lucky draw

11th June 2014
18.00pm - 20.00pm
Welcoming Cocktail - The PuLi Hotel and Spa

12th June 2014
9.00am - 17.30pm
Swissôtel Grand Shanghai


China - US Legal Big Data

The emergence of the ‘Legal Big Data’ means that businesses now expect greater understanding from the consolidation of all of those sources of ESI including when responding to a dispute, investigation or regulatory review.

This session, a line-up of panellist will walk you through the process of legal hold management, the EDRM Process and why Big Data’s could be a problem for Intellectual property litigation

  • Collecting Evidence from China in US-Based Litigation
  • Collecting Digital information in China or US 
  • Examining China and the United States legal discovery, and Procedure
  • Preparation for US-China Litigation

Kate Chan, Regional Managing Director Legal Technologies, Asia Pacific, Kroll Ontrack
Dr. Michael Tan (CHEN Zhenfu), Senior Counsel, Taylor Wessing


Behind the firewall

In today’s regulatory environment companies in China are dealing with complex requests involving multiple data types, sources and locations.  Traditionally, companies have collected the data and provided it to a third party expert or external counsel for handling.

The sensitive nature of many new matters requires companies to consider alternative approaches to handling data when conducting an investigation or litigation. Quite often this alternative approach involves working within the confines of the company infrastructure.

The panel discussion will provide an insight into the different approaches to collect, analyze and review corporate data.

Discussion points:

  • Data Collection Considerations
    • Using  internal  IT resources Vs forensic expert
    • Understanding  corporate retention policies
    • Collecting from non-corporate sources
      -- Mobile phones
      -- Webmail and IM applications (Gmail, WeChatetc)
    • Data mapping and remediation options
  • Data Management - Onsite Vs offsite
    • Can the data leave the corporate site?
    • Options for analyzing data onsite
      -- Workflow
      -- Pro’s and Cons
    • Managing Document Review

Celeste Kemper, Director, Document Review Services APAC at Epiq Systems
Jay Chong, ‎Manager, Forensic Services Asia at Epiq Systems
Yeming Ma, Consultant, Baker & McKenzie LLP


Tea Break


The data will speak if you have ears to listen.”

The world of e-Discovery is often perceived as predominantly concerned with email. Many of the tools and techniques being touted at e-Discovery conferences are concerned with the volume of email and ‘e-docs’ as a challenge in legal review. Inevitably as the ‘user generated data’ intended for the human eye, this is where facts, opinions and instructions related to disputes reside. However, there are many other types of data created and recorded on computerized systems which can make or break cases. This session will discuss some of the other types of data of which lawyers should be aware.

Richard Kershaw, Managing Director, FTI Technology


Best Practices in Managed Document Review

The key to minimizing risks and maximizing the effectiveness of a document review exercise is to construct, document and follow a defensible process based on best practices that reflect sound project management disciplines, sound legal judgement, and counsel specifications.

In recent years, there has been an increasing focus on managing costs in this phase of discovery, leading to growing interest in simple yet practical solutions. This talk discusses best approaches to planning and project management, workflow, quality control and communication between the vendor and client.

This presentation will focus on:

  • Overview of the ediscovery review process
  • Benefits of managed review model vs. staffing model
  • Challenges in planning, executing and managing a discovery review exercise in China
  • Best practices through case studies and lessons learnt

Michael Lew, Director, RSM Technology Risk Group Pte Ltd
Farhat Jabeen
, Vice President - Ediscovery & Legal Solutions, Merrill Corporation Asia




Law firms

IT and Forensic

In-house legal, Compliance and Audit Series


Addressing Big Data Challenges with Legal Technology

The exponential growth of Big Data brings about new challenges to the new breed of attorneys. This panel session will highlight some of the common challenges & pitfalls faced, and discuss how to overcome such challenges with the efficient use of legal technology.

