.

Forbids forcing disclosure, but can still consent.

Recall COPPA, HIPAA - consent required or exception.

Fifth Am self incrim right also.

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public access to court records: protective orders

A
  • response to public access to court records: protective orders, where judge dets what info should not be made public and what conditions apply for access. Moving party must show good cause

Reqs for PO:

  1. must be confidential information in the 1st place.
  2. must show info is relevant to the case
  3. must weigh harm against the need for the information.
  • HIPAA has a qualified protective order provision, applies in state courts not covered by PO in fed rules of civpro.
    If granted, prohibits parties from using/disclosing PHI except in litigation, and must return it at end.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public access: required redaction

A

FRCP Rule 5.2: Privacy Protection for Filings Made with Court”
Requires no more than this in court filings:

  1. The last four digits of the Social Security number and taxpayer-identification number
  2. The year of the individual’s birth
  3. If the individual is a minor, only the minor’s initials
  4. The last four digits of the financial account number

Certain exemptions exist, and can file under seal w/o redaction in some cases.

Bankruptcy has similar rules.

Criminal proceedings add city and state of home address also must be redacted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

E-discovery of electronically-stored information (ESI): Guidelines of Sedona Conference re. emails

A

Regarding email retention, the Sedona Conference offers four key guidelines:

  1. Email retention policies should be administered by interdisciplinary teams composed of participants across a diverse array of business units
  2. Such teams should continually develop their understanding of the policies and practices in place and identify the gaps between policy and practice
  3. Interdisciplinary teams should reach consensus as to policies, while looking to industry standards
  4. Technical solutions should meet and parallel the functional requirements of the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When can data not be included in response to e-discovery request?

A

When done in good faith, data that is “transitory in nature, not routinely created or maintained by [d]efendants for their business purposes, and requiring of additional steps to retrieve and store,” may be considered outside the duty of preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Court test to resolve conflict between retention policy and a discovery request?

A

(1) a retention policy should be reasonable considering the facts of the situation,
(2) courts may consider similar complaints against the organization and
(3) courts may evaluate whether the organization instituted the policy in bad faith.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tension between GDPR and a domestic discovery request

A

Ways courts have resolved:

  1. if party sought US jurisdiction, then require production
  2. require production for all parties, regardless of whether sought US jurisd.
  3. Focus on nature of document at issue - privacy log describing docs without disclosing - balancing
  4. resort to Hague Convention on the Taking of Evidence (much harder - is last resort for those seeking evidence)
    party seeking to displace FRCP bears burden of demo Hague is more appropriate and that foreign law prohibits production
    Aerospaciale case outlines factors US court may use to make this determination:
  5. The importance of the documents or data to the litigation at hand
  6. The specificity of the request
  7. Whether the information originated in the United States
  8. The availability of alternative means of securing the information
  9. The extent to which the important interests of the U.S. and the foreign state would be undermined by an adverse ruling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Katz v. US

A

“What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” The court found that a warrant was needed for a police bug in a restaurant, placed to hear the calls behind the closed doors of a phone booth.
Katz is best remembered today for the widely cited “reasonable expectation of privacy” test. In a concurring opinion, Justice John Marshall Harlan stated: “There is a twofold requirement, first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as ‘reasonable.’”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exceptions to req of warrant where a reas exp of privacy exists

A
  • “In public” exception - if knowingly expose to public, not prot by 4th - plain view
  • If put info in hands of 3rd party, its not protected by 4th
    so companies can turn over data subject info without warrant when data subj gave them the info.

