e-Discovery For Dummies
By Carol Pollard and Ian Redpath
()
About this ebook
Discover the process of e-discovery and put good practices in place.
Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information. With the recent change to Federal Rules of Civil Procedure making all lawsuits subject to e-discovery as soon as they are filed, it is more important than ever to make sure that good e-discovery practices are in place.
e-Discovery For Dummies is an ideal beginner resource for anyone looking to understand the rules and implications of e-discovery policy and procedures. This helpful guide introduces you to all the most important information for incorporating legal, technical, and judicial issues when dealing with the e-discovery process. You'll learn the various risks and best practices for a company that is facing litigation and you'll see how to develop an e-discovery strategy if a company does not already have one in place.
- E-discovery is the process by which electronically stored information sought, located, secured, preserved, searched, filtered, authenticated, and produced with the intent of using it as evidence
- Addresses the rules and process of e-discovery and the implications of not having good e-discovery practices in place
- Explains how to develop an e-discovery strategy if a company does not have one in place
e-Discovery For Dummies will help you discover the process and best practices of managing electronic information for lawsuits.
Carol Pollard
Carol Pollard is Full Professor of Computer Information Systems at Appalachian State University, USA. She holds a PhD in Management Information Systems and Business Administration from the University of Pittsburgh. She also holds an ITILv3 Certificate. She was a research analyst for IBM for 7 years and has served as Associate Editor for the Journal of Global IT Management for the past 10 years and for the International Journal of Decision Sciences since 2010. Her research focuses on application lifecycle management, IT Service management, IT project management and IT for sustainability. She has presented her research at international academic and practitioner conferences including the International Conference on Information Systems, Hawaii International Conference on Systems Sciences, Australasian Conference on IS, Pacific Asia Conference on IS, PINK, IBM Pulse and IBM Innovate. Her research is featured in international journals including MIS Quarterly, Journal of MIS, Journal of IS Education, International Small Business Journal, Group Decision and Negotiation and IT Professional.
Related to e-Discovery For Dummies
Related ebooks
Paralegal Career For Dummies Rating: 5 out of 5 stars5/5Patents, Copyrights and Trademarks For Dummies Rating: 4 out of 5 stars4/5The Paralegal's Handbook: A Complete Reference for All Your Daily Tasks Rating: 4 out of 5 stars4/5Records Management For Dummies Rating: 3 out of 5 stars3/5E-Discovery and the Federal Rules of Civil Procedures Rating: 0 out of 5 stars0 ratings2024 - 2025 Paralegal Blueprint Building Foundations, Skills and a Path to a Rewarding Paralegal Career Rating: 5 out of 5 stars5/5Online Learning For Dummies Rating: 0 out of 5 stars0 ratingsFlorida Family Law Basics Rating: 0 out of 5 stars0 ratingsLegal Studies Boxed Set: A+ Guides to Writing, #11 Rating: 0 out of 5 stars0 ratingsGuardians of the Record: The Origins of Official Court Reporting and the Shorthand Writers Who Made It Possible Rating: 0 out of 5 stars0 ratingsThe Limits of the Legal Process: A Study of Landlords, Law and Crime Rating: 0 out of 5 stars0 ratingsSuccess as a Mediator For Dummies Rating: 4 out of 5 stars4/5The Quotable Lawyer Rating: 4 out of 5 stars4/5Law School For Dummies Rating: 0 out of 5 stars0 ratingsComputer Forensics For Dummies Rating: 4 out of 5 stars4/5Federal Rules of Evidence: Hyperlinked, #3 Rating: 0 out of 5 stars0 ratingsThe Law (in Plain English) for Writers (Fifth Edition) Rating: 0 out of 5 stars0 ratingsBusiness Law in California Rating: 0 out of 5 stars0 ratingsAUDITING: Passbooks Study Guide Rating: 0 out of 5 stars0 ratingsClear and Convincing Evidence: My Career in Intellectual Property Law Rating: 0 out of 5 stars0 ratingsVirtualization For Dummies Rating: 3 out of 5 stars3/5Social Security For Dummies Rating: 4 out of 5 stars4/5Internal Legal Memos: A+ Guides to Writing, #9 Rating: 0 out of 5 stars0 ratingsLawsuits in a Market Economy: The Evolution of Civil Litigation Rating: 0 out of 5 stars0 ratingsStop Putting Out Fires: Building a More Efficient and Profitable Law Practice Rating: 0 out of 5 stars0 ratingsFlorida Family Law Basics: Discovery Rating: 0 out of 5 stars0 ratingsSecrets To Your Top Recovery Rating: 0 out of 5 stars0 ratingsRepresenting Yourself In Court (CAN): How to Win Your Case on Your Own Rating: 5 out of 5 stars5/5Starting an Online Business All-in-One For Dummies Rating: 0 out of 5 stars0 ratings
