Electronic Discovery and Digital Evidence in a Nutshell
Authors:
Scheindlin, Shira A. / SEDONA CONFERENCE
Edition:
2nd
Copyright Date:
2016
21 chapters
have results for electronic discovery and digital evidence
Chapter XII. Admissibility of Digital Evidence 110 results (showing 5 best matches)
- Digital evidence is now offered in virtually every motion, hearing, or trial. Examples include emails and text messages, social media pages, cellphone records, GPS information, spreadsheets, evidence from websites, digitally enhanced photographs, PowerPoint presentations, videos, and computer-generated versions of disputed events. This Chapter addresses whether digital evidence presents admissibility problems different from those associated with traditional “hardcopy” forms of evidence. It is important to note that as of December 1, 2011, the Federal Rules of Evidence were restyled to specifically recognize the potential admissibility and use of electronic evidence. New Rule 101(b)(6) provides that “a reference to any kind of written material or any other medium includes electronically stored information.” Thus, digital evidence is admissible whenever hardcopy evidence of the same type would be admissible.
- court excluded the digital presentation, it must be remembered that Rule 403 is a rule that is geared toward evidence: under Rule 403, relevant evidence must be admitted unless its probative value is by the risks of prejudice, jury confusion, and delay. This means that a digital presentation need not track the underlying facts with absolute exactitude.
- We conclude this chapter by noting that there are other forms of digital evidence that we have not specifically addressed—such as YouTube and other online videos or Yelp and other online reviews—but there will always be new forms of digital evidence. Suffice it to say that the principles covered in this chapter will apply to the authentication, and therefore the admissibility, of such evidence. And, as discussed above, the proponent of the evidence must also be conscious of hearsay concerns as well as those of authentication.
- Digital presentation to illustrate an expert’s opinion:
- The presentation of digital evidence may raise issues of reliability under even when it is not presented as part of an expert’s testimony. For example, if the opponent of digital evidence raises a legitimate question about the operation of a software program, the proponent may be required to show that the program produces reliable results.
- Open Chapter
Chapter VII. Challenges to—and Costs of—Ediscovery 101 results (showing 5 best matches)
- , 2011 WL 2565666 (N.D. Ill. June 27, 2011), where the court refused to award costs related to electronic discovery absent an explicit agreement by the parties. “Defendant seeks to recover … $17,778.64 for imaging and creating electronic versions of documents which the parties exchanged in discovery. Such expenses are taxable under [section 1920] when the parties have agreed to produce documents electronically. In this case, Defendant has not produced evidence that the parties agreed to such electronic production.”
- CBT requested, and Cisco IronPort produced, a massive quantity of data. In response to the Court’s Scheduling Order, the parties agreed that document production would be made in electronic format. Cisco IronPort has asserted—without contradiction—that production in paper form of the 1.4 million documents plus 6 versions of source code would have cost far more than the fees sought for the e-discovery consultant. A careful review of the GGO invoices reveals that the services provided are not the type of services that attorneys or paralegals are trained for or are capable of providing. The services are highly technical. They are the 21st Century equivalent of making copies. The services are certainly necessary in the electronic age. The enormous burden and expense of electronic discovery are well known. Taxation of these costs will encourage litigants to exercise restraint in burdening the opposing party with the huge cost of unlimited demands for electronic discovery.
- The circuit court then defined the terms “exemplification” and “making copies.” Looking at both case law and secondary sources, it defined “exemplification” as either the creation of demonstrative evidence or the authentication of public records. The noun “copy” is defined as “an imitation, transcript, or reproduction.” The circuit court noted that most of the ediscovery costs consisted of collecting and preserving ESI, processing and indexing ESI, keyword searching of ESI for responsive and privileged documents, converting native files to TIFF, and scanning paper documents to create electronic images. “Of the activities undertaken by the vendors, only the conversion of native files to TIFF (the agreed-upon default format for production of ESI), and the scanning of documents to create digital duplicates are generally recognized as the taxable “making copies of material.”