But see Jones v. US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Jones v. US

A

The court held unanimously that a warrant was needed when the police placed a Global Positioning System (GPS) device on a car and tracked its location for over a month. The majority decision emphasized that the police had trespassed onto the car when they physically attached the GPS device. Four of the nine justices, however, would have held that a search occurred even without the physical attachment, and even for movements that took place entirely in public. A fifth justice seemed to indicate sympathy for this constitutional limit on surveillance of “in public” activities, and also stated that the time had come to reexamine the third-party doctrine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Riley v. California

A

The 2014 case of Riley v. California was an important decision where the Supreme Court unanimously held that the contents of a cell phone cannot be searched unless law enforcement officers first obtain a search warrant.56 The justices ruled that the data on a cell phone was quantitatively (the amount of data) and qualitatively (the kind of data) different than the contents that would normally be found in a physical container, which was the analogy the government had proposed to the court. As to the quantity of data, the Court noted the immense storage capacity of cell phones as well as the ability to link to remote storage. With regard to the quality of data, the Court opined that Internet searches can reveal a person’s interests, and location information can pinpoint an individual’s movement over time.57

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HIPAA - When disclosure to law enforcement is permitted without consent -= “law enforcement exception”

A
  1. The information sought is relevant and material to a legitimate law enforcement inquiry
  2. The request is specific and limited in scope to the extent reasonably practicable in light of the purpose for which the information is sought
  3. De-identified information could not reasonably be used

Note: Other than law enforcement exception, HIPAA has a “required by law” exception to cover where other statutes require disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Other HIPAA disclosures to law enforcement permitted in these cases

A
  • about a crime on the premises,
  • about decedents in connection with a suspected crime,
  • in emergencies,
  • about victims of a crime even in the absence of patient consent if a multifactor test is met.
  • Limited information may in some instances also be released for identification and location purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

General approach of federal law wrt access to communications by law enforcement / govt.

A
  • From strictest to most permissive, federal law has different rules for
    (1) telephone monitoring and other tracking of oral communications;
    (2) privacy of electronic communications and
    (3) video surveillance, for which there is little applicable law.
  • Federal law is also generally stricter for real-time interception of a communication, as contrasted with retrieval of a stored record.
  • In each area, states may have statutes that apply stricter rules.
  • Furthermore, monitoring that is offensive to a reasonable person can give rise to claims under state invasion of privacy or other common-law claims.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Title III interception requirements

A
  • applies to phone wiretapping, bugging, any oral communication uttered by a person exhibiting an expectation that such communication is not subject to interception under circs justifying such expectation., and (via ECPA) to e-comms.
  • But exact rules for wire, oral and e-comms vary.
  • But interception of all of these is criminal offense and there is a PROA, unless exception applies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exceptions to T3 prohibition on interception of wire, oral, and e-comms

A
  • If one party given consent (although some states are 2-party consent)
  • Done in ordinary course of biz
  • email or phone service provider, eg.

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Stored Comms

A
  • general prohib ag unauth acquisition, alteration or blocking of e-comms while in facility through which ecomms service provided.
  • Crim penalties so careful before giving to law enfor. textbook not give standards, just say consult expert
  • Exceptions
    Company providing the service
    or as authorized by user of service wrt ecomm from or to them
  • Not pre-empt.
  • Preservation orders: provider of wire/ecomm or remote computing service, upon request of govt. entity must take all necessary steps to preserve records, pending court order.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Pen Registers and Trap and Trace Orders

A
  • Note traditionally, these were under the “relevant to an ongoing investigation” low standard, for production to law enforcement.
  • USA Patriot Act expanded PR and T&T orders to not just phone numbers but any “dialing, routing, addressing, or signaling info” transmitted to or from a device or process.

USA FREEDOM Act pulled this back - prohibits PR and T&T for bulk collection, and restricting to phone # or email address or similar “specific selector”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Communications Assistance to Law Enforcement Act (CALEA) aka Digital Telephony Act

A
  • Lays out duties of defined actors in telecomm industry to cooperate in interception of communications for law enfor. , etc.
  • Reqs telecomms to design products/services to ensure they can carry out lawfuly order to provide govt. access to comms.
  • FCC implemented through r-making
  • not apply to internet services, but rulemaking rendered VOIP and broadband subject to CALEA when interconnect with trad phone services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cybersecurity Information Sharing Act (CISA) – 2015

A
  • The statute permits the federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out.
  • Companies are authorized to voluntarily share with govts and private entities ‘cyber threat indicators” and “defensive measures” for a “cybersecurity purpose” or receive such info from these entities.

