Category Archives: Security

Cloud E-Discovery

Interesting thoughts on the cloud from a blog on e-discovery by the authors of specialized software for e-discovery.

The key phrase “possession, custody or control” is something to be examined more closely in the context of Cloud Computing environments, where typically the cloud customer is the party in control and the cloud service provider is the party in possession and custody. In cases where the cloud customer is the party in litigation, it is natural to serve pre-trial a discovery request under Rule 26 (b) to the cloud customer and expect that since they are the party in control, and can therefore instruct the cloud provider to perform at least some form of collections. Now the question that remains is whether the same request can be made of the cloud provider, since they are the party in possession and/or custody. It is evident that requesting the cloud provider to perform a discovery request on behalf of their customers is impractical since any assertion of privilege or confidentiality would require the cloud customer to be involved in the discovery request. Besides, the cloud provider producing documents without consent from the customer of the cloud would run afoul of the Stored Communications Act (SCA). For these reasons, the broader three-pronged test of “possession, custody or control” embodied in Rule 34 (a)(1) should be revised to mean only “party in control”.

That says to me that discovery should no longer hinge on where data resides; the only test would be access to the data. This argument is said to be based on a notion of cloud provider possession and custody but delegation of control to a customer.

Their blog explains that removing a possession and custody test removes the chance a client will try to waive an obligation for e-discovery in the cloud. It also removes the obligation of a cloud provider to respond to e-discovery if they have only possession or custody.

Two things come to mind from this. First, it supposes that e-discovery is easier with a client than a provider — a provider may have no knowledge of what data constitutes a business record subject to discovery. A provider that turns over a cloud environment can easily over-deliver and provide more data than required. Second, it supposes that a client can know the inner workings of a provider well enough to understand archives and residue of their data.

These two points are counter to each other. Only the provider knows where data goes, but only the customer knows what data is relevant. Without the first half there is a real possibility that data will exist and never be found by a client during e-discovery. This is not far from pre-cloud environments where an IT department would not be involved in discovery. A legal department might install a tool to answer discovery requests, which technically would not address the residue policies and procedures known by IT.

Take email, for example. A company policy could say that local mailboxes are prohibited. A central mail server would have a master repository of messages, as is usually the policy set forth by legal. However users might still have a regular habit of archiving local copies, as is usually the behavior in response to policies set forth by legal. The non-IT manager of a centralized mailbox — client in control — would likely respond to discovery with an incomplete set of data while the IT managers — provider in possession or custody — would be more likely to provide a more complete picture of the mail ecosystem and include localized backups and copies of deleted messages.

A lack of obligation on the provider will mean a lack of pressure for the technical tools and techniques to serve a technology shift in discovery. A customer is unlikely to push for this capability, or even realize the capability exists. Thus possession and custody tests still seem relevant to me.

Ok, three things come to mind. A company that sells e-discovery software might not want possession and control to be part of the definition in a cloud environment because it may challenge their current software capabilities. The cloud provider could introduce technical issues (e.g. VM volume residue) that current e-discovery software may be unable to accomodate.

DR Prose: The San Bruno Blast

Let’s call it a N.E.W. day
by Doc Gurley

Imagine the entire chain of human activity. The firefighters who drove straight toward the blaze, even as the tower rose higher and higher to engulf the very sky, knowing this was something no one with a hose and a truck could stop or even contain. The sweat and the sizzle as you run from one paint-bubbling house to the next, imagining the screams of children as you knock and yell and draw an X on one house, only to sprint, heart pounding, to the next. Flames flicker and lick and you think, “God, let the other rigs come.” And then they do – rigs from other counties, people who were supposed to be sitting down to supper, firefighters who’ve never even driven these streets. Sixty-seven trucks came. Just think about that for a moment. No ego, no jurisdictional posturing, no hemming and hawing about budgets or how the assignment ought go to someone else, someone closer. All those teams, all those men and women, strapping on heavy gloves and helmets and feeling the claustrophobia and vertigo of wind whipping past as you accelerate onto a freeway in an open firetruck, the straining rumble of the screaming RPMs making your stomach shake. Then you hit the ground and ask, “what can I do?” and you join in, the sprint, the yell, the heavy lifting and the search, the endless search even now, the day after, through embers, dreading what you might find, what will give you nightmares for decades to come. And when you get home, and wipe the ash from your neck, you cough up soot and look at it, hoping your lungs are tougher than average because you’ve been in this, you’ll stay in this, for the long haul.

Belgian Guards Force Female Lawyers to Remove Bras

The Telegraph reports the Hasselt jail is using the security scan as an excuse to get women to remove their bras

Joseph Rowies, a representative of criminal barristers in the Flemish city, stressed that while women lawyers have no problem with the security checks they had spotted that the prettier the visitor, the more sensitive the scanner became.

Rowies points out that even with a high volume of complaints the jail management uses security as a defensive method to stall any investigation.

Mr Rowies has told the prison authorities that he is receiving at least one complaint a month from furious female barristers. “It always strikes me that the younger, and the more babe-like, a lawyer is, the more difficult the device becomes,” he said.

“I’ve suggested that the prison guards to wear name tags so we can verify if it is always the same officers. But the management has refused for security reasons.”

Babe-like? Why not just describe and pinpoint the offending guards the same way — how they look? The situation does raise the inevitable question about trustworthiness of a security control. Perhaps Rowies could also ask that the scanners be randomly audited by a standard calibration.