Cloud Computing and Electronic Discovery - James P. Martin - E-Book

Cloud Computing and Electronic Discovery E-Book

James P. Martin

0,0
28,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Explore the frontier of electronic discovery in the cloud Cloud Computing and Electronic Discovery comprehensively covers the quickly-evolving realm of eDiscovery in cloud computing environments, a computing and legal frontier in which the rules and legal precedents are being developed anew seemingly by the day. The book delves into this fascinating and rapidly-developing topic to prepare fraud investigators, legal professionals, forensic accountants, and executives understand the ramifications of storing data with third party providers and how such storage mechanisms relate to the limits of discovery practices. This up-to-date resource also includes a complete discussion of the few existing legal precedents and current cases that are shaping interpretation of discovery laws in the cloud space, a perfect overview for executives storing their companies' data in the cloud and the legal professionals tasked with understanding and interpreting the discovery rules surrounding that data. The book is comprehensive in scope and includes: * An overview of current trends in cloud computing, including potential information that should be considered in an investigation that involves data held by a cloud service provider * Updates on current and proposed laws governing discovery of information held by a third party cloud service provider * Updates on legal cases that address the issues of the Electronic Communication Privacy Act, the Federal law prohibiting release of information by a third party provider * Practical guidance on how to consider the availability of cloud data relevant to an investigation, and how to include this data in discovery plans For business, accounting, and legal professionals, Cloud Computing and Electronic Discovery is an invaluable resource for understanding the nuanced development of cloud eDiscovery policies, practices, and law as they continue to unfold and develop.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 382

Veröffentlichungsjahr: 2014

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



The Wiley CIO series provides information, tools, and insights to IT executives and managers. The products in this series cover a wide range of topics that supply strategic and implementation guidance on the latest technology trends, leadership, and emerging best practices.

Titles in the Wiley CIO series include:

The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT by

Jason Bloomberg

Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)

by Michael Kavis

Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's Businesses

by Michael Minelli, Michele Chambers, and Ambiga Dhiraj

The Chief Information Officer's Body of Knowledge: People, Process, and Technology

by Dean Lane

Confessions of a Successful CIO: How the Best CIOs Tackle Their Toughest Business Challenges

by Dan Roberts and Brian Watson

CIO Best Practices: Enabling Strategic Value with Information Technology (Second Edition)

by Joe Stenzel, Randy Betancourt, Gary Cokins, Alyssa Farrell, Bill Flemming, Michael H. Hugos, Jonathan Hujsak, and Karl Schubert

The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver Value

by Nicholas R. Colisto

Decoding the IT Value Problem: An Executive Guide for Achieving Optimal ROI on Critical IT Investments

by Gregory J. Fell

Enterprise Performance Management Done Right: An Operating System for Your Organization

by Ron Dimon

Information Governance: Concepts, Strategies and Best Practices

by Robert F. Smallwood

IT Leadership Manual: Roadmap to Becoming a Trusted Business Partner

by Alan R. Guibord

Leading the Epic Revolution: How CIOs Drive Innovation and Create Value Across the Enterprise

by Hunter Muller

Managing Electronic Records: Methods, Best Practices, and Technologies

by Robert F. Smallwood

On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise

by Hunter Muller

Straight to the Top: CIO Leadership in a Mobile, Social, and Cloud-Based World (Second Edition)

by Gregory S. Smith

Strategic IT: Best Practices for Managers and Executives

by Arthur M. Langer and Lyle Yorks

Trust and Partnership: Strategic IT Management for Turbulent Times

by Robert Benson, Piet Ribbers, and Ronald Billstein

Transforming IT Culture: How to Use Social Intelligence, Human Factors, and Collaboration to Create an IT Department That Outperforms

by Frank Wander

Unleashing the Power of IT: Bringing People, Business, and Technology Together (Second Edition)

by Dan Roberts

The U.S. Technology Skills Gap: What Every Technology Executive Must Know to Save America's Future

by Gary J. Beach

Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Asia, and Australia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers' professional and personal knowledge and understanding.

CLOUD COMPUTING AND ELECTRONIC DISCOVERY

James P. Martin

Harry Cendrowski

Cover image: © istock/polygraphus Cover design: Wiley

Copyright © 2014 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Cataloging-in-Publication Data:Martin, James P., author.     Cloud computing and electronic discovery/James P. Martin, Harry Cendrowski.        pages cm     Includes bibliographical references and index.     ISBN 978-1-118-76430-5 (cloth); ISBN 978-1-118-94745-6 (ebk); ISBN 978-1-118-94744-9 (ebk) 1. Cloud computing—Law and legislation—United States. 2. Electronic discovery (Law)—United States. 3. Privacy, Right of—United States. 4. United States. Electronic Communications Privacy Act of 1986. I. Cendrowski, Harry, author. II. Title.     KF390.5.C6M365 2014     347.73′72—dc23