System Administration For You
CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 5 out of 5 stars5/5Linux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Mastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Complete Powershell Training for Beginners Rating: 0 out of 5 stars0 ratingsPowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Practical Data Analysis Rating: 4 out of 5 stars4/5Summary of Lights Out: by Ted Koppel | Includes Analysis Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsMastering Linux Shell Scripting Rating: 4 out of 5 stars4/5PowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Linux Commands By Example Rating: 5 out of 5 stars5/5Learn SQL Server Administration in a Month of Lunches Rating: 3 out of 5 stars3/5Linux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsImprove your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsMastering Embedded Linux Programming - Second Edition Rating: 4 out of 5 stars4/5Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite Rating: 0 out of 5 stars0 ratingsEvaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware Rating: 0 out of 5 stars0 ratingsCAN and FPGA Communication Engineering: Implementation of a CAN Bus based Measurement System on an FPGA Development Kit Rating: 0 out of 5 stars0 ratingsOracle Solaris 11 Advanced Administration Cookbook Rating: 0 out of 5 stars0 ratingsLearn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 4 out of 5 stars4/5Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform Rating: 0 out of 5 stars0 ratings
Reviews for e-Discovery For Dummies
0 ratings0 reviews
Book preview
e-Discovery For Dummies - Carol Pollard
Part I
Examining e-Discovery and ESI Essentials
510124-pp0101.epsIn this part . . .
This part presents e-discovery in digestible chunks so you understand the essentials of e-discovery at its simplest level. We explain e-discovery laws that have re-written the responsibilities of legal and information technology (IT) professions in Chapter 1. Legal and IT — two groups most unlikely to speak a common language or operate at the same tempo — are most responsible for e-discovery success. Also in Chapter 1, you learn that all electronic content that we create, send, post, search, download, or store has a legal name: electronically stored information, or ESI. We cover why this ESI universe is subject to discovery and cite cases where failing to preserve and produce ESI cost litigants serious amounts of money and essentially gutted their cases.
In Chapter 2, you learn why working with ESI is messy even under the best circumstances. You’re introduced to the relationship between the age of ESI and the ability to reach out and retrieve it from its storage media. ESI can be online, offline, gone, or somewhere in between. The ability to reach and retrieve ESI determines its accessibility, which in turn influences its discovery status from the perspective of judges (or the bench). You find out why it’s best to resolve your ESI disputes with the opposing side rather than turn those disputes over to the bench. Also in Chapter 2, we foreshadow the fate of enterprises unprepared for e-discovery. You start to understand that investing in ESI retention and management tools to get into litigation-ready shape is much less risky than whining about why it’s too burdensome to respond to an ESI request. Chapter 3 continues these lessons.
Prelitigation best practices get you into a strong defensive position, as you read in Chapter 3. You learn one of the most crucial lessons — that most cases are settled as a result of e-discovery because it’s only then that both sides learn the strengths and weaknesses of the other’s case. You don’t go all in with no chance of winning, at least not more than once. When you do e-discovery right, you have a powerful offensive or defensive weapon.
We used to say there’s e-discovery as if it was a subset of all discovery. But now there’s no other discovery.
