<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; discovery</title>
	<atom:link href="https://privacyriskreport.com/tag/discovery/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation</title>
		<link>https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation</link>
		<comments>https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/#comments</comments>
		<pubDate>Fri, 22 Feb 2019 16:27:37 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[discovery]]></category>
		<category><![CDATA[District Court for Oregon]]></category>
		<category><![CDATA[litigation]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1777</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/' data-emailit-title='Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Data breach litigation inherently involves a significant amount of information, so it is no surprise to see discovery issues in breach cases. The typical data breach lawsuit may include discovery requests for pre-breach information (response plans, audits), response information (notification... <a class="more-link" href="https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/' data-emailit-title='Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/">Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/' data-emailit-title='Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><iframe width="676" height="380" src="https://www.youtube.com/embed/F20pPa2NhBc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p style="text-align: left;">Data breach litigation inherently involves a significant amount of information, so it is no surprise to see discovery issues in breach cases. The typical data breach lawsuit may include discovery requests for pre-breach information (response plans, audits), response information (notification letters and phone scripts) and post breach information (remediation and vendor information).  Suffice it to say, there is ripe opportunity for discovery disputes with this amount of information needing to be exchanged between the parties.</p>
<p>The Blue Cross breach, or Premera breach, occurred in 2015 and involved the unauthorized disclosure of confidential information of approximately 11 million current and former members, affiliated members, and employees of Premera. The compromised data included members’ personal, medical and financial information. The breach on Premera’s computer network was publicly disclosed on March 17, 2015. A class action lawsuit was filed in the District Court for Oregon based on claims that the breach began in May of 2014 and went without detection for nearly a year.   <em>In Re: Premera Blue Cross Customer Data Security Breach Litigation</em>, 2019 WL 464963 (D. Ct. Or. Feb. 6, 2019), the District Court for Oregon addressed motions to compel discovery or documents and other information filed by the class action plaintiffs and Premera.</p>
<p>First, the District Court addressed the class action plaintiffs’ motion seeking the production of documents withheld by Premera based on the attorney-client privilege and the attorney work-product doctrine. The District Court provided the following analysis which can provide insight to data collectors:</p>
<ul>
<li><em>Email Communications</em>: Based on the large body of law concerning attorney-client privilege, the District Court held only emails from Premera’s attorneys containing legal advice were protected.  Emails “containing merely a factual discussion” would not be protected.</li>
</ul>
<ul>
<li><em>Draft Documents</em>: The District Court found documents prepared by attorneys, at the request of attorneys or sent to attorneys would most-likely be protected from discovery.  The District Court specifically noted that drafts of breach notification letters or press releases about the breach may not be protected if the documents are merely sent to the attorney to be included in the attorney’s file and do not solicit legal advice.</li>
</ul>
<ul>
<li><em>Documents Related to Press Releases, Notices and Remediation</em>: Once again, in reviewing the various documents discussing the breach, the District Court relies on the fundamental rule that protected communication must provide or solicit legal advice.  All communication simply discussing articles in the press may be discoverable unless the discussion “involves seeking advice about how that particular article might affect Premera or litigation, or how from a legal perspective Premera should comment on the article…”</li>
</ul>
<p>Likewise, the District Court held drafts of scripts to be used to discuss the breach with members or FAQ documents would be protected as long as legal advice is being provided or sought.  Additionally, scripts were found to be protected to the extent they are prepared “in anticipation of litigation.”  That is, the District Court noted that Premera would not have taken the time to prepare scripts unless they anticipated litigation or regulatory inquiries.  Therefore, while the drafts of scripts were prepared by counsel, the “actual final scripts” were not protected.</p>