- The court then considered UBS’s argument that if further discovery is allowed, all costs should be shifted to plaintiff. Quoting Supreme Court precedent, the court stated “the presumption is that the responding party must bear the expense of complying with discovery requests” and that “cost-shifting should be considered only when electronic discovery imposes an ‘undue burden or expense’ on the responding party.” The court went on to observe that “whether production of documents is unduly burdensome or expensive turns primarily on whether it is kept in an accessible or inaccessible format (a distinction that corresponds closely to the expense of production)…. Whether electronic data is accessible or inaccessible turns largely on the media on which it is stored.”
- The statute makes no reference to ESI, apart from transcripts. Prevailing parties seeking to recover costs related to electronic discovery have attempted—with only limited success—to fit those costs under 28 U.S.C. §1920(4), “Fees for exemplification and the costs of making copies.”
- Open Chapter
Chapter III. Meet and Confer (Rule 26(f)) and Initial Scheduling Conference (Rule 16) 37 results (showing 5 best matches)
- Because electronic discovery consultants are often hired to assist attorneys in retrieving, preserving, and producing electronic information, it might be wise to have these consultants participate in the Rule 26(f) meet and confer process in order to have meaningful discussions about electronic discovery issues.
- In determining that sanctions were warranted for discovery abuse in , the court analyzed the whole of the discovery process leading up to the parties’ dispute. The parties’ efforts to meet and confer made up a very important part of this larger examination. Thus when attorneys engage in meet and confers and other electronic discovery activities they should anticipate that the court may eventually scrutinize these activities. For this reason a litigant may choose to make a written record (a memo to file) of the meet and confer process. Moreover, the court criticized defendant for shielding its electronic discovery consultant from contact with plaintiffs. Significantly, the court argued that this failure to include knowledgeable electronic discovery consultants in the meet and confer is “antithetical to the Sedona Principles and is not an indicium of good faith.”
- The 2015 Amendments add three items to the list of permitted content in the Rule 16 order. These new topics are preservation of ESI, agreements under Rule 502 of the Federal Rules of Evidence, and whether the parties must request a pre-motion conference with the court before making any motion relating to a discovery dispute. The importance of the Rule 26(f) meet and confer is indirectly underscored by Rule 16(f)(1)(B), which authorizes a court to impose sanctions on a party or its attorney if either “is substantially unprepared to participate—or does not participate in good faith—in the [Rule 16 pretrial] conference.” The Rule 26(f) meet and confer requirement facilitates the early identification of electronic discovery issues in order to prevent expensive and time-consuming discovery disputes. Once identified, the parties must be prepared to discuss any potentially problematic electronic discovery issues at the Rule 16 pretrial conference.
- Four other topics were introduced in the 2006 Amendments to Rule 26(f), which required the parties to discuss the following: (1) the preservation of evidence, with a focus on electronic records; (2) the discovery or disclosure of ESI; (3) the form that the production will take; and (4) a procedure for retrieving inadvertently produced privileged information. In addressing these issues attorneys have a duty to cooperate in order to achieve the just and speedy resolution of the case.
- Some state courts have followed suit. In 2006, the Conference of Chief Justices recommended that, following an initial discovery hearing or conference, a judge “should inquire whether counsel have reached agreement on [a variety of electronic discovery issues] and address any disputes.”
- Open Chapter
Chapter IX. Ethical Issues in Ediscovery 84 results (showing 5 best matches)
- Electronic discovery has significantly changed the way counsel (in-house and outside) interact with their clients when litigation is pending or threatened. Lawyers also may have to confront two potentially countervailing interests—their obligations to their clients and their ethical duties as officers of the court. While this dilemma is certainly not new to attorneys, the age of electronic discovery has added a new twist to the tension between these two obligations. This section identifies ethical concerns that lawyers face regarding their duties of candor, competence, and fairness to the court and opposing counsel when confronting electronic discovery, and concludes with a discussion of the ethics of cooperative, non-adversarial discovery.
- Because it is impermissible to alter electronic documents that constitute tangible evidence, the removal of metadata may, at least in some instances, be prohibited as well. In addition to issues regarding discovery sanctions, the alteration or destruction of evidence can,
- As noted earlier, lawyers cannot relieve themselves of their ethical obligations by outsourcing the work associated with electronic discovery to a vendor without direct supervision. Attorneys have an obligation to monitor the discovery process and ensure that relevant non-privileged information is identified, preserved, reviewed, and produced. For instance, Rule 26(f) mandates that a lawyer must understand and competently investigate the electronic storage systems used by her client so that the lawyer can properly participate in the Rule 26 conference.
