Data Law Trends & Developments - Crowell & Moring

1y ago
2 Views
1 Downloads
1.67 MB
38 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Duke Fulford
Transcription

data law trends& developments:E-Discovery, Privacy,Cybersecurity & InformationGovernanceJune 2014

table of contents4 Information Governance6 CybersecurityDavid Z. BodenheimerStephen M. ByersChristopher Calsyn8 social media11 technology-assisted review15 criminal e-discoveryRobin B. CampbellDavid D. CrossElizabeth A. Figueira18 regulatory20 cooperation22 privacyElliot GoldingJustin P. MurphyMargaret Nielsen28 cross border transfers31 bring your own device (byod)34 privilegeJeffrey L. PostonJeane A. ThomasMichael G. Van ArsdallcontactsLuke van HouwelingenEvan D. WolffDavid D. CrossPhone: 202.624.2774Email: dcross@crowell.comJeane A. ThomasPhone: 202.624.2877Email: jthomas@crowell.comCopyright 2014 by Crowell & Moring LLP. All rights reserved. This materialis for general informational purposes only and does not represent our legaladvice as to any particular set of facts, nor does it represent any undertakingto keep recipients advised of all relevant legal developments.2Data Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance

introductionNot long ago, businesses largely relied on manilafolders and file cabinets to store documents. Sensitiveinformation could be protected with a simple lock anda key. But no longer. Today, the “big data” explosionhas replaced file cabinets with virtual warehouses andeven small, portable devices capable of storing theequivalent of millions of documents. And the lockand key have been replaced by complex encryptionand firewalls.Although technology has increased ease and efficiency, it also has created new challenges, especially in alegal environment struggling to keep pace. As electronically-stored information, or ESI, continues to grow involume and variety, businesses regularly confront these challenges and the associated risks.Take social media, for example. What began as a tool to enable friends to keep up with each otherhas become a significant means of business development and a rich information source in litigation.Businesses, however, can face liability for what employees post on work-related social media accounts, andpersonal social media accounts present certain ethical risks for lawyers looking to obtain information fromthose accounts.Similarly, mobile phones have grown from simple devices allowing people to stay in touch on the go tohigh-powered machines in the hands of employees and customers. Many businesses allow employeesto use their personal devices for work, which increases the danger of disclosure or theft of confidentialinformation and puts companies at risk of improperly accessing personal information stored on thosedevices. And the data businesses collect from customers through these devices and other sources presentsubstantial privacy and cybersecurity threats.In the United States and overseas, the applicable regulatory framework continues to evolve. The same istrue for litigation—although e-discovery is nothing new, the ever-increasing volume, complexity, and formsof ESI present new challenges in litigation.This report is intended to address certain key issues and challenges by identifying particular trends andforecasting how the law is likely to develop over time. As with Crowell & Moring’s annual LitigationForecast, our goal is to identify for both in-house and outside counsel some of these challenges. We hopethis sparks a dialogue between counsel and clients that culminates in a deeper understanding of thesechallenges and the evolving legal landscape. We invite you to subscribe to our blog, www.crowelldatalaw.com, where we frequently discuss the topics addressed here and many more. On our blog, you can keepup with the latest developments and share your own thoughts or questions. We look forward to hearingfrom you.David D. Cross, Co-Chair, E-Discovery & Information Management GroupJeane A. Thomas, Co-Chair, E-Discovery & Information Management GroupData Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance3

