The Rat Pack Dino Tsibouris (614) 360-1160

Slides:



Advertisements
Similar presentations
Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Advertisements

Automating Case File Management Prepared and Presented by Gladstone K. Hlalakuhle.
Overview of the Privacy Act
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
 Arizona Bankruptcy American Inn of Court February 9, 2012 Pupilage Number 1 Evidentiary Objections.
Review Questions Business 205
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Ronald J. Shaffer, Esq. Beth L. Weisser, Esq. Lorraine K. Koc, Esq., Vice President and General Counsel, Deb Shops, Inc. © 2010 Fox Rothschild DELVACCA.
DIGITAL EVIDENCE María del Pilar Jácome August 2012.
Auditing Computer-Based Information Systems
Evidence Collection & Admissibility Computer Forensics BACS 371.
LET’S GET LEGAL!!! R OCKY M OUNTAIN D IVISION OF THE I NTERNATIONAL A SSOCIATION FOR I DENTIFICATION Breckenridge, Colorado September 18 – 20, 2002 David.
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances Michelle Ferritto,
Guide to Computer Forensics and Investigations, Second Edition
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
The Wild and Wooly World of E-Signatures Dino Tsibouris (614)
Electronic evidence in Spanish civil procedure: where wishes clash against reality Julio Pérez Gil Universidad de Burgos.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
The E-Signatures Act and eConsent Karin Fuog Nelnet Policy Services November 6, 2006.
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
HIPAA PRIVACY AND SECURITY AWARENESS.
Digital Imagery Good News and Bad News for Public Documents Druscilla R. Simpson N.C. State Archives.
Digital Images as Evidence Karl Harris Computer Science 99 Dartmouth College February 29, 2000.
Designing Smart Cities Conference University of Strathclyde, Glasgow 31 st March 2015 “Regulating Smart Cities: Policing & Privacy” Paul Mackie Chief Executive.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Tori hall Period: 4B DIM project.  Represent clients in court or before government agencies.  Present evidence to defend clients or prosecute defendants.
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
Court Procedures Chapter 3.
Legal and Ethical Issues Carolyn Heyman-Layne Dorsey & Whitney LLP September 2008.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
FILE NUMBER Kent Grey, Partner 1 June 2012 Technology in Governance Risk-intelligent approach to the use of technology “in the Boardroom”
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Washington State Archives “Going Paperless” Presented by: Leslie Koziara, ERMP May 7, 2009 A GUIDE TO WASHINGTON STATE’S APPROVAL PROCESS FOR THE DESTRUCTION.
Digital Government Summit
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
Accounting and Information Systems: a powerful combination.
Heartland Surgical Specialty Hospital, LLC v. Midwest Division, Inc 2007 WL (D. Kan. Apr. 9, 2007)
The Bankers` Books Evidence Act. Banks keep their accounting and its details in various ledgers, registers. When any claim of the bank is required to established.
School of Health Sciences Unit 3 Legal Aspects of Health Information and Health Care Statistics HI 135 Instructor: Alisa Hayes, MSA, RHIA, CCRC.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
LAWS OF MALAYSIA ACT 658 ELECTRONIC COMMERCE ACT 2006.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Digital evidence Stephen Mason, Barrister Visiting Research Fellow
Health Information Management Technology: An Applied Approach
Wyoming Statutes §§ through
Digital Evidence – Is it Admissible or Good Enough in Court?
G.D.P.R General Data Protection Regulations
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
DIGITAL LEGAL DOCUMENTS:
Presentation transcript:

The Rat Pack Dino Tsibouris (614)

Must retain copies of electronic disclosures given to consumers Electronic loans must stand up in court Authoritative copies must continuously comply with system requirements Electronic Lending Records Management

Sarbanes-Oxley is already pushing the issue The IT director will be the star witness if the loan is questioned in court Any certificates or tokens used to make the loan must be “unalterable” Electronic Lending Records Management

Digital evidence is NOT the same as evidence generated in the physical world It is ephemeral by design Incapable of true forensic examination Electronic Lending Records Management

Accuracy of a record depends on the process that produces it Your collection lawsuit may hinge upon: The basic foundational components of accuracy of the data, and The reliability of the system producing the result from the data Electronic Lending Records Management

Standard factors to admit electronic records of a student loan into court: Qualified computer operators Computer equipment is standard and competent and in good working order Reliable software program was utilized, Proper procedures to obtain input/generate output of information Equipment programmed/ operated correctly, and The exhibit is properly identified as the output in question Electronic Lending Records Management

(d) RETENTION OF CONTRACTS AND RECORDS.— (1) ACCURACY AND ACCESSIBILITY.—If a statute, regulation, or other rule of law requires that a contract or other record … be retained, that requirement is met by retaining an electronic record of the information in the contract or other record that— (A) accurately reflects the information set forth in the contract or other record; and (B) remains accessible to all persons who are entitled to access by statute, regulation, or rule of law, for the period required by such statute, regulation, or rule of law, in a form that is capable of being accurately reproduced for later reference, whether by transmission, printing, or otherwise. Electronic Lending Records Management - ESIGN

ESIGN doesn’t change the law of evidence ESIGN doesn’t change record retention requirements in other areas of the law Must save even the ESIGN consent The records must remain accessible Electronic Lending Records Management - ESIGN

Swinton v. State 847 A.2d 921 (Conn. 2004) “Indicia of Reliability” test for admissibility, distinguished between computer enhanced and computer generated images Electronic Lending Making it Enforceable

Rodd v. Raritan Assoc., 860 A.2d 1003 (N.J.Super.A.D.,2004) Adopted the concept of “reliability” from Swinton Photoshop-generated image ruled not reliable and therefore inadmissible Distinguished “enhanced” from “generated” Electronic Lending Making it Enforceable

Companies can create programs that create records that will not stand up in court Executives can alter records under their control Lawyers aren’t quite onto this yet… …but judges are. Electronic Lending Making it Enforceable

The legal “original” of information stored in a computer is the readable display of the information on the computer screen, the hard drive … as well as any printout or output that may be read, so long as it accurately reflects the data. FRCP 1001(3); WEINSTEIN at § [1][d][iv] Electronic Lending Making it Enforceable

Unauthenticated s are a form of computer generated evidence …. Given the pervasiveness today of electronically prepared and stored records … counsel must be prepared to recognize and appropriately deal with the evidentiary issues associated with the admissibility of electronically generated and stored evidence. Lorraine v. Markel American Insurance CIVIL ACTION NO. PWG Electronic Lending Making it Enforceable

In this case the failure of counsel collectively to establish the authenticity of [unauthenticated printouts] … rendered [them] inadmissible, resulting in the dismissal, without prejudice, of their cross motions for summary judgment. Lorraine v. Markel American Insurance CIVIL ACTION NO. PWG Electronic Lending Making it Enforceable

… imagine wiping out a disk drive containing an account worth $38 billion. That’s what happened to a computer technician reformatting a disk drive at the Alaska Department of Revenue. While doing routine maintenance work, the technician accidentally deleted applicant information for an oil-funded account … and mistakenly reformatted the backup drive, as well. There was still hope, until the department discovered its third line of defense, backup tapes, were unreadable.

ESIGN and UETA permit delivery of electronic loan disclosures and records The rules of evidence do also The systems that create the process and the databases containing the information must be reliable, accurate and secure or it affects the loan itself! Electronic Lending Summary

QUESTIONS?