- Ensuring that discovery procedures are properly followed involves adequately advising and instructing clients regarding their obligations in discovery. Courts have not shied away from penalizing parties and their lawyers who fail to competently handle electronic discovery. For example, in , 288 F.R.D. 386 (D. Md. 2013), the court held that “plaintiff’s counsel’s failure to identify and produce [client’s email] discovery in a timely fashion and in an acceptable form and manner while suggesting—if not misleading defendants—that it had identified responsible documents is sanctionable.”
- The mandatory initial disclosure requirement of Rule 26(a) and the “meet and confer” requirement of Rule 26(f) are useful mechanisms for expediting discovery, reducing costs, and avoiding conflict, when carried out in the spirit of candor, competence, and fairness found in the rules of professional responsibility. Many thoughtful lawyers—and many clients—would like to go further. Looking at the examples of arbitration and mediation, they question why discovery must be an adversarial process. If the goal of discovery is to uncover facts to be used in settlement talks or at trial, it would seem wise to cooperate in the discovery process, and utilize advocacy and persuasion skills to argue the interpretation of the facts and the application of the facts to the law. Should an attorney’s duty of zealous advocacy and loyalty to the client include getting the best result at a reasonable cost and within a reasonable time frame? In the summer of 2008, these questions led members of The...
- Open Chapter
Chapter VI. Production of ESI 147 results (showing 5 best matches)
- Understanding when metadata is relevant and subject to preservation and production represents one of the biggest challenges in electronic discovery. Sometimes metadata is needed to authenticate a disputed document or to establish facts material to a dispute, such as when a file was accessed in a suit involving theft of trade secrets. In most cases, however, the metadata will have no material evidentiary value—it does not matter when a document was printed, or who typed the revisions, or what edits were made before the document was circulated. When addressing forms of production—either in the initial discovery planning conferences under Rule 26(f), or in the formal Request for Production under Rule 34, or in a dispute over production—it is important that all parties, and the court itself, have a common understanding of the terms being used. “Native Format,” for instance, is a term that is often used without a clear, common
- The Sedona Conference Glossary of E-Discovery and Digital Information Management, Third Edition
- Data created and maintained by the electronic discovery vendor as a result of processing the document. While some vendor-added metadata has direct value to customers, much of it is used for process reporting, chain of custody and data accountability. Contrast with User-Added Metadata.
- The form of production of electronic records is often the subject of dispute resulting from the parties’ failure to adequately communicate and reach agreement on this issue. In , 247 F.R.D. 43 (D.D.C. 2008), plaintiff filed an action against her former employer alleging gender discrimination and retaliatory termination from her job. In discovery, she moved to compel production of defendant’s Business Plan in its original electronic format, claiming that the instructions in her original Request for Production should be interpreted as a request for all ESI in its original electronic format: “[F]or any documents that are stored or maintained in files in the normal course of business, such documents shall be produced in such files, or in such a manner as to preserve and identify the file from which such documents were ...court rejected plaintiff’s argument, noting that it appears to refer to a physical file cabinet or folder. But even if one assumes that “file” refers to electronic...
- When a party intends to produce a significant number of electronic document as digital images, they should be accompanied by a load file to make the production reasonably useable. As defined in , a load file “indicates where individual pages or files belong together as documents, to include attachments, and where each document begins and ends. A load file may also contain data relevant to the individual documents, such as selected metadata, coded data, and extracted text.”
- Open Chapter
Chapter V. Search and Review of ESI 122 results (showing 5 best matches)
- The use of carefully derived and vetted selection criteria is a reasonable approach when dealing with large amounts of electronic data. Indeed, one of the key advantages of electronic data—and one of the key, underlying reasons for dealing with electronic data in electronic form—is that high-speed, efficient, automated methods exist to identify potentially relevant information, thereby allowing large, co-mingled sets of data to be defensibly and efficiently brought into the discovery process.