IF done in accordance with certain reqs, such as, for cyber threat indicator, first remove any info not dir related to threat and that relates to an individual

  • Sharing with feds does not waive atty-client priv., but may wrt st/loc/priv
  • Info shared can’t be used for enf action.
  • Shared info exempt from FOIA, sim state laws.
  • Company can monitor and operate defensive measures on own info, or of others with permission, for cyber purpose; and company protected from liability for this monitoring (not for operating defensive measures).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Right to Financial Privacy Act

A

no Government authority may have access to or obtain copies of, or the information contained in the financial records of any customer from a financial institution unless the financial records are reasonably described” and meet at least one of these conditions:

  1. The customer authorizes access
  2. There is an appropriate administrative subpoena or summons
  3. There is a qualified search warrant
  4. There is an appropriate judicial subpoena
  5. There is an appropriate formal written request from an authorized government authority

Note: over 12 states have similar reqs

Consumers have right to notice and to challenge request

Damages available, plus punn and atty fees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Media Records and Privacy Protection Act

A

Under PPA, government officials engaging in criminal investigations are not permitted to search or seize media work products or documentary materials “reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast or other similar form of public communication.” In practice, rather than physically searching a newsroom, “the PPA effectively forces law enforcement to use subpoenas or voluntary cooperation to obtain evidence from those engaged in First Amendment activities.”

It applies only to criminal investigations, not to civil litigation.

Several states provide additional protections.

Violation can lead to penalties of a minimum of $1,000, actual damages and attorney’s fees.

One important exception is if there is probable cause to believe that a reporter has committed or is in the process of committing a crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Evidence stored in a different country

A

Microsoft v. US (the Microsoft Ireland case) - 2d circuit ruled SCA not able to be used by govt to get data housed overseas, but Congress in 2018 passed CLOUD Act which expanded reach of SCA to cover oversease data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

FISA History

A

In passing FISA in 1978, both supporters and critics of broad surveillance powers achieved important goals. Supporters of surveillance gained a statutory system that expressly authorized foreign intelligence wiretaps, lending the weight of congressional approval to surveillance that did not meet all the requirements of ordinary Fourth Amendment searches. Critics of surveillance institutionalized a series of checks and balances on the previously unfettered discretion of the president and the attorney general to conduct surveillance in the name of national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Snowden

A
  • In passing FISA in 1978, both supporters and critics of broad surveillance powers achieved important goals. Supporters of surveillance gained a statutory system that expressly authorized foreign intelligence wiretaps, lending the weight of congressional approval to surveillance that did not meet all the requirements of ordinary Fourth Amendment searches. Critics of surveillance institutionalized a series of checks and balances on the previously unfettered discretion of the president and the attorney general to conduct surveillance in the name of national security.

the 2013 Presidents Review Group was told that 70 percent of its recommendations were being adopted in letter or spirit, and others have been adopted since.

The Privacy and Civil Liberties Oversight Board (PCLOB), an independent agency in the executive branch, released detailed reports on the Section 215125 and Section 702126 surveillance programs, making numerous recommendations. Overall, PCLOB made 22 recommendations in its Sections 215 and 702 reports and virtually all have been accepted and implemented.

The Snowden revelations led to significant reforms in U.S. surveillance law and practices.

These reforms included passage of the USA FREEDOM Act in 2015, which among multiple provisions ended bulk collection under the Section 215 program,

and the Judicial Redress Act of 2016, which extends U.S. Privacy Act protections to certain non-U.S. persons. There have also been numerous administrative changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

FISA Basics

A

FISA establishes standards and procedures for electronic surveillance that collects “foreign intelligence” within the United States FISA orders can issue when foreign intelligence gathering is “a significant purpose” of the investigation. 138 For law enforcement cases, court orders issue based on probable cause of a crime; FISA orders instead issue on probable cause that the party to be monitored is a “foreign power” or an “agent of a foreign power.”