—Judge Shira A. Scheindlin (2009), e-discovery rock-star judge
Chapter 1
Knowing Why e-Discovery Is a Burning Issue
In This Chapter
Diving into e-discovery
Seeing electronic information in 3D
Getting the layout of the litigation process
Understanding the steps in the e-discovery process
Beginning in 1938, Federal Rules of Civil Procedure (FRCP) have governed the discovery of evidence in lawsuits and other civil cases. Discovery is the investigative phase of a legal case when opponents size up what evidence is, or might be, available. During discovery, the parties in a dispute — the plaintiff (party bringing suit) and the defendant (the party being sued) — have the right to request any information in any format relevant to the case from their opponent. Each party has to respond with either the information or a really good reason why the information cannot be presented.
Despite several updates, FRCP remained largely limited to paper until 2006. Evidence, on the other hand, had gone electronic and onto hard drives of computers and handheld devices. To synchronize the legal system to the realities of the digital age when almost everything is e-mailed or viewed on an Internet-enabled device, electronic discovery (e-discovery) amendments to the FRCP were enacted on December 1, 2006. Put simply, changes to the FRCP mean that almost all discovery now involves e-discovery.
In this chapter, you discover how e-discovery rules rocked the legal landscape by making electrically stored information (ESI) discoverable. You read why you must start thinking about e-discovery long before you’re involved in a legal action. Electronic discovery is an inescapable obligation (like paying taxes); you must be able to produce all relevant ESI on demand. To produce data and documents, you have to save them in such a way that you can find, open, and read them. You and your lawyers can expect consequences when stuff goes missing. Armed with this information, you then get familiar with the basic stages in the e-discovery process.
Getting Thrust into the Biggest Change in the Litigation
In April 2006, the United States Supreme Court approved sweeping changes to the Federal Rules of Civil Procedure (FRCP). After getting Congress’s approval, the amended FRCP became law on December 1, 2006. These amended rules are aimed at one issue — the discovery of electronically stored information (ESI). ESI used as evidence is electronic evidence, or e-evidence. Despite their differences, the terms ESI and e-evidence are often used interchangeably.
As you can guess from the title, the discovery of anything electronic is called e-discovery. With most or all decisive evidence being electronic, you need to understand both the legal and technological dimensions of e-discovery — and depending on your job, you may just be competent in one or the other. We talk about the legal side in Chapter 4, which details the new FRCP. Many U.S. state laws are based on federal laws so there’s no escaping e-discovery rules. For a description of the federal rulemaking process, visit uscourts.gov/rules/newrules3.html.
tip.eps You can download a copy of the 166-page FRCP describing its 86 rules from the U.S. Courts’ Web site at www.uscourts.gov/rules/CV2008.pdf. If you’re new to the rules, you might hold off reading them until you’ve read Chapter 4 in this book.
Why did e-discovery rules, in effect, steamroll the litigation landscape? The short answer is that lawyers and litigants were unprepared to comply with this type and volume of discovery and all its complexities. Two reasons account for most of this lack of preparedness.
Lawyers are not IT people. The huge majority of lawyers never had a course in IT (information technology) or e-discovery in their law schools. Electronic evidence lives in many places and forms that are tough to find, collect, store, and interpret without technical skills.
Electronic discovery must be addressed when a lawsuit is filed. When litigation initiates, so does the e-discovery clock. Comparing Figure 1-1 to Figure 1-2, you see how the discovery phase of litigation has changed. Prior to December 2006, discovery was an afterthought. Most litigation doesn’t go to trial, so cases ended before discovery got started. Not anymore.
No matter the size of your case, you need to make sure your lawyer has a clear understanding of the technologies involved and knowledge of the e-discovery rules to meet and manage his e-discovery duties correctly. If your lawyer lacks the tech expertise and the experience to make e-discovery more efficient, you risk e-discovery going wrong; resulting in you getting sanctioned by the judge or maybe even losing your case.
Figure 1-1: Discovery is avoidable if the case is resolved before that phase.
510124 fg0101.epsremember.eps The FRCP applies to every type of litigation. Class action lawsuits, complex corporate fraud, and employment cases (for example, discrimination, wrongful termination, and harassment) involve e-discovery. Government investigations of fraud or improper conduct invariably dig into e-mail, instant messages, contact lists, and appointment calendars. In instances where a marriage is eroding, spouses might want to know and use what the other spouse is searching for on the Internet or texting.