- Prior to the advent of electronic discovery, little attention was given to measuring the effectiveness of manual search efforts. As ESI grew, and was explicitly recognized as discoverable in the 2006 amendments to the Federal Rules, keyword search strategies were widely adopted with equally little attention to formal validation. Several spectacular failures, detailed in the previously described cases, resulted in admonishments from the courts to review search terms and to test or sample the results, but best practices for testing and sampling to validate keyword search efforts have yet to become entrenched. The use of TAR for electronic discovery and increased attention to formal validation have occurred contemporaneously; however, there is no reason why TAR efforts should be subject to more (or less) stringent validation than manual review or keyword searches.
- At the simplest level, one can take advantage of the fact that the discovery is in electronic form to perform tasks that can be accomplished quickly, easily, and
- Electronic discovery requires cooperation between opposing counsel and transparency in all aspects of preservation and production of ESI. Moreover, where counsel are using keyword searches for retrieval of ESI, they at a minimum must carefully craft the appropriate keywords, with input from the ESI’s custodians as to the words and abbreviations they use, and the proposed methodology must be quality control tested to assure accuracy in retrieval and elimination of “false positives.” It is time that the Bar-even those lawyers who did not come of age in the computer era-understand this.
- Traditional discovery process models, such as printing documents to a paper or image format for page-by-page review by lawyers or legal assistants, quickly break down when applied to substantial volumes of ESI. Even apart from the data loss issues associated with the conversion of electronic files to paper or image formats, the costs to complete such a manual review in the tight timeframe of discovery are prohibitive. Alternatives—all of which involve some use of technology to automate the process—must be explored.
- Open Chapter
Introduction 20 results (showing 5 best matches)
- The remaining changes to Rule 26(b)(1) are important but will not be as significant as the scope change. The new Rule states that “[i]nformation within this scope of discovery [ , relevant to a claim or defense and proportional to the needs of the case] need not be admissible in evidence to be discoverable. But it eliminated the phrase “if the discovery appears reasonably calculated to lead to the discovery of admissible evidence” which has always followed the phrase “need not be admissible in evidence.” The idea behind this change is to be sure that the scope of discovery is tightly limited to claims or defenses, proportional to the matter, and nothing more. While the requested information need not be admissible in evidence to be discoverable, it cannot be discovered merely because it might lead to the discovery of admissible evidence. Notwithstanding the view of the Advisory Committee, many view this change as a further effort to narrow the scope of permissible discovery.
- There are other important changes to Rule 26. Rule 26(c)(1)(B) explicitly recognizes, for the first time, the power of the court to allocate discovery or disclosure costs when considering granting a protective order. Nonetheless, the Committee Note states that: “Courts and parties should continue to assume that a responding party ordinarily bears the costs of responding.” Rule 26(d)(2) provides that parties may serve Rule 34 requests 21 days after service of complaint— , there is no longer a need to wait for a Rule 26(f) conference among the parties before serving a document request—but the request will not be considered as served, from a temporal perspective, until the date of the first 26(f) conference. The Committee Note provides that the purpose of this change is to “facilitate focused discussion during the Rule 26(f) conference.” This change makes a lot of sense. If the parties know what is being sought in discovery they are more likely to have a productive “meet and confer” to...
- , the amended Rule eliminates once and for all any reference to discovery of the “subject matter” of the litigation. , the Rule now defines the scope of discovery as that which relates to the claims or defenses and is proportional to the needs of the case. In order to determine whether a request for information satisfies the proportionality test the parties (and the court if necessary) should consider the (1) importance of the issues at stake, (2) amount in controversy, (3) parties’ relative access to relevant information (this one is a new factor not found in Rule 26(b)(2)(c)(iii), the current proportionality rule), (4) parties’ resources, (5) importance of the discovery in resolving the issues, and (6) whether the burden or expense of the proposed discovery outweighs its likely benefit.
- Another important change—and one we particularly like—is that the court may order, as part of its scheduling order, that before a party files any motion relating to discovery, the movant must first request a court conference to discuss the issue. This is known as a pre-motion conference. The benefit of such a conference is that the court may well be able to resolve the discovery issue on the spot based on letter submissions without the need for full briefing and the resulting delay of deciding a formal motion.
- Finally, the new Rule eliminates the language now found in the scope rule which permits discovery “regarding the existence, description, nature, custody, condition, and location of documents … and the identity and location of persons who know of any discoverable matter.” The rule makers believed that it is now so well established that a party is entitled to such discovery that it was no longer necessary to make such an explicit statement in the Rule. The danger, of course, is that someone will argue that because this language is no longer in the Rule it must mean that a party is not necessarily entitled to obtain this information. We think such an argument should and will be swiftly rejected.