Information GovernanceUntil recently, organizations typically maintained a number of discrete functionaldepartments – such as information technology (IT), data security, records and informationmanagement (RIM), and privacy – which each played a role in managing the organization’sinformation. In addition, the legal department typically was responsible for implementingpreservation and collection requirements for litigation and investigations. However, manyorganizations are realizing that this siloed approach to managing data infrastructure andassets is inefficient, creates unnecessary risk, and hinders the ability of the organization tomaximize the value of its information assets.By: Jeane A. ThomasRecognizing the limitations and risks inherentcorporate-owned, personally enabled (COPE) policies,in treating these functions as entirely separateand may contain personal identifiable information ofoperations, organizations are increasingly bringingcustomers, employees or others – thereby implicatingthese various components together within an over-privacy interests. In the course of the legal proceeding,arching, coordinated approach often referred to asconfidential ESI may be provided to outside counsel,“information governance.” According to The Sedonavendors, experts, and opposing parties – therebyConference , information governance is defined as:implicating security concerns. And the complexity of“An organization’s coordinated, interdisciplinaryapproach to satisfying information compliancerequirements and managing information risksthis example pales by comparison to the enormousrisks companies face with respect to data breachesand cyber-theft, which also implicate the full range ofwhile optimizing information value. As such,stakeholders involved in information governance.Information Governance encompasses andOne of the biggest challenges within manyreconciles the various legal and complianceorganizations is making the business case for designingrequirements and risks addressed by differentinformation-focused disciplines, such as RIM,privacy, information security, and e-discovery.”The Second Conference Principles of InformationGovernance.examples of info gov failures 171Estimated clean-up costsfrom high-profile data breach 8.5Sanctions for failure to locateand produce ESI in litigation. 8.5Fine for failure to retainimmigration records perregulation.MILLIONTo illustrate the point, consider the various interestsat stake in the routine exercise of collecting andproducing electronically-stored information, or ESI,for litigation. The process of complying with the legalMILLIONprocess is overseen by lawyers, yet the first stepsinvolving preservation require suspending routine RIMpolicies and implementing legal holds, which requirethe involvement of IT staff to identify and isolaterelevant ESI and modify routine data destructionprocesses. ESI may be located on employees’ personaldevices, pursuant to bring your own device (BYOD) or4MILLIONSource: The Sedona Conference “Principles of InformationGovernance”Data Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance

Information Governancecompany risks from info gov failures0%10%20%30%40%50%60%Excess litigation costs or damages resulting from poor records keepingLoss of customer confidence or bad publicity from data lossLoss of intellectual property or company confidential informationInability to respond to requests (Freedom of Information)Infringement of industry-specific compliance regulationsAudit qualifications due to inadequate recordsRegulator action from loss/exposure of personally identifiable informationPoor outcome of customer/supplier disputes due to gaps in communications trailCriminal prosecution for allowing personally sensitive data to be lostSource: AIIM Market Intelligence, “Information Governance - records, risks and retention in the litigation age”. Between January 18 andFebruary 11, 2013, 548 individual members of the AIIM community (www.aiim.org) were surveyed. The chart above reflects their responsesto identifying the three biggest risks to their company from a failure of information governance.and implementing an effective information governanceinto the analysis, along with damage to the organization’sprogram. It may seem like a good idea in concept, but whatreputation or brand that follows such events.is the cost compared to return on investment? The answerrequires consideration of the full range of potential costs andbenefits at issue, not merely the additional resources requiredto develop and implement an information governance program.One of the most obvious benefits from having an effectiveinformation governance program is reduced costs ofe-discovery that result from having effective RIM policies, whichinclude the sound management of records that are needed forbusiness purposes and the routine destruction of informationwhen it is no longer needed. One recent estimate involvesOn the positive side, effective information governance canenhance an organization’s reputation and help win thetrust of consumers, as companies are now competing inthe marketplace by promoting their security and privacypractices. In addition, greater coordination among the variousstakeholders should lead to increased efficiency and lowercosts across the organization and reduce the risk that importantinitiatives fall between the cracks or cancel each other out.To be effective, an information governance program musthave the full support of senior management, sufficientan organization that reduced its volume of ESI by 40 percentresources, and complete accountability. It also should bethrough more effective RIM policies, which in turn resultedsufficiently independent from any particular department soin hard cost savings from processing, hosting and producingthat coordinated decisions are made in the best interestsdata in litigation by more than 40 per gigabyte – even beforeof maximizing value and reducing risk for the organizationconsidering the human cost savings associated with attorneyas a whole. As organizations increasingly become aware ofreview, project management, etc. Although less certain thanthe potential value and enormous risk associated with theirlower e-discovery costs, the much higher potential costsinformation assets, the trend toward a coordinated andof responding to a data breach or cyber-theft incident, orholistic approach to information governance can be expecteddefending spoliation claims in litigation, must also be factoredto continue.Data Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance5