Figure 1-2: Electronic discovery moves to the front of the case.
510124 fg0102.epsNew rules put electronic documents under a microscope
All computer systems, digital devices, and anything with a flash drive used by businesses, government agencies, health care and education institutions, and individuals that store electronic documents (word processing, spreadsheets, calendars, and presentations) are forms of ESI. Everything from terabyte-sized databases to text messages (even Twitter messages, or tweets) may be discoverable (subject to discovery) and, therefore, reviewable by others. Contact lists on an iPhone, legacy data on backup tapes, instant messages on a BlackBerry, posts on MySpace, and GPS and EZ-Pass records may be part of the ESI universe.
remember.eps We use may be
to temper our statements because privileged and confidential content may create exceptions to the rules. You find out about exceptions to the rules, and conditions that cancel (legally, waive) those exceptions, in Chapters 4 and 10.
Here’s how you should go about finding ESI prior to a trial.
1. Conduct an initial search.
Search data stores, often asking for help from data owners or IT experts, to identify documents, e-mails, spreadsheets, financial records, or other ESI that have been requested. Full-text searching is one of the basic tools used to find documents. Full-text and keyword searching are discussed in Chapter 9. You’ll store all documents in a database.
2. Perform a pre-production review.
Review all documents by hand, through a computer review, or most likely using both methods to verify their relevance and to exclude duplicate, privileged, confidential, and irrelevant content. Best practices and pitfalls of pre-production review are covered in Chapter 9.
3. Perform a post-production review.
You hand over the ESI to your opposing party so they can review it. In some cases, the court may appoint a Special Master, or you and your opponent may agree to have a neutral expert review the ES, or you may hire your own expert. A Special Master is a neutral lawyer with technical expertise or an IT expert appointed by the court to manage and resolve e-discovery disputes in such areas as forms of production, keywords, and protocols.
warning_bomb.eps During 2009, e-discovery costs amounted to 90 percent of a litigation budget with a majority of the costs associated with the review of ESI. You can take a big bite out of ESI costs by sticking to a disciplined approach to electronic records management in order to reduce the volume of ESI to review. For example, by requiring users to delete personal e-mail and disposing of electronic records that no longer need to be retained, there’s a lot less ESI to collect, review, and produce.
New rules and case law expand professional responsibilities
Federal rules and case law pertaining to both e-discovery and e-evidence have added technological competence and ESI management to professional responsibilities. Case law is the body of law or precedents created by judges’ written opinions and decisions. Rules are interpreted in case law. That is, what the rules are interpreted to mean are determined by judges’ opinions, which create case law.
For example, case law on how effectively your keyword search methodology has met its discovery obligations were created by the opinions of judges in three cases: USA v. O’Keefe (D.D.C. Feb. 18, 2008), Equity Analytics v. Lundin (D.D.C. Mar. 7, 2008), and Victor Stanley, Inc. v. Creative Pipe, Inc. (D. Md. May 29, 2008). The case law warns that a lawyer’s failure to search an e-discovery database competently will lead to a bad outcome. Subsequent cases involving disputes over keyword or text searching often refer to those decisions.
tip.eps You can find the text of significant e-discovery opinions using the federal court system’s PACER (Public Access to Court Electronic Records) at http://pacer.psc.uscourts.gov. There’s a small fee for accessing certain records.
Groundbreaking e-discovery case law stemmed from five opinions in Zubulake v. U.B.S. Warburg. Zubulake was an employment discrimination case in the Southern District of New York that resulted in opinions that are still referred to as the gold standard in e-discovery. You find out about the Zubulake opinions in Chapter 4.
remember.eps FRCP requires you to quickly find ESI when required by the court. Waiting until you’re facing an e-discovery request (actually, it’s a demand) to start preparing for one can lead to severe sanctions.