- Open Chapter
Chapter X. Electronic Discovery in Criminal Cases 69 results (showing 5 best matches)
- In 1998, the Department of Justice, together with the Office of Defender Services, the Federal Defender Organizations, and private attorneys who accept Criminal Justice Act appointment formed the Joint Electronic Technology Working Group (JETWG). In 2012, this Group produced three documents for managing ESI discovery in criminal cases, with the goal of achieving the efficient and cost-effective management of post-indictment ESI discovery between the Government and defendants in federal criminal cases. The documents include Recommendation for ESI Discovery in Federal Criminal Cases, Strategies and Commentary on ESI Discovery in Federal Criminal Cases, and an ESI Discovery Checklist.
- Most courts have held that nothing about electronic information requires the government to provide more information than is already required by Rule 16 and the Constitution. Specifically, most courts have rejected the premise that the electronic discovery rules found in the Federal Rules of Civil Procedure are applicable in criminal cases. For example, in , 631 F.3d 266 (6th Cir. 2010), the court held that the federal civil rule requiring electronic data to be turned over in a searchable form is not applicable to criminal cases.
- Another interesting issue is the vast volume of electronic data and how that might affect the defendant’s right to a speedy trial. In 2008 WL 2098044 (S.D. Ohio May 16, 2008), the court found that the sheer volume of data produced by the government—combined with its erratic and unmanageable method of turning it over—prejudiced defendants by the delay necessary to review all the material, and therefore dismissed the indictment based on a violation of the Speedy Trial Act. But in 2010 WL 933752 (D. Haw. Mar. 9, 2010), where the discovery included millions of electronic documents, thirty computer hard drives and three servers, the court denied a similar motion, finding that “the delays in this case may be attributed at least in part to the nature of e-discovery, the complex nature of the alleged crimes, and the necessity of coordinating various branches of government in the investigation.” Any risk of being accused of producing a document dump will be mitigated if the material is...
- Discovery in the criminal context is quite different than on the civil side. Typically, much of the evidence is collected by law enforcement agents there is an indictment. Once the case begins, defendants are entitled to very limited disclosure under Rule 16 of the Federal Rules of Criminal Procedure and under the rule of , 373 U.S. 83 (1963), which requires that the government produce any evidence that could be used to exculpate defendant, or impeach the government’s witnesses. When the government does have information to provide it might well be digital information stored in a variety of formats, raising many of the same questions of preservation, proportionality, form of production, and privilege that appear in civil litigation. These issues are exacerbated by the fact that the majority of defendants in our criminal justice system, state or federal, are represented by public defenders or court-appointed counsel with limited resources, and many defendants are incarcerated with...
- , 2014 WL 4510266 (S.D.N.Y. Sept. 12, 2014), the court addressed the question of whether to appoint a CDA in an eight-defendant narcotics conspiracy case. In that case the court declined to appoint a CDA, although it noted that several other courts had done so. The court expressed serious legal and ethical concerns with appointing a CDA. She began by noting that not all of the eight defendants were similarly situated in the hierarchy of the conspiracy and may have divergent interests in resolving their cases. Her concern was that the CDA—as an attorney—would essentially be representing eight different defendants, which might cause conflicts of interest. The judge also noted that each defendant is entitled to his own counsel who is responsible for every aspect of his defense and who has an undivided loyalty to his client. The judge expressed concern that one attorney should be responsible for searching electronic databases on behalf of all defendants, who might have divergent interests
- Open Chapter
Chapter I. Electronic Discovery: Types and Sources 43 results (showing 5 best matches)
- As illustrated above, the volume and complexity of ESI, as created and managed in the ordinary course of business, would be enough to distinguish electronic discovery from conventional, paper-based discovery. The collection of ESI from custodians, system administrators, and third parties is discussed in detail in Chapter IV. However, electronic information systems provide a more technologically sophisticated method of collecting relevant ESI—computer forensics.
