E-Discovery in Government Investigations and Criminal Law JOLT Symposium February 22, 2013 1.

Slides:



Advertisements
Similar presentations
Chapter Nine: Ethical Issues for Criminal Prosecutors
Advertisements

Considerations for Records and Information Management Programs in Light of the Pension Committee and Rimkus Consulting 2010 Decisions.
248 F.R.D. 372 (D. Conn. 2007) Doe v. Norwalk Community College.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Ronald J. Shaffer, Esq. Beth L. Weisser, Esq. Lorraine K. Koc, Esq., Vice President and General Counsel, Deb Shops, Inc. © 2010 Fox Rothschild DELVACCA.
The Anatomy of a Criminal Case Government – Libertyville HS.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Ethical Issues in the Electronic Age Ethical Issues in the Electronic Age Frost Brown Todd LLC Seminar May 24, 2007 Frost Brown.
1 A Practical Guide to eDiscovery in Litigation Presented by: Christopher N. Weiss Aric H. Jarrett Stoel Rives LLP Public Risk Management Association (PRIMA),
E-Discovery for System Administrators Russell M. Shumway.
1 Best Practices in Legal Holds Effectively Managing the e-Discovery Process and Associated Costs.
Introduction to the Grand Jury ACG 6935/4939. What in the world is a Grand Jury.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 5E, by Henry R. Cheeseman Chapter 8 Business.
Computer Forensics Principles and Practices
FORENSIC ACCOUNTING - BA Slide 18-1 Today’s Topics n Passion n Legal Resolution and Courts Overview n Criminal Litigation Process.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
The Fourth and Fifth Amendments How do they protect our rights?
ISSUES IN FBI LAW ENFORCEMENT RELATED TO COUNTER-TERRORISM INVESTIGATIONS Ranjana Natarajan National Security Clinic University of Texas School of Law.
Winning, until proven guilty …. Searches and Seizures The Fourth Amendment protects from unreasonable searches and seizures Searches must be conducted.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
Chapter 18 - The Fourth Amendment and National Security.
The Sedona Principles 1-7
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
U.S. District Judge Xavier Rodriguez Former U.S. Magistrate Judge Ron Hedges Kiran Raj, Senior Counsel to the Deputy AG, U.S. Department of Justice Jeff.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Psychology of Homicide Unit II
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
New York Criminal Defense Lawyer Phone: / Disclaimer: The tips in this.
The Bill of Rights The First Fundamental Changes of the Constitution.
4. Legal Limitations on Police behavior: a)Police are authorized to use coercive and intrusive measures in enforcing the law  Legal use of force = defining.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Procedural Criminal Law What are the constitutional rights of the accused?
Unit 6  What needs to be done this week SeminarSeminar QuizQuiz Discussion boardDiscussion board Unit 9 Analysis and ApplicationUnit 9 Analysis and Application.
Digital Government Summit
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Emerging Case Law and Recent eDiscovery Decisions.
Chapter 20 Civil Liberties: Protecting Individual Rights.
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
Procedural Law By Felix Romero. Review-Procedural Law “Mandates the steps in the criminal justice process and provides legal protections for criminal.
Investigative Constitutional Law Charles L. Feer, JD, MPA Bakersfield College Department of Criminal Justice Investigative Constitutional Law.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
Chapter 7 Criminal Law and Cyber Crimes. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.7-2 What Is a Crime? An act done by an individual.
Heartland Surgical Specialty Hospital, LLC v. Midwest Division, Inc 2007 WL (D. Kan. Apr. 9, 2007)
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Aim: How are defendants’ rights part of Civil Liberties? Chap 4, Day 4 Do Now: PAIR/SHARE 1.Put the following actions in chronological order. trial, prosecution,
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
“Ryan Rose, you are under arrest!” What rights do you have? Look it up.
The Paralegal Professional Chapter Eight Criminal Procedure and Administrative Law.
CJ in the USA: Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
Criminal Justice Process: The Investigation
‘Make in India’ series Emerging Trends - International Arbitration: (i) E- discovery (ii) Hot tubbing.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Criminal Investigation and the Law
Steps of a Crime.
Procedures for a CRIMINAL case
Forensics Week 7.
Protection of News Sources
Search and Seizure Concepts
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Chapter 17 Videotapes Photographs Documents Writings.
Digital Device Searches
Presentation transcript:

E-Discovery in Government Investigations and Criminal Law JOLT Symposium February 22,

Key Topics for Discussion ESI and Investigations The Bill of Rights and ESI Post-Indictment Discovery The Fifth Amendment Social Media 2

Subpoenas The duty to preserve can come before the subpoena – 18 U.S.C. § 1519 (“in contemplation of”); 18 U.S.C. § 1512(c) – U.S. v. Suarez, 2010 WL (D.N.J. Oct. 19, 2010) (adverse inference sanction for deletion of text messages between FBI agents and cooperating witness). Spoliation may be potential crime in and of itself and be used to prove consciousness of guilt for underlying crimes. – Indictment of Kolon Industries, Inc. for obstruction of justice, in addition to conspiracy and trade-secret-theft counts, as a result of conduct undertaken in a private civil case. Discussions with government – identify and avoid problems. 3

Digital Evidence Search Warrants Collision between Fourth Amendment’s particularity requirement, plain view doctrine, and search and seizure of digital evidence where every file could potentially contain evidence identified in warrant Over seizure creates risk of general warrant 4

Search Warrant Delays How long can the government wait to search the seized ESI? U.S. v. Metter, No. 10-CR-600 (DLI), 2012 WL (E.D.N.Y. May 17, 2012), while a delay of several months could be reasonable, a 15 month delay determined to be unreasonable – (“government's retention of all imaged electronic documents, including personal s, without any review whatsoever to determine not only their relevance to this case, but also to determine whether any recognized legal privileges attached to them, is unreasonable and disturbing.”). 5

U.S v. Jones – “Unanimous” Decision 9-0 decision that the actions of the government were a search. But that’s all that was unanimous… 6

Warrantless Searches of Cell Phones Raises special concerns outside of traditional search incident to arrest No longer small containers in pockets; libraries of information 7

Recommendations for ESI Discovery in Federal Criminal Cases issued by the Joint Electronic Technology Working Group (JETWG). 8 The New Criminal ESI Protocol

JETWG Recommendations for ESI Discovery in Federal Criminal Cases Collaborative agreement between DOJ, FPD, and CJA providing recommendations for ESI in federal criminal cases Promotes consistency, predictability, and dialogue Meet and confer Production Brady implications 9

Post-Indictment Discovery – Brady U.S. v. Skilling, 554 F.3d 529 (5th Cir. 2009) – No Brady violation for “open file” production of massive volume of ESI. – Gov’t provided searchable electronic “open file”, a set of “hot documents” and indices to “hot documents.” No evidence of bad faith or that Government padded “open file” with superfluous information. U.S. v. Salyer, 2010 WL (E.D. Cal. 2010) – Gov’t ordered to search for and identify Brady/Giglio material. – Gov’t should have been identifying such material during 5-year investigation. – If this was impossible for the Gov’t it is even more impossible for the defense to do so in matter of months. 10

Post-Indictment Discovery – Brady U.S. v. Warshak, 631 F.3d 266 (6th 2010) – Rule 16 contains no indication that documents must be organized or indexed. – Defendant’s own documents at stake; had access to those documents for 2.5 years; inventory provided; ESI was reasonably searchable. U.S. v. Farkas, No (4th Cir., May 16, 2012) – No abuse of discretion when court refused to grant defendant more time to review 59 million pages for exculpatory evidence. 11

Fifth Amendment – Compelled Access to Encrypted Computer Information? U.S. v. Doe, 11th Circuit – Providing encryption information testimonial? – Suspect could not be required to decrypt computer hard drives 12

Social Media Unique preservation, collection and discovery challenges Government’s statutory authority to access social media/ESI v. defendant’s lack of authority Ethical limits on gathering of social media 13

Social Media (cont) Social media at trial – Jury venire research – Ethical limitations New trial ordered for failure to disclose Skype communications. U.S. v. Stirling, No (S.D. Fla. June 6, 2012) – Juror use of social media. Erickson Dimas-Martinez v. State of Arkansas, 2011 Ark. 515 (2011) (juror tweets overturned conviction) – Authenticating social media evidence 14

Questions? 15