Imagine waiting until a fire has started to install a sprinkler system, develop evacuation plans, or conduct fire drills. Inarguably, the new rules and case law have expanded the job descriptions of managers, lawyers, paralegals, litigation supporters, IT administrators, and data custodians.
Your attorneys and paralegals need to be IT proficient. Your attorneys need to know what ESI to request and to be able to defend their requests when vigorously challenged by the opposition. Attorneys also need to understand your IT infrastructure in order to comply with the request, prevent the destruction of evidentiary ESI (see the nearby sidebar about AMD and Intel), and keep a record of searches that you’ve conducted to validate the effectiveness of your searches. Your entire IT department must cooperate with your legal team. You must be able to identify, preserve, and collect ESI. With so much information potentially subject to an e-discovery order, your entire legal team — IT professionals and lawyers — must understand both IT and the law so you inadvertently or deliberately don’t delete ESI that you’re required to preserve.
Biggest e-discovery case catches Intel unprepared
In 2005, Advanced Micro Devices (AMD) brought a lawsuit against its archrival Intel for alleged anticompetitive practices in the chipmaker market. Both parties recognized that they faced the largest e-discovery ever. Estimates of production were roughly a pile 137 miles high.
The Special Master appointed by the court to hear evidence from both AMD and Intel recommended that Intel be compelled to produce documents that it had declined to submit. In March 2007, Judge Joseph A. Farnan, Jr. gave Intel 30 days to recover more than 1,000 e-mails that it should have but did not preserve.
Intel faced several problems. Its e-mail system running on Microsoft Exchange servers automatically purged employee e-mail every 35 days and senior executives’ e-mail every 60 days. Intel used nonindexed backup tapes designed for disaster recovery that were not suited for e-discovery. Trying to find all of the requested e-mail messages that contained specific keywords took a staggering amount of time because each backup tape had to be mounted to restore the contents in order to get them into shape to be searched and reviewed.
In a March 5, 2007 letter to Judge Farnan, Intel’s lawyer advised the court and AMD of its extensive and expensive remediation efforts to find and recover lost e-mails. For e-mails sent by employees that hadn’t been preserved as they should have, Intel planned to locate them from the e-mail in-boxes of employees who’d received them. The letter also stated:
the overall scope of the e-mails and documents Intel will be producing is sweeping in breadth and magnitude — and will encompass the equivalent of tens of millions of pages of material from many hundreds of employees with overlapping involvement in communications, both internal and external.
The court scheduled the AMD v. Intel case for trial in February 2010.
warning_bomb.eps Being unprepared is expensive. An unprepared manufacturing company spent $800,000 filtering its unmanaged e-mail system in response to an e-discovery request. Roughly 88 percent of their e-mails were irrelevant to the litigation and weren’t produced.
Distinguishing Electronic Documents from Paper Documents
When you think of new technology (such as electronic documents) in terms of older technology (circa paper), you don’t appreciate its distinctive qualitiesand capabilities. Legend has it that when electricity was invented and electrical lights replaced gas lamps in 1879, people would change their light bulbs quickly so electricity wouldn’t leak out of the socket. Warning signs were posted that read This room is equipped with Edison Electric Light. Do not attempt to light with match. Simply turn key on wall by the door.
In fine print at the bottom of the signs read The use of electricity for lighting is in no way harmful to health, nor does it affect the soundness of sleep.
The key point is that a technological understanding of electronic documents, devices, and how they are managed is important — so that you don’t take a match to them out of ignorance. A helpful approach is to start by comparing and contrasting characteristics of ESI and paper, which we do in the following sections.
remember.eps Research firm Gartner found that nearly 90 percent of U.S. companies with revenue exceeding $1 billion are facing an average of 147 lawsuits at any given time, and that the average cost to defend a corporate lawsuit exceeds $1.5 million per case.
ESI has more volume
The amount of ESI created per person is measured in megabytes (MB) — roughly 800MB per year. One MB equals 1,048,576 (or 2²⁰) bytes, which would hold the content of a medium-sized novel. A Fortune 1000 pharmaceutical company with more than 70,000 employees archives 35 terabytes (TB) of new e-mail data every year. One TB is roughly 1.1 trillion bytes. The trivia question is, How many pages of data equal one terabyte?