2014013668

CONTENTS

PREFACE

Notes

ACKNOWLEDGMENTS

SECTION ONE Cloud Computing: Basics of Technologies and Applications

CHAPTER 1 Cloud Computing Definitions and Technical Considerations

IaaS

PaaS

SaaS

Considerations for Discovery

Data Transfer Regulations

Notes

CHAPTER 2 The Proliferation of Data Available for Discovery

An Example of Third-Party Data: Google Search Engine

Consideration of Data Points in Discovery

Creating an eDiscovery Plan in a Cloud-Based World

Production of Cloud Data

Notes

CHAPTER 3 Cloud Migration and Planning for Retention

Data Retention and the Cloud

Considerations for Litigation

Notes

SECTION TWO Current Laws Affecting Discovery

CHAPTER 4 Brief History of Privacy and Selected Electronic Surveillance Laws

Communications Act of 1934

Title III—Omnibus Crime Control and Safe Streets Act, 1968

Advancements in Telephone System Technologies

Electronic Communications Privacy Act of 1986

Notes

CHAPTER 5 Electronic Communications Privacy Act

Title II—The Stored Communications Act

§2703—Required Disclosure of Customer Communication or Records

Backup Provisions

Electronic Storage and the Ninth Circuit

Pen Registers and Trap and Trace Devices

Production Demands and the ECPA

Notes

CHAPTER 6 Proposed Legislative Changes and Future Laws

Points for Improvement

Congressional Action

Notes

CHAPTER 7 The Control Concept and Related Issues

The Application of Rule 34(a)

Rule 34(a) in Litigation

Flagg—A Modern Day Approach

Notes

CHAPTER 8 Current Issues in Cloud Data

Cell Tower Data and Location Information

StingRay and Location Monitoring

BYOD Policies and Data Ownership

Notes

CHAPTER 9 The Rise of Social Media and Its Role in Litigation

Roots of Social Media

Why, How, and When to Access Data on Social Media in Litigation

Obligations to Preserve Evidence

Accessing Social Media

Using Social Media in Litigation

Notes

SECTION THREE Relevant Cases

CHAPTER 10 Modern Case Analysis Shaping Litigation

O’Grady v. Superior Court

, 139 Cal.App.4th 1423 (2006)

Krinsky v. Doe 6

, 72 Cal.Rptr.3d 231 (2008)

Flagg v. City of Detroit,

252 F.R.D. 346 (E.D. Mich 2008)

Warshak v. United States,

631 F.3d 266 (6th Circ. 2010)

Ehling v. Monmouth-Ocean Hospital

, 872 F.Supp.2d 369 (D.N.J. 2012)

Juror Number One v. California

, 206 Cal.App. 4th 854 (2012)

Summary of Cases

Notes

CHAPTER 11 Cloud Computing and Reasonable Expectations of Privacy: Fourth Amendment Concerns

Ex Parte Jackson

, 96 U.S. 727 (1877)

Olmstead v. United States

, 277 U.S. 438 (1928)

Katz v. United States

, 88 S.Ct. 507 (1967)

United States v. Miller

, 425 U.S. 435 (1976)

United States v. Jacobsen

, 466 U.S. 109 (1984)

United States v. Jones

, 132 S.Ct. 945 (2012)

Summary of Cases

Notes

CHAPTER 12 Compelled Production of Cloud Computing Data: Fifth Amendment Concerns

United States v. Doe

, 465 U.S. 605 (1984)

Doe v. United States

, 487 U.S. 201 (1988)

United States v. Hubbell

, 530 U.S. 27 (2000)

In re Boucher

, 2009 WL 424718 (D. Vt. 2009)

In re Grand Jury Subpoena Duces Tecum, March

25, 2011, 670 F.3d 1335 (11th Circ. 2011)

Notes

ABOUT THE CONTRIBUTORS

ABOUT THE AUTHORS

ABOUT THE COMPANION WEB SITE

INDEX

END USER LICENSE AGREEMENT

List of Tables

Chapter 10

Table 10.1

Chapter 11

Table 11.1

Guide

Cover

Table of Contents

Preface

Pages

xi

xii

xiii

1

3

4

5

6

7

8

9

10

11

12

13

14

15

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

91

92

93

94

95

96

97

98

99

100

101

102

103

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

131

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

171

172

173

174

175

176

177

178

179

180

181

182

183

185

186

187

188

189

191

192

193

194

PREFACE

In general, cloud computing describes technologies that allow applications and data to be hosted on a computer external to a business’s own computing resources and firewall (i.e. a “remote computer”). From a personal perspective, it means that an individual can have access to convenient solutions for little or no cost, for example, to host family photos or videos. One of the promises of cloud computing is the end user doesn’t really need to know how it works, or where the data resides; it just works, and will be available when you need it, wherever you need it. This promise has also resulted in profound misunderstandings of what cloud computing actually involves, and what it means from a litigation perspective.