cybersecurityCybersecurity’s escalating threats, intensifying oversight, and expanding publicity in recentyears exploded in 2013. It was a year bookended by President Obama’s cybersecurity warningsin his State of the Union message and the mega-breaches at Target and Neiman-Marcus. Andit gave us a cyber panorama – the Cybersecurity Executive Order; industry security reports ofmassive cyber looting of U.S. intellectual property and technology; the Iranian cyber attacks onU.S. banks; the Snowden breach of national security secrets; the proliferation of cybersecuritystandards governing everything from private- and public-sector contracts to cloud computing;and the intensified scrutiny of federal agencies (including the SEC, FTC, and HHS) on securityvulnerabilities and breaches.By: David Z. Bodenheimer & Evan D. WolffGoing forward, this kaleidoscope of cyber events foretellsreports (e.g., Mandiant’s report) point to a singleeven rougher weather for both the public and privateconclusion: foreign nations and competitors are stealingsectors. Corporate officers, government officials, andthe economic lifeblood of Fortune 500 companies,other organizations will have plenty of cybersecurityresulting in “the greatest transfer of wealth in humanconcerns ahead, with the following five overlapping andhistory” according to the NSA Director Keith Alexander.morphing areas deserving particular emphasis for thoseFor 2014, cyber attacks will not only continue to replicateseeking shelter from the cyber storms.prior economic damage (e.g., where single companiesMega BreachesLike the mega-breaches of the past (Heartland,deals), but will pack second and third punches.ChoicePoint, Sony, TRICARE, Epsilon, and more) exposingAfter elevating its scrutiny in 2011-13, the SEC ishundreds of millions of records containing sensitiveclamping down hard on publicly-traded companies failingpersonal information, the Target breach potentiallyto report deficient security programs and material datacompromising 110 million records foretold more thatbreaches. Shareholder suits will follow. And the largestfollowed. But the gauntlet in 2014 and beyond will befederal and state public sector agencies will stop doingmuch rougher, as mega-breach victims will face not onlybusiness with companies that cannot protect networks,lost customers and hammered stock prices, but also classtechnology, and secrets. Any business without robustactions, shareholder suits, regulatory investigations, andcybersecurity programs will face an impossible question:even Congressional scrutiny. In short, companies nothow could you not be ready for this threat?ready for cyber crisis management of epic proportions– including a strong incident response plan and databreach playbook – will confront one question many6have lost 1 billion in technology and 2.4 billion mergerCyberwar on Corporate TargetsIn a recent Defense News survey, major corporatetimes: were they not prepared?executives identified cyber attacks as a top concern.Pillaged Intellectual Propertyand Technology2012-13, U.S. banks had a foretaste of the future whenSince President Obama’s warning in 2009 that cybercases, posed fundamental network risks. Going forward,thieves had stolen over 1 trillion worldwide inattacks by rogue nations, terrorists, and hacktivists willintellectual property and technology, the news has onlyintensify, with those least ready taking the hardest hits.gotten worse. Numerous intelligence and industryBoth public and private officials will need to take muchDuring the cyber attacks attributed to the Iranians insuch assaults impaired electronic business and, in someData Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance

cybersecurityharder looks at their organization’s cyber resilience and backupplans. For such organizations, the hard question is simple: areyou ready to protect your fundamental operations with a soundforecastcontinuity of operations plan?In February 2014, the National Institute of StandardsProliferation of Security Standardsand Technology (NIST) released the long-awaitedCybersecurity Framework, which promises to haveLike an alphabet with unlimited letters, the standards governinginformation security are proliferating at a mad pace into asector-driven patchwork: HIPAA (healthcare), GLBA (financial),ISO (international), NERC/FERC (power grid), and NIST (federalagencies and contractors) to name a few. Because overarchingfederal legislation is highly unlikely in the near term, we will seethe promulgation of even more security standards, resultingin growing conflicts and compliance burdens for companiescrossing several industry sectors. Untangling this expandingand overlapping field of cybersecurity requirements cannotbe left to the IT department, but will require buy-in frommanagement, finance, and legal organizations. In the future,cyber compliance will hinge upon a simple question: arewe managing compliance from the top (an enterprise-wideapproach), rather than isolating our security efforts within the ITsignificant implications for the public and privatedepartment?from intrusions; (3) detecting anomalous activity; (4)Cyber Disputes Among Business PartnersSome of the recent mega-breaches have resulted from a weaklink in the supply chain, such as the TRICARE breach stemmingfrom a federal contractor failing to protect a laptop filled with afederal agency’s personal data for 4.9 million beneficiaries. Asa result of such losses, breaching companies have had currentbusiness cut off and future business sent elsewhere, while beingcalled to indemnify business partners from losses due to thesecurity breach. As a result, the litigation forecast for comingyears is hot: business partners will sue each other, federalregulators will take action against businesses, contractors willsue federal agencies, insured companies will pursue insurers,businesses and cloud service providers will fight, and more.In this volatile environment ripe for disputes, every businessmust zero in on the allocation of cyber risks. For those blindlyaccepting all of the risk, the questions are two-fold: will thecompany bearing the massive cyber loss survive; and will theperson signing off on that risk have a job tomorrow?sectors alike. It follows the 2013 Presidential ExecutiveOrder -- Improving Critical Infrastructure Cybersecurity-- which recognized cyber threats as “one of the mostserious national security challenges we must confront.”The Framework consists of a set of voluntary standardsand processes that private industry, particularly criticalinfrastructure, can use to address these cyber risks.The main structure of the standard is the “FrameworkCore,” which outlines the five primary functionsnecessary for cyber resilience, as well as the typesof actions each function may entail: (1) identifyingrisks and vulnerabilities and implementing policies toaddress those issues; (2) protecting data and networksresponding to incidents and recovering from intrusionsby restoring systems; and (5) incorporating lessonslearned. To guide companies seeking to implement theFramework, NIST also established an “ImplementationTiers” classification system that provides context onhow an organization views cybersecurity risks andthe associated processes to manage those risks. Alsoaccompanying the Framework Core is general guidanceinstructing companies to incorporate privacy protectionsinto cybersecurity programs.Although the Framework features considerable industryinput, many questions remain, including furtherdefining voluntary adoption and incentives for adoption,the impact on government contracting, and how thestandard may be used by third parties. Those questionswill likely continue to drive further development of theFramework.Data Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance7