<p>Plaintiffs argued documents related to remediation are considered a business function and, therefore, would not be protected.  The District Court found all documents provided by vendors that contain or solicit legal advice are protected.  However, in a discussion concerning “attachments provided to counsel that were prepared by third-party vendors,” the District Court noted that “third parties performing general remediation efforts, even if hired by counsel, are performing a business function.”  Therefore, a vendor’s report by itself may not be protected if it is found to not provide “factual information to counsel so that counsel can provide sound and informed legal advice or have been sent to the attorney requesting the attorney’s legal advice and input.”</p>
<ul>
<li><em>Business and Technical Documents</em>: Obviously, a substantial amount of technical data would be expected with a breach of this size.  The District Court found information related to Premera’s audits, investigations and their security may be discoverable because “[a]s a business, Premera needs periodically to audit its information technology and security and training.”  And, audits would have been done regardless of the breach.  Therefore, information concerning these activities may be discovery to the extent they have a business purpose more than a legal purpose.”   The District Court further noted that this information may be discoverable even if legal counsel relies on the information while formulating their advice since “[t]hese audits…are normal business functions performed on a regular basis, to enable Premera to assess the state of its technology and security.”  The District Court also found the information related to the investigation of the cause of this breach or into the corporation’s “physical security” was discoverable since Premera needed to conduct the investigation as a business anyway.  A document drafted by counsel using this data would be protected.</li>
</ul>
<p>Importantly, the District Court found information related to “Premera’s response to the breach” would not be discoverable since it “was likely affected by the anticipation of litigation and regulatory inquiries.”  The District Court summarizes its ruling that documents related to the response to the breach may not be discoverable as: “Other than the initial business steps of remediation, notifying customers, and making public statements, which Premera would have had to do regardless, the later actions by Premera were likely guided by advice of counsel and concerns about potential liability.”</p>
<ul>
<li><em>Documents Disclosed to Third Parties</em>. The District Court held that documents turned over to third-party vendors, including Mandiant, may not be discoverable.  These documents remain privileged as long as “an attorney is being asked to give legal advice about something to a third-party vendor is working on does not extinguish the attorney-client protection.”</li>
</ul>
<p>Premera’s motion was far less complicated and merely sought an Order requiring the Plaintiffs produce their computers or other devices in order to investigate the “actual causal link between the Defendant data breach and their alleged harm.”  Specifically, Premera wanted to confirm each class action plaintiff could establish they suffered harm from Premera’s breach.  Premera claims plaintiffs cannot establish this causal link if their devices have “malware or evidence of other intrusions” unrelated to this breach.  Premara provided the following example of the information it needs to collect:</p>
<p><em>“…Plaintiff Mr. Chistopherson’s testimony that his bank account information was obtained by ‘scammers’ and that Premera is entitled to Mr. Christopherson’s Device ‘in order to determine precisely what the scammers took from Mr. Christopherson and whether such evidence disrupts the causal link that Plaintiffs allege exists between the Defendant breach and the alleged harm to Mr. Christopherson.’”</em></p>
<p>However, the District Court rejected this argument since “Plaintiffs are not alleging any identity theft-related injuries or seeking such damages.”  Therefore, the causal link is irrelevant to the damages sought by Plaintiffs.</p>
<p>Data breach litigation has always posed unique issues to the extent that data collectors must prepare for an incident but there was always questions as to whether those preparation documents could be used against them by plaintiffs in a data breach case.  For example, many data collectors struggle with whether breach response plans will be discoverable and used against them after a breach.  While the <em>Premera </em>Court does not directly address documents generated before the incident, the case makes clear that documents providing or soliciting legal advice have the best chance of being protected from discovery.  Consequently, if there were not enough reasons already to retain counsel for cyber security, data collectors must consider that operating without counsel may generate documents that will not be privileged.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/' data-emailit-title='Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/">Premera Breach Shows What Happens When Litigants Cross Each Other by Trying to Shield Documents from Discovery in Breach Litigation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/premera-breach-shows-what-happens-when-litigants-cross-each-other-by-trying-to-shield-documents-from-discovery-in-breach-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Emerging Privacy Issues In Discovery Of Social Media</title>
		<link>https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=emerging-privacy-issues-in-discovery-of-social-media</link>