In addition to wiretap orders, FISA authorizes pen register and trap and trace orders (for phone numbers, email addresses, and other addressing and routing information) and orders for video surveillance.

Generally can’t disclose the fact of order to the target.

Mostly an issue for telecomm providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Section 215 orders

A

provides that a federal court order can require the production of “any tangible thing” for defined foreign intelligence and antiterrorism investigations.

The definition of tangible thing is broad, including “books, records, papers, documents, and other items.” Recipients of such an order receive notice that they were forbidden from disclosing the existence or contents of the order.

USA FREEDOM Act ended bulk collection under 215 - now must be a specific request

30
Q

FISA: Section 702

A

Refers to a 2008 amendment to FISA

applies to collection of electronic communications that take place within the United States and only authorizes access to the communications of targeted individuals for listed foreign intelligence purposes. One legal question answered by Section was how to govern foreign-to-foreign communications for interception of content that has been stored within the United States

To target the communications of any person, the government must have a foreign intelligence purpose to conduct the collection and a reasonable belief that the person is a non-U.S. citizen located outside of the United States.

Section 702 can provide access to the full contents of communications, and not just metadata

To target the communications of any person, the government must have a foreign intelligence purpose to conduct the collection and a reasonable belief that the person is a non-U.S. citizen located outside of the United States.151 Section 702 can provide access to the full contents of communications, and not just metadata

PRISM - ask company for X selector and they have to give it

UPSTREAM - ongoing filter of ecomms/phone calls passing through US internet infrascture that meet X selector

31
Q

National Security Letters (NSLs)

A
  • USA Patriot Act expanded these
  • NSLs generally can seek records relevant to protect against international terrorism or clandestine intelligence activities.

NSLs can be issued without any judicial involvement.

Under the 2006 amendments, however, recipients can petition to a federal court to modify or set aside an NSL if compliance would be unreasonable or oppressive

  • he 2006 amendments said that recipients are bound to confidentiality only if there is a finding by the requesting agency of interference with a criminal or counterterrorism investigation or for other listed purposes
  • FBI now presumptively terminates NSL secrecy when investigation closes or not more than 3 years after opening of a full inviestigation.
32
Q

4th Amendment principles have informed a number of statutes such as:

A
  1. Wiretap laws,
  2. the Electronic Communications Privacy Act,
  3. the Right to Financial Privacy Act (applying to financial institutions), and
  4. the Privacy Protection Act (applying to reporters and media companies)”
33
Q

Which US laws require disclosure of personal information held by an organization?

A
  1. Food, Drug and Cosmetic Act (FDA)
  2. OSHA
  3. HIPAA
34
Q

According to FRCP 45 a subpoena must:

A
  1. State the court from which it is issued
  2. State the title of the action and its civil-action number
  3. Command each person to whom it is directed to do the following at a specific time and place: attend and testify; produce designated documents, electronically stored information or tangible things in that person’s possession, custody or control; or permit the inspection of premises
  4. Set out the text of the rules describing a person’s right to challenge or modify the subpoena.
35
Q
  1. What do you need to know about computerized data before it can be classified?

A. file type
B. accessing users
C. keywords
D. size

A

A. file type
B. accessing users
C. keywords

36
Q

When comparing EU with US workplace privacy approaches, which of the following is NOT true?

A. US regulations emphasize employer duties.
B. EU regulations provide for limited background checks.
C. US regulations provide for continuous, multi-dimensional employee monitoring.
D. EU regulations emphasize employer rights.

A

D. EU regulations emphasize employer rights.

37
Q

Which of the following is NOT a goal of HR (Human Resources)?

A. attract and retain excellent employees
B. manage costs associated with HR functions
C. creating short-term strategies for the organization
D. support corporate planning functions with tools and data

A

C. creating short-term strategies for the organization

38
Q

All of the following are characteristics of US workplace privacy approaches, EXCEPT:

A. Limited employee expectations of privacy.
B. Privacy concerns predominate.
C. Background checks are required and aggressive.
D. Employee monitoring is continuous and multi-dimensional.