The answer is 75 million pages. Of the 60 billion e-mails sent worldwide on a daily basis, 25 billion are business-related.
Clearly, the volume of ESI is tough to fathom. Unlike paper, the volume of ESI multiplies because ESI replicates itself. When you send e-mail, a copy goes into your sent mail folder and another arrives in each of the receivers’ inboxes, which might get stored on e-mail servers or archived. With paper documents, creating multiple copies requires more time and effort.
ESI is more complex
Electronic documents provide more recordkeeping information than a paper copy because metadata are embedded within it. Metadata is essentially the history of a document written with invisible ink. Every comment, edit, iteration of a document is hidden within that document, chronicling its life. There is also embedded data frequently stored with an ESI document, such as formulas in spreadsheets. Microsoft Office automatically embeds many different types of metadata in word processing, spreadsheet, and other applications. Examples of metadata are
Title, subject, and author
Location where the file is saved
Dates and precise times when the document was created, accessed, modified, and printed
Comments, revision number, total editing time, and the template used to create it
Metadata is discoverable when needed or relevant to a matter at hand. For example, you can use this information when there’s a question of when a document was created or downloaded, whether it was modified, or backdated. Metadata may help authenticate a document, or establish facts material to a dispute, such as when a file was created or accessed, or when an e-mail message was sent.
Seeking out and viewing metadata embedded in a document is mining the document. Many e-discovery disputes are caused by, or because of, metadata. Those disputes are so significant they’ve led to case law.
Williams v. Sprint is a landmark case concerning metadata. It established the standard that the producing party should produce electronic documents with their metadata intact.
By mining a document, your attorney can view revisions made to the document, comments added by other users who reviewed the document, and whether it was drafted from a template. The disclosure of metadata can lead to the disclosure of client confidences and secrets, litigation strategy, editorial comments, legal issues raised by the client, and other confidential information. See Chapter 10 for explanations of these issues.
ESI is more fragile
Electronic documents are much easier to alter than paper documents without leaving a visible sign of the alteration. The sender of e-mail messages can spoof, or fake, the sender’s identity — a spammer’s tool of the trade. Data and files can be modified deliberately in numerous ways that may be detectable only with computer forensic techniques. We discuss recovering deleted data in Chapter 2. (For more computer forensics techniques, check out Computer Forensics For Dummies, by Linda Volonino and Reynaldo Anzaldua.)
Files can become corrupted. Hard drives crash. Users accidentally or deliberately can overwrite a file by saving a new file with the same filename as an existing one. Backup tapes get re-used, lost, stolen, or may break or get corrupted. Auto-delete policies may delete e-mails after a certain amount of time, even without an intentional action to delete them.
Figure 1-3 contrasts how paper and ESI are destroyed or altered and how they are preserved. Because ESI exists only on some storage media and that media may be overwritten, corrupted, or otherwise be unreadable, you should take affirmative steps to preserve it. Absent deliberate action to preserve the ESI, the expectation is that it will be destroyed or altered. The courts understand this principle. So must you.
Figure 1-3: Differences in how paper and ESI are destroyed and preserved.
510124 fg0103.epsESI is harder to delete
Electronic documents are much more difficult to dispose of than paper documents even though they’re fragile. The fragility/persistence paradox causes a lot of confusion. Jeff Rothenberg, a senior computer scientist at RAND, captured the paradox by pointing out humorously that digital information lasts forever, or five years — whichever comes first.
RAND (www.rand.org) is a nonprofit institution whose mission is to conduct research and analysis to help improve policy and decision-making.
For example, changing the data or formula in a cell of an Excel spreadsheet could be a destructive change (no traces of the change) if there are no other copies of that file or tracking changes is turned off. A destructive change or update is one that destroys the prior contents beyond recovery or detection. If you instead delete the Excel file from a hard drive and take the extra step of deleting it from your Recycle Bin, the entire file will remain intact in the same position on the drive unless it is overwritten. You read more about what happens when a file is deleted in Chapter 2. Computer forensics software could recover that file along with information about when it was deleted.