		<comments>https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/#comments</comments>
		<pubDate>Wed, 01 Mar 2017 22:33:25 +0000</pubDate>
		<dc:creator><![CDATA[Tressler LLP]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[discovery]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[medical information]]></category>
		<category><![CDATA[social media]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1123</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/' data-emailit-title='Emerging Privacy Issues In Discovery Of Social Media'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>By Danita L. Davis Sudac Individuals’ willingness to share detailed accounts of their lives on social media sites, such as Facebook, has created an unparalleled source of evidence for lawyers seeking discovery.   There is little question that social media evidence... <a class="more-link" href="https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/' data-emailit-title='Emerging Privacy Issues In Discovery Of Social Media'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/">Emerging Privacy Issues In Discovery Of Social Media</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/' data-emailit-title='Emerging Privacy Issues In Discovery Of Social Media'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><em>By Danita L. Davis Sudac</em></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">Individuals’ willingness to share detailed accounts of their lives on social media sites, such as Facebook, has created an unparalleled source of evidence for lawyers seeking discovery.   There is little question that social media evidence can be helpful in the areas of civil litigation.  For example, it can be used to discredit a litigant or contradict allegations of damages. Recently, in the high profile matter of <i>Brown v. City of Ferguson</i></span><span style="color: #000000;">, 15-cv-831, (E.D. Mo., E Div. Jan. 27, 2017), U.S. District Judge E. Richard Webber ordered that the family of Michael J. Brown, Jr., the unarmed black teenager killed in 2014 by police in Ferguson, must disclose all relevant Facebook posts in their wrongful death action against the city.   The court disagreed with Brown’s family members’ claims that they had a right to privacy for notes sent through Facebook Messenger.  The court likened Messenger to a “personal diary” which the court found must be disclosed if it has entries relevant to a case.  The court reasoned that the social media posts would show the family members’ relationships with Brown, which will help calculate pain, suffering and psychological damages, as well as provide evidence that could be used by the City and other Defendants to impeach or show bias.  In addressing concerns as to overbreadth and relevance, the court noted that the disclosure was limited in time and the entry of a protective order would safeguard any remaining privacy concerns.  </span></span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">In cases where the production of social media information is challenged, most courts note that discovery of such information is governed by the same legal principles that guide more traditional forms of discovery.   As one New York Superior Court opinion recognized, “fishing expeditions” of social media accounts are just as objectionable as their “analog  antecedents.”   <i>Winchell v. Lopiccolo,</i></span><span style="color: #000000;"> 954 N.Y.S.2d 421 (2012).  Relevance is still a perquisite before broad social media discovery is allowed.  Once relevance is established, however, the  traditional rules of civil procedure generally apply.</span></span></p>
<p><span style="color: #000000; font-family: Calibri;">Despite the fact that social media users may try to self-regulate their privacy settings to restrict public disclosure, in the litigation context, these posts may be deemed relevant and discoverable regardless of the users’ privacy intentions.  Further, when seeking social media discovery, attorneys should also think twice about “friending” a represented adverse policy. Such activity likely violates  the Rules of Professional Conduct which addresses communications with represented parties.  As it pertains to their own clients, attorneys must also be aware of issues related to the preservation of social media evidence.   Once involved in a lawsuit, a litigant cannot delete relevant social media evidence at issue in the litigation.</span></p>
<p><span style="color: #000000; font-family: Calibri;">In sum, as social media continues to be a popular and accessible mode of communication, discovery of social media information will become more prominent. Attorneys and their insurer clients should familiarize themselves with rules and recent decisions regarding the production of social media information as  issues surrounding such discovery will  likely be the subject of objection and motion practice. </span></p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/' data-emailit-title='Emerging Privacy Issues In Discovery Of Social Media'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/">Emerging Privacy Issues In Discovery Of Social Media</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/emerging-privacy-issues-in-discovery-of-social-media/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