A

B. Privacy concerns predominate.

39
Q

All of the following are characteristic of EU workers’ rights, EXCEPT:

A. Employees must be provided with detailed notices.
B. Employee data is solely regulated by the EU Directive.
C. Data processing activities require notification to the appropriate data protection authorities and works councils.
D. Local processing and cross-border transfers are restricted.

A

B. Employee data is solely regulated by the EU Directive.

40
Q

All of the following are characteristics of workplace privacy regulations in the US, EXCEPT:

A. Federal laws often preempt state laws.
B. Both federal and state laws regulate employment and HR data management.
C. The majority of US labor laws include data collection and/or data management practices.
D. US workplace privacy laws require and prohibit specific data handling practices at all stages of the employment relationship (before, during and after employment).

A

A. Federal laws often preempt state laws.

41
Q

All of the following entities regulate workplace privacy in the US except:

A. Equal Employment Opportunity Commission
B. Department of Health and Human Services
C. Better Business Bureau
D. Department of Labor

A

C. Better Business Bureau

42
Q

All of the following are US Federal laws that restrict the information that an employer can collect from employees, EXCEPT:

A. Civil Rights Act of 1964
B. Equal Pay Act of 1963
C. Americans with Disabilities Act of 1990
D. Electronic Communications Privacy Act of 1986

A

D. Electronic Communications Privacy Act of 1986

43
Q

All of the following are US Federal laws that regulate employee benefits management, EXCEPT:

A. Consolidated Omnibus Budget Reconciliation Act
B. Family and Medical Leave Act
C. Equal Pay Act
D. Employee Retirement Income Security Act

A

C. Equal Pay Act

44
Q

Which of the following laws regulates the use of consumer reports in employee background checks?

A. Fair Labor Standards Act
B. Fair Credit Reporting Act
C. Immigration Reform and Control Act
D. Occupational Safety and Health Act

A

B. Fair Credit Reporting Act

45
Q

During a job application process, an employer is prohibited from asking questions regarding applicants’:

A. race
B. gender
C. national origin
D. all of the above

A

D. all of the above

46
Q

What is the scope of CALEA?

A
  1. Applies to telephone companies
  2. VOIP service providers
  3. Internet Service Providers
47
Q

National Security & Privacy

A

National security requests may be made under looser requirements than other investigatory requests.

48
Q

Foreign Intelligence Surveillance Act of 1978 (FISA)

A

In response to the Cold War, US federal law regulating the way that US intelligence agencies conduct foreign intelligence surveillance activities, including wiretaps and the interception of communications. The act sets forth a judicial approval process required when the government targets US persons located within the US. FISA allows warrant-less surveillance to be conducted without a court order for up to one year, provided the surveillance is for foreign intelligence information, is targeting foreign powers, and will not capture the contents of any communication to which a US person is a party.

49
Q

The Foreign Intelligence Surveillance Court

A

Established by FISA, hold secret hearing on FISA requests.

50
Q

What is the role of the Attorney General under FISA?

A

Approves surveillance for foreign intelligence purposes if there is no substantial likelihood of intercepting communications involving US persons (1-year duration)

51
Q

What does a court order do under FISA?

A

Approves surveillance that may involve US persons if there is probable cause to believe that the person is the agent of a foreign power. (90-to-120-day duration)

52
Q

What is the role of National Security Letters (NSLs) under FISA?

A

A category of a subpoena. The US PATRIOT Act expanded the use of national security letters. Separate and sometimes differing statutory provisions now govern access, without a court order, to communication providers, financial institutions, consumer credit agencies, and travel agencies.

53
Q

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA Patriot Act)

A

Broad ranging act designed to counter terrorism that expanded US law enforcement authority to surveillance and capturing communication records.