Deleting documents is futile if they were saved to a server, backed up, or e-mailed. Misunderstanding persistence may lead to the discovery of information that was never intended to be retained or that no one knew existed.
There’s also the auto-recover or auto-save feature found in software programs that prevents data loss by automatically creating a backup copy of any currently open document every few minutes or other time interval. This so-called replicant data is stored on the hard drive as separate documents. Because they may not be deleted when the application program (such as Word) closes, they persist as copies of documents long since changed or deleted.
ESI is more software and hardware dependent
Data is unreadable or meaningless when separated from its original or native software environment. You need software to open and view a file correctly.
If you have five-and-a-quarter inch floppy disks and no computer with that drive, you cannot get at those files. If you don’t have the correct software version, you can’t open the file. Files stored on floppy disks, Zip drives, or other outdated media can’t be accessed without hardware that can read them. If information has been transferred to backup tape, it may be difficult to restore the information because of technology upgrades or deterioration of the tape. When you change accounting software applications, for instance, you may not be able to access legacy (old) data years afterward.
Viewing the Litigation Process from 1,000 Feet
When you get involved in the litigation process, some milestones you can be involved with are shown in Figure 1-4. Notice the rather tight timeline and the two deadlines, which are specified by the amended FRCP. Total elapsed time from when the complaint is served (or lawsuit filed) until your lawyer submits your e-discovery plan to the court is only 120 days. The trial may be scheduled far into the future, which happened with AMD v. Intel. AMD filed the complaint in 2005; the trial is scheduled for 2010.
Figure 1-4: Overview of the litigation process.
510124 fg0104.epsAlthough the purpose of the new rules is to provide early structure, uniformity, and predictability to the litigation process, the reality is that right from Day 1 of a lawsuit, you must be ready to start evaluating with your IT team and legal counsel where you stand in terms of your ESI.
Here are the deadlines you need to observe:
Time minus zero: Duty to preserve. You need to take affirmative action — active and timely measures — to prevent the destruction or alteration of what might be relevant e-evidence. This duty generally begins when you reasonably anticipate a legal action. That’s a tough duty to comply with. Clairvoyance would be helpful because the scope of what needs to be preserved and when are not clear.
tip.eps Accept that it’s difficult under the best of circumstances to know when your duty to preserve has triggered or what you need to preserve. Consult with your in-house counsel on when your duty to preserve ESI kicks in.
Day 1: Complaint served. You’re on solid ground here because there’s no mistaking that a lawsuit is in play. This action starts a clock that counts off days.
By Day 99: Meet-and-confer session. You must participate in a meet-and-confer session during which you cooperate with your opponent to negotiate an e-discovery plan. This type of cooperation is new and also a bit of a shock to the legal system that’s used to being adversarial. The list of topics to negotiate includes the following:
• Any issues relating to preserving discoverable ESI
• Any issues relating to search, disclosure, or discovery of ESI
• Format in which ESI should be produced
• Scope of ESI holdings
• Estimated costs in terms of difficulty, risk, time, and money of producing the ESI
By Day 120: Scheduling conference. A scheduling conference is a hearing attended by all attorneys — yours and your opponents — and the judge to schedule certain dates and deadlines for the case. This event is generally the first time you come before the court.
By forcing these events early on in a case, by way of the FRCP amendments and case law, you really have no choice but to be ready to move forward with e-discovery at the start of a case.
Examining e-Discovery Processes
When you’re involved in the e-discovery process, regardless of the type of case or investigation, you need to perform certain functions and meet requirements. Expect that none of the requirements is easy or cheap (in terms of time or money). On the plus side, performing them correctly saves time, effort, disruption, and stress. You face the following e-discovery functions.
Creating and retaining electronic records
Getting ready for e-discovery requires you being proactive. A standard used to evaluate proactive readiness is reasonableness. Your ability to demonstrate reasonableness starts with having established control over data, documents, and other electronic records. The base on which e-discovery is built is electronic records management (ERM). ERM is known by other names, such as records and information management, or RIM.