Cloud computing services provide computing resources on an as-needed basis; this is why cloud computing was sometimes referred to as utility computing, a term that certainly did not have the marketing cachet of cloud computing. Cloud computing solutions generally require a reasonable periodic service fee and little additional hardware cost to access a computing solution. The reduction of costly IT assets, avoidance of software license costs, and removal of software maintenance tasks provide an attractive economic model; the end user is given a turnkey solution supported and maintained by the service provider, and hosted at a remote location. Cloud computing is enabled by rapid, reliable Internet and mobile data communications, which means that applications and data are available “everywhere,” simultaneously, and transparently. The convenience and financial benefits of cloud solutions are changing business models fundamentally and have resulted in mass migration of data to the cloud. Much of this data, of course, would be of interest to parties during criminal proceedings or civil litigation.

A key issue from a legal perspective is that an investigator or litigant cannot access data held in the cloud through traditional discovery techniques. Discovery of data within a cloud computing solution likely falls under the restrictions of the Electronic Communications Privacy Act of 1986 (ECPA), 1 and specifically, Title II of the ECPA, which is called the Stored Communications Act (SCA).2 Under the SCA, third parties that provide communication services or remote computing services to the public are generally prohibited from releasing the data; the SCA defines a series of procedures for the government to access the data. This law, now almost 30 years old, is the primary law that regulates disclosure of such data. It was written at a time when telephones actually rang, when e-mail was considered a novel new technology for computer geeks, and when conversations on portable phones could be intercepted with a standard FM radio. Today, judges use this law to rule on cases involving data created and stored by devices that would have been considered magic (or certainly at least in the realm of science fiction) in 1986.

This book is our attempt to briefly explain the way that data held by a third-party provider (i.e., in a cloud computing solution) potentially affects legal proceedings and discovery of electronic information. This work is divided into three topical sections:

Section One explains the basics of cloud computing technologies, how data is stored, and (at a high level) the technical aspects of hosted solutions that can affect production of data. This is intended to be a technical guide for non-technicians, offering a brief glimpse behind the technological curtain.

Section Two describes the SCA as well as the prior laws that protected technological communications of the day. This will hopefully provide the reader with insights into legal concepts that still shape cases today, and the common themes of privacy issues. We also describe some of the limitations of the current laws in interpreting modern systems and devices.

Section Three surveys many of the precedent-setting cases involving interpretation of hosted data and access of such data by litigants or the government. Many of these cases are still active and may be modified on appeal. Rapid technological advancements mean that issues may arise that have not been previously considered by the courts in the current context, and interpretation in those situations can widely vary.

The issues presented here often walk hand-in-hand with privacy issues. However, we limit this discussion primarily to litigation settings. Recent revelations of widespread government surveillance programs are well beyond the scope of this work. We sincerely hope this book provides practical insight into the current world of hosted data and its potential impact on legal proceedings, and wish you the best as you encounter these issues in the future.

James P. Martin Harry Cendrowski May 2014

Notes

1

. 18 U.S.C. §§2510–2522.

2

. 18 U.S.C. §§2701–2712, although the term “Stored Communications Act” does not appear anywhere within the body of the legislation.

ACKNOWLEDGMENTS

We are sincerely grateful to many individuals for their unique contributions to this book as well as their steadfast support and encouragement. First and foremost, we would like to thank the Wiley team, including John DeRemigis, Sheck Cho, Stacey Rivera, and the staff at John Wiley & Sons for their assistance and support during the development and writing process.

We would also like to thank all the contributing authors and advisors to the process, without whom the production of this book would not have been possible:

Matthew P. Breuer

Deirdre Fox

Virginia Kim

Sarah Marmor

Christopher Thieda

Their professional insights and advice were instrumental in the production of this work, and their dedication and commitment are sincerely appreciated. Thank you also to the countless individuals who provided perspectives on the use of emerging technologies, expectations of privacy, and the proliferation of smart devices.

SECTION ONECloud Computing: Basics of Technologies and Applications

CHAPTER 1Cloud Computing Definitions and Technical Considerations

Thieda Christopher

The introduction of cloud computing has taken technology users by the hand and brought them into a new realm of possibilities. Whether the purpose is for personal, corporate use, or anything in between, today’s everyday tech users have been exposed to a multitude of cloud practicalities. Cloud computing applications allow computer users to conveniently rent access to fully featured applications, to software development and deployment environments, and to computing infrastructure assets such as network-accessible data storage and processing. Those that have exposure to common applications such as Google Apps or Microsoft Office 365 likely already have experience with cloud computing, even though they may not have realized it.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!