social mediaSocial media has become ubiquitous in today’s society, with both individuals and businessesof all sizes embracing its use. Social media use implicates important information governanceconcerns, such as privacy, and has yielded a whole new area of electronic discovery, includingchallenges regarding preservation, production, admissibility, and even ethics. The applicablelaws and procedural rules have struggled to keep up with the growing use of social mediain legal proceedings. The legal landscape in this evolving area has been most prominentlyshaped in the contexts of the employer-employee relationship and discovery.By: Justin P. Murphy & David D. CrossSocial media presents unique legal risks for employers,Act because the policies’ limitations and controlsand the legal issues that arise are receiving increasingregarding use of personal social media accountsattention in litigation. For example, the Nationalwent too far. Companies need to be particularlyLabor Relations Board (NLRB) is hearing more andcareful when disciplining employees using personalmore cases involving employees’ social media use.social media accounts to complain or criticize theThese cases are helping to clarify the dividing linecompanies, especially where an employee previouslybetween what social media related conduct by anmade complaints or engaged in such discussionsemployee is protected and what is not, with thein the workplace. The NLRB general counsel haskey takeaway being that context matters greatly. Inissued three reports on social media cases, mostsome cases, companies’ social media policies haverecently in May 2012. And, in January 2014, NLRBbeen found to violate the National Labor RelationsChairman Mark Pearce confirmed in an interviewSEC Netflix Investigation ReportNetflix’s CEO announced on his personal Facebook account how many hours of content had been streamed bycustomers the prior month, which drove Netflix’s stock price up because the information had not yet been publiclydisclosed. The SEC clarified that social media posts by a company or its executives will be treated as any other electroniccorporate disclosure of material, non-public information and that companies are to advise the investing public about themethods of communication that they might use to make such disclosures, including corporate web sites, social media,blogs, or otherwise.Gatto v. United Air LinesThe court granted an adverse inference instruction as a sanction because the plaintiff failed to preserve a relevantFacebook account.Teagle v. MorganA former employee sued her former employer for locking her out of her LinkedIn account and illegally using itfor commercial gain after terminating her. The court found the employer liable for various torts in part becausethe company did not have a social media policy informing employees that their LinkedIn accounts were theemployer’s property.Bland v. RobertsThe Fourth Circuit held that “liking” a Facebook post is protected free speech where a deputy sheriff was firedby the incumbent sheriff running for re-election because the deputy “liked” a Facebook page of an opposing campaign.8Data Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance

social mediathat the Board would continue to focus on social media casesand would apply existing standards to new technologies andcommunication tools used by employees.Numerous states have adopted laws protecting privacy rightsattendant to personal social media use by employees. Inresponse to some well-publicized cases where employersrequired employees to grant the employers access to personalfacebooksocial media accounts, states have started passing laws1.15500access to login credentials for their employees’ personal socialgoogle linkedinmedia accounts. These include Arkansas, California, Colorado,500238poised to follow suit, and even Congress is considering ainstagrampinterestsimilar law. These laws generally proscribe any employer130protecting the social media privacy rights of employees. Atleast thirteen states have passed laws restricting employers’Illinois, Maryland, Michigan, Nevada, New Jersey, New Mexico,Oregon, Utah, Vermont and Washington. Other states appearmandate requiring an employee or applicant to disclose hisor her personal social media login credentials, to grant theBillion Million Million twitterMillion Million 70Million employer access to the employee’s account, or to add theemployer as a friend or contact on a social media platform.On the flipside, businesses are facing new legal hurdles withtheir own social media accounts, which are created, operated,and managed by employees. These accounts and the conductof employees with access to them present a whole newSource: As posted by www.digitalbuzzblog.com from datasourced from www.facebook.com, www.expandedramblings.com,www.mediabistro.com and www.socialmediaexaminer.com.area of liability for companies turning to social media formarketing and other business purposes. Companies mayis subject to the same disclosure requirements as otherbe held responsible for content posted by their employees.ESI. Companies, however, do not always immediately thinkUnfortunately, employees sometimes approach social media,about their social media accounts when considering whatespecially applications such as Twitter , with the same levelinformation may be relevant to an anticipated or pendingof informality and candor with which they approach emailslitigation or investigation. But these accounts can containamong friends or colleagues. Yet, social media, even ifrelevant information that must be preserved and produced.restricted to “friends” or “followers,” is not private in the wayIndeed, courts have sanctioned parties for failing to preserveemails can be, which presents exposure for businesses thatpotentially relevant social media content.employees do not always appreciate.When facing disclosure requests for social media content,Mandatory disclosures in litigation and governmentparticularly for employees’ individual social media accounts,investigations present further challenges and risks forcompanies need to be cognizant of attendant privacy rightscompanies using social media. Social media content generallyand object as appropriate. Fortunately, courts increasinglyData Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance9

social mediabusiness or what the limits of any such rights are and whatuse of social media among adults67disclosure requirements they may face. Social media policiesalso should provide specific guidelines, within the bounds of71% of adult online users active onsocial media websites, by yeargoverning law, for how, and by whom, social media accountsmay be used for business purposes and what content isappropriate.2022152116181317forecastSocial media use will continue its meteoric rise,perhaps eventually surpassing email as 13Source: Pew Research Center’s Internet Project Tracking Surveys(www.pewinternet.org) , 2012-2013. 2013 data collected August07 - September 16, 2013.preferred means of communication. Companies willincreasingly use social media and authorize its useby employees for company-related business, suchas marketing, public relations, and other purposes.Historically, the Super Bowl provided one of themost significant U.S. marketing opportunities of theyear. Yet, in recent years, despite paying millionsexhibit appropriate sensitivity to these concerns andof dollars for short spots during the big game,companies increasingly release their Super Bowl permit in-camera inspection of social media content toads through social media sites in the days leading updetermine whether it must be produced. Some courts haveto the game. Controversial ads often spark a flurryeven required parties in civil litigation to make a thresholdof comments through social media applications,evidentiary showing that non-public social media contentincluding on company Facebook and Twitter contains relevant information. Some federal district courts,accounts. This trend in social media use will fuel thehowever, have rejected this approach as inconsistent withparallel trend of evolving information governancethe federal rules, reasoning that it would improperly shieldconcerns and discovery challenges, as content growsrelevant information from discovery that is not otherwiseand becomes increasingly relevant in litigation andobtainable. Ultimately, if deemed relevant, courts seemgovernment investigations.increasingly likely to order social media content disclosed,overruling privacy-related objections as a bar to disclosure.Additionally, U.S. government agencies such as theSecurities and Exchange Comission (SEC) and theNLRB as well as courts evaluating discovery andCompanies are well served adopting policies governing socialpreservation issues will continue to provide guidancemedia use by employees. These policies should clearly identifyabout how existing rules and standards apply tothe respective rights employers and employees have regardingsocial media. As a result, more and more businessesindividual and corporate social media accounts. In particular,should adopt sound social media policies to betterthese policies should alert employees either that they have noprotect themselves and their employees.privacy rights as to social media accounts used for company10Data Law Trends and Developments: E-Discovery, Privacy, Cybersecurity & Information Governance