Here’s how to set up an electronics rights management system:
1. Develop an electronic record retention policy.
In light of litigation trends and declining storage costs, you can fall into the trap of believing that it’s wise to save generously. Developing a keep-it-all retention policy is not the best approach because it focuses on the wrong factor — storage costs.
You may think the FRCP requires you to save everything or save all e-mails. Regulated industries or certain types of companies, such as those in the financial, healthcare, and pharmaceutical sectors, have government regulations in place such as save all communications for seven years. But absent such regulation, the Supreme Court has indicated that you can set your own reasonable retention policy.
Even if storage is cheap, management is costly. Good ERM is expensive because of the management, not the storage. As you read in Chapters 2and 3, you need to keep your eye on the costs of reviewing electronic records to identify responsive ones. Define what is essential and needed as opposed to saving everything.
warning_bomb.eps Without an enforceable retention program and a secure, auditable archive and electronic records management solution, the costs associated with e-discovery are daunting, as you read in the AMD v Intel case.
2. Implement the electronic records retention policy.
Even your best electronic records retention policy is of little use if employees don’t implement it in a correct and uniform manner. Everyone who deals with records — employees, contract workers, interns, and vendors — must receive sufficient and proper training on the policy. You need to document the training in detail.
3. Monitor compliance with the policy.
Most likely, your retention program is partially automated and partially manual because end users need to categorize their records. To verify that retention requirements continue to be met, you have to monitor compliance.
4. Destroy electronic records at the end of retention periods.
When electronic records no longer need to be retained, you need a secure way to destroy them.
5. Change policies when you reasonably foresee litigation.
As soon as you reasonably expect to be involved in litigation, you must immediately set aside your ordinary electronic record retention program and implement a more demanding policy. This litigation-hold policy is critical, as you read in Part III. The litigation-hold policy must comply with the special requirements established at the meet-and-confer session and the scheduling conference.
remember.eps No model
electronic records retention program fits all. You should base your retention program on a case-by-case examination of your business, the legal and regulatory requirements of your industry and jurisdiction, and what use your company is likely to make of the documents, both for business and litigation purposes.
Identifying, preserving, and collecting data relevant to a legal matter
Assuming that electronic records are managed properly, the next step when facing litigation is to identify the relevant records, preserve them so they cannot be altered, and collect them for further review.
tip.eps Methods used to identify relevant ESI may have been agreed to at the meet and confer or scheduling conference — although the duty to identify and preserve did start before this conference, when litigation was reasonably anticipated. If the meet and confer or scheduling conference has already happened, ask your lawyer whether an agreement is in place.
You have to preserve the ESI until it’s needed. Preservation takes many forms, as discussed in Chapters 2 and 7. One of your difficulties at this stage is preserving data that is in use by the business. A lot of attention in case law has focused on data that is not reasonably accessible (see Chapters 2 and 3). Equally challenging is preserving live data because you cannot simply hand over a backup tape.
acloserlook_ediscovery.eps The standard for duty to preserve comes from the opinion of District Court Judge Shira A. Scheindlin, from the Southern District of New York, in Zubulake v. UBS Warburg LLC, 220 F.R.D. 212 (S.D.N.Y., Oct. 22, 2003). That case is referred to as Zubulake IV because it was the fourth in a series of what are called the Zubulake decisions.
Processing and filtering to remove the excess
As with every stage in the e-discovery process, there are strategies and best practices for the processing and filtering of ESI. After preserving and collecting the ESI, you’ll confront the costly tasks of processing and reviewing the data for responding to the investigation, claim, or litigation.
Determining what to process is a balancing act of costs and risks. Gartner estimates the cost of reviewing 1GB for e-discovery is $18,750. Clearly, costs are reduced by reducing the volume to be filtered. Risks are increased by reducing the amount of ESI to process because relevant e-evidence might be excluded. Breaching e-discovery obligations can result in sanctions or worse even if processing and filtering were done in good faith. In Chapter 9, we explain this critical stage in detail.
Reviewing and analyzing for privilege
Confidential conversations and communications that are protected by law from