- The Sedona Conference® Glossary: E-Discovery & Digital Information Management
- Discovery is the process of identifying, preserving, collecting, analyzing, and producing evidence in legal actions. “Ediscovery” is simply the discovery of information and data that is stored electronically, including email, instant messages, social networking content, and any other information that may be stored on desktops, laptops, file servers, mainframes, smart phones, home computers, in the cloud, or on a variety of other platforms. This information and data is collectively referred to as electronically stored information, or “ESI.”
- The key question regarding the recovery of deleted ESI is whether or not the facts surrounding the matter at hand suggest that data recovery is needed. As with imaging, data recovery software is commonly available, and because many of the training programs in the field of electronic discovery revolve around forensics and data recovery, there is a bias in favor of utilizing these tools. But unless an argument can be made that the matter at hand will benefit from the recovery of deleted ESI, there is no reason to attempt such recovery just because the technology exists to do it.
- A virtual workgroup is a group of individuals who work on a common project using digital technologies such as email, instant messaging, shared application programs and databases, calendaring, and file management. While the custodians create some of the content for the application, file naming, management, storage, backup, and longevity are handled either by organization rules or by a custodian named as the workgroup leader.
- Open Chapter
Preface 5 results
- Because so few cases—civil or criminal—are tried, discovery has become the central focus of litigation. Today, the vast majority of records are created and maintained electronically. Thus, “paper” discovery is a thing of the past and “ediscovery” is the present and future. The creation and storage of electronic records, and the extraordinary volume and diversity of those records, create new challenges regarding preservation, collection, review, production, and admissibility in evidence. This Nutshell acquaints the reader with the technologies involved, the rules, the case law, and some essential practice considerations. Most importantly, this edition describes the significant amendments to the Federal Rules of Civil Procedure that take effect on December 1, 2015. The impact of these amendments on ediscovery law and practice are explained in the Introduction and throughout the book.
- The first edition of this Nutshell was published in April 2009. Since then, there have been significant developments in technology, case law, the Federal Rules of Civil Procedure and the rules of professional responsibility related to electronically stored information (“ESI”). This Nutshell is intended for a diverse audience—law students studying civil procedure, criminal law, trial practice, or evidence; practitioners looking for a handy guide to issues involving ESI that arise daily; and judges or law clerks looking for a quick introduction or refresher on common ediscovery and electronic evidence issues.
- This Nutshell closely mirrors the more detailed treatment of these issues in Scheindlin, Capra, and The Sedona Conference
- The co-authors of this Nutshell are Judge Shira A. Scheindlin of the Southern District of New York, and Kenneth J. Withers, the Deputy Executive Director of the Sedona Conference . Judge Scheindlin is recognized as a leading figure in ediscovery, as a member of the Advisory Committee on Civil Rules and a member of the Discovery Subcommittee that drafted the 2006 amendments addressing the discovery of ESI. She is also the author of the landmark and . We also wish to thank Judge Scheindlin’s staff assistants who helped with the updates to this Nutshell—Clifford Bloomfield, Kiel Brennan-Marquez, Peter Dubrowski, Russell Mawn, Rachel Schwartz, Anuja Thatte, and Andrew Todres.
- We are confident that students and practitioners who use this Nutshell will find it to be an invaluable guide to the current state of ediscovery law and practice. We are sure of one thing: What began as a niche area of civil procedure is quickly becoming a
- Open Chapter
Chapter II. Preservation of Electronic Information 144 results (showing 5 best matches)
- As noted in the Introduction to this book, Rule 26(b)(1), governing the scope of discovery, will change as a result of the 2015 Amendments to the Federal Rules of Civil Procedure. A brief summary here will set the stage for the remainder of this Chapter. Discovery is limited to non-privileged matters that are relevant to any party’s claim or defense. Discovery as to the “subject matter” of the litigation is no longer permitted even upon a showing of good cause. In addition, and for the first time, the scope of discovery is defined as that which is proportional to the needs of the case. The test for proportionality is set forth in the Rule and requires the parties (and eventually the court) to assess six factors: (1) the importance of the issues at stake in the action; (2) the amount in controversy; (3) the parties’ relative access to relevant information; (4) the parties’ resources; (5) the importance of the discovery in resolving the issues; and (6) whether the burden or expense of...