54
Q

PATRIOT Act Powers

A
  1. Loosened requirements for surveillance of US citizens
  2. Created “roving” wiretaps – allowed investigators to get a wiretap for any type of communication engaged by that person
  3. Strengthened rules against money laundering
  4. FBI gained power to use NSLs to secretly demand records from communication service providers.
  5. Section 215 of the Patriot Act authorized the government to demand “tangible items” including call detail records (Snowden Revelations)
55
Q

The USA Freedom Act of 2015

A

– Expired the Patriot Act. Restored in modified form several provisions of the Patriot Act. The act imposes new limits on the bulk collection of telecommunication metadata on US citizens by American intelligence agencies, including NSA.

56
Q

The Cyber-security Information Sharing Act of 2015 (CISA)

A

Facilitates information sharing through two main components:

i. Authorizes companies to monitor and implement defensive measures on their own information systems to counter cyber threats.
ii. Provides certain protections to encourage companies voluntarily to share information – specifically, information about “cyber threat indicators” and “defensive measures” – with the federal government, state and local governments, and other companies and private entities

57
Q

Zurcher vs. Stanford Daily

A

o Argued that the Fourth Amendment prohibits searches of third parties
o Argued First Amendment prohibits searches of media organizations
o Decided by SOCUS against the newspaper – congress disagreed and passed the Privacy Protection Act of 1980

58
Q

Privacy Protection Act of 1980

A

Summary:

  1. Applies to dissemination of information to the public
  2. Protects work products and documentary materials from search warrants
  3. Requires the use of subpoenas or voluntary cooperation

Detail:
Protects journalists from being required to turn over to law enforcement any work product and documentary materials – including sources – before dissemination to the public.

59
Q

Electronic Discovery (e-Discovery)

A

Prior to trial, information is typically exchanged between parties and their attorneys. E-discovery requires civil litigants to turn over large volumes of a company’s electronic records in litigation

60
Q

Three Steps of the e-Discovery Process

A
  1. Preservation
  2. Collection
  3. Production
61
Q

Preservation

A

Legal holds require the preservation of relevant electronic and paper records. System Admins must suspend the automatic deletion of relevant logs.

62
Q

Collection

A

Security teams often assist in collection efforts.

Sources of Electronic Records:

  1. File Servers
  2. Endpoint Systems
  3. Email messages
  4. Enterprise system and cloud services

eDiscovery Management systems coordinate collection efforts

63
Q

Production

A

If production occurs, attorneys must review documents for relevance and turn them over to the other side.

Most litigation holds never move forward to the production phase.

64
Q

Access to Communications

A

Government access to communications is highly regulated. The 4th amendment is the overarching law regarding government access. The 4th amendment applies to digital communications and creates the right to a “reasonable expectation of privacy”

65
Q

Electronic Communications Privacy Act (ECPA)

A

Includes the Federal Wiretap Act of 1968. Protects wire, oral and electronic communications while those communications are being made, are in transit, and when they are stored on computers. The act applies to e-mail, telephone conversations, and data stored electronically. The USA Patriot Act and subsequent federal enactments have clarified and updated ECPA in light of the ongoing development of modern communications technologies and methods, including easing restrictions on law enforcement access to stored communications in some cases.

66
Q

ECPA Title I

A

Wiretap Act covering oral communications. One Part consent, recording is permissible as long as one party consents to that wiretap.

67
Q

ECPA Title II

A

Stored communications Act covers digital communications stored by a service provider (emails, texts, voicemails, billing records)

68
Q

ECPA Title III

A

Covers the use of pen register and trap and trace methodologies.

69
Q

Pen Registers

A

Records information about outbound communications

70
Q

Tap and Trace

A

Records information about inbound communications

71
Q

The Communications Assistance to Law Enforcement Act (CALEA)

A

Also known as the Digital Telephony Act - Does not add any new wiretapping authority. Requires providers of commercial voice services to engineer their networks in such a way as to assist law enforcement agencies in executing wiretap orders.