Join us for a half day of updates, best practices and networking on eDiscovery and Cybersecurity & Privacy. The symposium will conclude with cocktails, hors d’oeuvres and networking.
12:30 – 1:00 p.m. Registration
1:00 – 2:30 p.m. General Session – CCPA
2:30 – 2:45 p.m. Break
2:45 – 3:30 p.m. 1st
3:30 – 3:45 p.m. Break
3:45 – 4:30 p.m. 2nd
4:30 – 6:00 p.m. Cocktail Reception
General Session: Complying with the CCPA
The California Consumer Privacy Act (CCPA) will go into effect next year, and will provide California residents rights over their data similar to those found in the EU’s General Data Protection Regulation. The law may even apply to companies without a physical presence in California. We’ll walk through a number of case studies to identify when and how the law may apply to organizations that collect data about California residents, and the operational and contractual implications associated with compliance.
1st Breakout Sessions
Cybersecurity & Privacy: Lessons Learned from Data Breaches
Data breaches continue to plague many companies. However, with each new breach, we are able to gain valuable information about what companies could have done better. In this session, we’ll look at recent data breaches and examine whether companies could have done anything differently to avoid the data breach and protect themselves from legal liability.
eDiscovery: Michigan’s New Discovery Rules
The most significant changes over the last 35 years are coming to Michigan’s Civil Discovery Rules. Barring unforeseen action prior to adoption, these changes will address the scope of discovery, sanctions for spoliation, ESI conferences, plans and orders, mediation of discovery disputes via appointment of ESI experts, and technical competence of attorneys required to participate in ESI conferences. In this session, we’ll look at all of these impending changes and discuss their likely impact on civil discovery, especially as they concern ESI.
2nd Breakout Sessions
Cybersecurity & Privacy: Responding to a Data Breach
While your organization may have a plan in place for how to respond to a data breach, many questions arise once the plan is put to the test. For example, did a breach actually occur? Should you first hire a forensic company or engage outside legal counsel? Who needs to be notified of the breach, and are credit-monitoring services required? We’ll discuss best practices for responding to a data breach, including actions that must be taken immediately after a breach, the growing number of laws that may be triggered by the breach, and the right questions to ask to comprehend the full scope of your post-breach obligations.
eDiscovery Panel: Strategies for Avoiding Common eDiscovery Mistakes
CEDS, VP of
Most states have adopted rules regarding eDiscovery since the first eDiscovery amendments were adopted under the Federal Rules of Civil Procedure. Since then, literally thousands of court opinions have been issued interpreting these rules, providing dos and don’ts of preserving, collecting and producing ESI in litigation. Despite the familiarity of the rules and the guidance of the courts, the same mistakes are repeated in practice; mistakes that result in costly monetary and case-dispositive sanctions. In this session, our panel will discuss some common eDiscovery mistakes and how to avoid them.
Questions: Contact Lori Tuttle Measure at firstname.lastname@example.org