Tag Archives: Data

New CLE Course on Avoiding and Obtaining Discovery Sanctions When Dealing with ESI

You’re involved in international litigation representing a local company that sold high tech electronic equipment to an English firm. As soon as discovery starts, the English company claims that four key employees no longer work at the company and they can’t locate their smartphones, laptops and other company devices. With the help of your expert, you eventually realize that all four people are still employed at the company and you get a termination order from the judge due to their dishonesty.

ESI – Discovery & Sanctions

Julie Thorpe-Lopez was not an expert on eDiscovery when the case began – and she wasn’t an expert when it finished either. But she was savvy enough to “know what she didn’t know.” With the help of eDiscovery expert Ryan Maxwell, she was able to leverage an incredibly favorable outcome for client in what looked like a losing case.

In this CLE course, Julie Lopez and Ryan Maxwell will detail how to obtain ESI in eDiscovery and how to avoid sanctions when producing ESI. Julie and Ryan will mainly discuss the attorney’s duty to preserve ESI, ESI best practices and sanctions for failing to properly handle electronically stored information. To access this course please click here: ESI Basics: Avoiding and Obtaining Discovery Sanctions.

Julie and Ryan will also discuss:

  • Scoping
  • Documentation
  • Defensible collection
  • Potential testimony
  • The Electronic Discovery Reference Model (EDRM)
  • Questionnaires/interviews
  • Data sources
  • Metadata
  • File systems
  • Defensible discovery
  • Motions to compel
  • Motions for sanctions
  • Using a discovery referee
  • Hiding electronic evidence

Julie Thorpe-Lopez is a Partner with Tatro & Lopez, LLP, and mainly represents clients who’ve suffered personal injury as a result of motor vehicle collisions, elder abuse and medical malpractice. Ryan Maxwell directs Epiq’s team of computer forensics analysts in southern California and manages the purpose-built computer forensics laboratory which he designed and established.

This CLE course is offered in the following states:

  • Alaska (AK)
  • Arizona (AZ)
  • California (CA)
  • Connecticut (CT)
  • District of Columbia (DC)
  • Illinois (IL)
  • Maryland (MD)
  • Massachusetts (MA)
  • Michigan (MI)
  • Missouri (MO)
  • New Hampshire (NH)
  • New Jersey (NJ)
  • New York (NY)
  • North Dakota (ND)
  • Pennsylvania (PA)
  • South Dakota (SD)

Attorney Credits offers CLE for attorneys in California and around the country. For more information about CLE in California please click the following link: CA CLE.

Tagged , , , , , , , , , , , , , , , ,

Data Security for Attorneys and Law Firms

On the morning of June 27th,  DLA attorneys and employees walking into work at the DC offices were greeted with a peculiar message written on a whiteboard in the lobby. The message warned all employees not to turn on their computers and to remove all laptops from docking stations and to keep the devices turned them off. The global law firm that touts their cybersecurity compliance practice had been hit with a ransomware attack.

Duty of Technological Competence

With so much valuable client and case information now stored electronically, attorneys firms must proactively approach data security in their everyday practice.

If it can happen at a mega firm like DLA Piper, it can definitely happen at your firm. Deena Mayne and James Mal will teach you the best practices for data safety so you can secure your confidential client and case information. Deena and James will mainly address the following topics: the trend for lawyers to become technologically competent, data security & protection for attorneys & law firms, computer security for attorneys and key steps lawyers can take to secure their computers & networks. To access the course please click here: Data Security and Your Law Practice.

Additional topics discussed include:

  • The ABA & the Duty of Technological Competence
  • What clients expect
  • ISAO (Information Sharing and Analysis Organization)
  • How your data is vulnerable
  • The cloud security alliance
  • System passwords
  • Network vulnerabilities
  • Using a firewall
  • Social awareness
  • Backups
  • Encryption
  • Retention policies
  • Sending unencrypted emails

James Mal is a computer and network security expert. He works with business around the country to protect and recover their invaluable data. Deena Mayne is a WordPress web designer, developer and consultant who believes in keeping things as simple, direct and effective as possible.

This CLE course is offered in the following states:

  • Alaska (AK)
  • Arizona (AZ)
  • California (CA)
  • Connecticut (CT)
  • District of Columbia (DC)
  • Illinois (IL)
  • Maryland (MD)
  • Massachusetts (MA)
  • Michigan (MI)
  • Missouri (MO)
  • New Hampshire (NH)
  • New Jersey (NJ)
  • New York (NY)
  • North Dakota (ND)
  • Pennsylvania (PA)
  • South Dakota (SD)

Attorney Credits offers CLE for attorneys in Illinois and around the country. For more information about CLE in Illinois please click the following link: IL CLE.

Tagged , , , , , , , , , , , ,