Ultimately, the prevalent use of technology in the legal industry will inevitably drive new processes to enable today’s modern day attorneys to produce more prompt, accurate results whilst increasing their competitiveness.

This workshop will focus on the following topics:

  • Overview of big data and ESI challenges in China
  • Emerging trends in the adoption of legal technology
  • How to overcome big data challenges
  • Sharing of case studies and experiences throughout Asia

(M) Michael Lew, Director, RSM Technology Risk Group Pte Ltd
Jieni Ji, litigation Associate, Shearman & Sterling LLP
Farhat Jabeen, Vice President - Ediscovery & Legal Solutions, Merrill Corporation Asia
Kenneth Tung, General Counsel, Lex Sigma Limited

Defend Your Organization with Real-Time Incident Response and Sensitive Data Discovery

Sensitive data is what drives your business, making loss of that data one of the largest risks your organization faces today. Adding to this vulnerability are the rising frequency of attacks, growing costs of remediation, and lengthening time-to-response. Limited visibility into both the targets of attacks as well as where and how sensitive data is stored only compounds the problem. Join us to learn how we can help with your Incident Response and Sensitive Data Discovery workflow.

  • Why is Digital Investigation on Endpoint Necessary?
  • Overview on Incident Response Challenges
  • How can we improve your Incident Response time?
  • How can we help in your Sensitive Data Audit process?
  • Taking the first step to conduct Malware Investigation (Demo)

Terence Heah, Senior Solution Consultant, Guidance Software, Inc.

Conducting Investigation and collecting Data for Cross Border Cases

Data does not recognise borders. However regulations are traditionally tied to specific jurisdictional boundaries, may conflict between countries and generally lag the advances in information technology.

This creates a tension for organisations that operate globally and are subject to regulatory scrutiny in multiple countries.

This session will focus on China, US, Singapore and India.

Paul Taylor, Manaing Director, Consilio
Jason Cao, Chief Legal Counsel, Dover Corporation China Regional Headquarters
Kareena Teh, Partner, Litigation and Compliance Investigations, Dechert LLP


Tea Break


Navigating the Complexities of E-Discovery in Patent Litigation

Electronically stored information (ESI):

Patent cases usually involve large volumes of ESI. The process of obtaining a patent requires companies to produce and maintain large amounts of data. Additionally, discoverable ESI related to a patent may stretch back many years or subject to previous lawsuits.


The question of when the obligation to preserve is triggered is one of the most vexing issues in e-discovery. This can be especially true in patent litigation. According to the FRCP, the duty to preserve is triggered when litigation is reasonably foreseeable. There are obvious trigger events – complaints, summons, notice of investigation – but in patent litigation the trigger events can be unclear since patents are so frequently challenged and so fervently protected. Does the filing for the patent, or the issuance of the patent represent a trigger point? Can a company wait until someone challenges for infringement?

This session, the speakers will discuss how to streamline ESI production, data preservation and IP litigation best practices

Kate Chan, Regional Managing Director Legal Technologies, Asia Pacific, Kroll Ontrack
Benjamin Bai, Partner, Head of the China IP Practice, Allen & Overy
Eric Liu, IP Attorney, Corning China

Data Privacy and e-Commerce Criminal

Chinese e-commerce companies are the main victims of the country's cybercriminals, who are on the lookout to steal identities for monetization purposes and fraud activities, because of the country's real-name rule.

e-Commerce is the most widely targeted industry in China by cybercriminals within the country.

This session, the expert speaker will shared the best practice to protect your company data and fight cyber criminals

Dr. Michael Tan (CHEN Zhenfu), Senior Counsel, Taylor Wessing



Lucky draw An iPad Mini



1 Yuyuan Road, Jing'an District, Shanghai

12th June 2014



1 ChangDe Road, JingAn District

11th June 2014

For delegate registration, marketing cooperation, sponsorship or speaking opportunities, please contact us at
852 3978 9999 or

After Work Hour Hotline:
+852 6801 9775