Technology-assisted reviewTechnology assisted review (TAR) platforms, particularly those technologies commonlyreferred to as “predictive coding,” have been around for a number of years. Technologyproviders, along with early adopters, have promoted the potential for TAR to achievesignificant efficiencies, cost savings and improved results over alternative review optionsincluding keyword searching and manual review. Although there has been some concernabout whether courts would accept TAR, and what costs and burdens would be required todefend its use, the benefits of TAR so dramatically outweigh those concerns that TAR now is,or should be, the mainstream approach for document review across a wide range of differenttypes of matters.By: Jeane A. Thomas & Elizabeth A. FigueiraIn simplest terms, TAR involves the use of computerCollection. Some TAR methods use Machinesoftware to categorize documents consistent withLearning Algorithms to distinguish Relevant fromhuman judgments. A more formal definition of TARNon-Relevant Documents, based on Trainingfrom the Grossman-Cormack Glossary is:Examples Coded as Relevant or Non-Relevantby the Subject Matter Experts(s), while other“A process for Prioritizing or Coding a CollectionTAR methods derive systematic Rules thatof Documents using a computerized systememulate the expert(s)’ decision-making process.that harnesses human judgments of one orTAR processes generally incorporate Statisticalmore Subject Matter Expert(s) on a smallerModels and/or Sampling techniques to guideset of documents and then extrapolatesthe process and to measure overall systemthose judgments to the remaining Documenteffectiveness.”Da Silva Moore v. Publicis GroupeMagistrate Judge Andrew Peck in the Southern District of New York provided the first public judicialendorsement of predictive coding in a highly publicized opinion. After his initial opinion, the expe

when it is no longer needed. One recent estimate involves an organization that reduced its volume of ESI by 40 percent through more effective RIM policies, which in turn resulted in hard cost savings from processing, hosting and producing data in litigation by more than 40 per gigabyte - even before

Related Documents:

PSI AP Physics 1 Name_ Multiple Choice 1. Two&sound&sources&S 1∧&S p;Hz&and250&Hz.&Whenwe& esult&is:& (A) great&&&&&(C)&The&same&&&&&

Argilla Almond&David Arrivederci&ragazzi Malle&L. Artemis&Fowl ColferD. Ascoltail&mio&cuore Pitzorno&B. ASSASSINATION Sgardoli&G. Auschwitzero&il&numero&220545 AveyD. di&mare Salgari&E. Avventurain&Egitto Pederiali&G. Avventure&di&storie AA.&VV. Baby&sitter&blues Murail&Marie]Aude Bambini&di&farina FineAnna

The program, which was designed to push sales of Goodyear Aquatred tires, was targeted at sales associates and managers at 900 company-owned stores and service centers, which were divided into two equal groups of nearly identical performance. For every 12 tires they sold, one group received cash rewards and the other received

College"Physics" Student"Solutions"Manual" Chapter"6" " 50" " 728 rev s 728 rpm 1 min 60 s 2 rad 1 rev 76.2 rad s 1 rev 2 rad , π ω π " 6.2 CENTRIPETAL ACCELERATION 18." Verify&that ntrifuge&is&about 0.50&km/s,∧&Earth&in&its& orbit is&about p;linear&speed&of&a .

theJazz&Band”∧&answer& musical&questions.&Click&on&Band .

6" syl 4" syl 12" swgl @ 45 & 5' o.c. 12" swchl 6" swl r1-1 ma-d1-6a 4" syl 4" syl 2' 2' r3-5r r4-7 r&d 14.7' 13' cw open w11-15 w16-9p ma-d1-7d 12' 2' w4-3 moonwalks abb r&d r&d r&d r&d r&d r&d ret ret r&d r&d r&d r&d r&d 12' 24' r&d ma-d1-7a ma-d1-7b ret r&d r&d r5-1 r3-2 r&d r&r(b.o.) r6-1r r3-2 m4-5 m1-1 (i-195) m1-1 (i-495) m6-2l om1-1 .

s& . o Look at the poem’s first and last lines (first and last lines may give readers important . it is important to read poems four times. Remind them that the first time they read is for enjoyment; rereads allow them to dive deeper into poems .

Have&youheardabout&the& DCPublic&Library&Challenge?& Kids,teens,andadults&can have&funandwin ;by participating&inthe&2018&DC&Public .