- and
- Obviously, the parties to litigation have an obligation to preserve relevant evidence, including ESI, as soon as the duty to preserve arises. But what are the obligations of parties to preserve relevant information they know is held by nonparties? Today, many businesses outsource their IT needs, both maintaining day-to-day electronic data on servers owned and operated by nonparty hosts and storing long-term inactive data, such as disaster recovery backup tapes and other archival data, with vendors providing off-site storage.
- of documents (paper and electronic data) which must be preserved. All electronic data and paper documents including drafts, email negotiations and communications related to or about any of these categories must be preserved.
- I acknowledge I have read the above attached Litigation Hold memorandum. I will immediately conduct a reasonable search for responsive paper documents and electronic data. I will preserve any such electronic data and paper documents. I will not delete any data from any locations that I believe may contain responsive electronic data. I understand that this preservation request is ongoing and requires the continuing preservation of data, including data created or received both before and after receipt of this Notice.
- Open Chapter
Chapter IV. Collection of ESI 106 results (showing 5 best matches)
- The collection of data from mobile and personal devices, such as smart phones, tablets, and digital watches, is a rapidly-evolving area of ediscovery, presenting a host of technical issues that may require expert assistance. As discussed in Chapter II.D., Bring Your Own Device (“BYOD”) policies in many organizations are introducing a plethora of information technology management issues, including the preservation and collection of data in response to civil discovery, internal audit, and government investigation responsibilities.
- Qualcomm violated its discovery obligations by failing to produce more than 46,000 emails and documents that were requested in discovery and that Qualcomm agreed to produce…. Qualcomm has not established “substantial justification” for its failure to produce the documents. In fact, Qualcomm has not presented any evidence attempting to explain or justify its failure to produce the documents. Despite the fact that it maintains detailed records showing whose computers were searched and which search terms were used….
- The preceding three Chapters on technology, preservation, and the discovery planning conferences set the stage for the actual process of electronic discovery: the collection of potentially relevant ESI; the search and review of that ESI for relevance to specific claims, defenses, disputed facts, or privileges in the litigation; and the production of ESI in response to specific requests under either Rule 34 or Rule 45. These are covered in Chapters IV, V, and VI. These three Chapters do not purport to be a comprehensive set of “how to” instructions for conducting ediscovery activities. Instead, they highlight the considerations that need to be addressed in undertaking these activities, based on the rules and the case law. In doing so, they illustrate that these are not simply mechanical tasks, but complex undertakings that require planning, execution, and supervision by persons well versed in both the specific circumstances of the case and the applicable law.
- Ediscovery, however, involves the collection of a much greater volume of potentially responsive ESI from sources with which the custodians may not be technically adept at searching or extracting. The custodian may not even be aware of the existence of important sources of responsive ESI, such as shared drives, cloud-based applications, or informal backup media, which are not maintained or managed by any particular custodian. In addition, electronic discovery may involve an entirely different set of custodians—the organization’s IT staff—who regularly handle the ESI and are far more technically adept at searching and extracting ESI, but have little or no knowledge of its substantive content or its relevance to the litigation, and as such, may be overlooked in the collection effort.
- (1) Plaintiff shall upload onto an electronic storage device, all information from her Facebook and MySpace accounts, from April 27, 2007, to the present. Within ten (10) days from the entry of this order, Plaintiff shall provide Defendant’s counsel with the electronic storage device, and an index of redacted social networking site communications.
- Open Chapter
Outline 69 results (showing 5 best matches)
Index 95 results (showing 5 best matches)
Chapter VIII. Spoliation and Sanctions 44 results (showing 5 best matches)
- Because of the volume and complexity of ESI that may be subject to discovery, there are vastly increased opportunities for parties and their lawyers to negligently, recklessly, or willfully alter or lose potentially discoverable ESI. The growth of electronic discovery has been accompanied by a growth in the volume and complexity of spoliation case law. Federal courts have not taken a uniform approach to spoliation claims. Old Rule 37(e) provided little guidance to courts as to the standard they should apply when making a determination as to whether to impose a sanction. That Rule merely provided as follows: “Absent exceptional circumstances, a court may not impose sanctions under these rules on a party for failing to provide electronically stored information lost as a result of the routine, good-faith operation of an electronic information system.” The Rule said nothing about what level of culpability was required in order to warrant the imposition of a particular sanction. As a...
- denied the existence of any such photographs. One witness—an appraiser—testified that she had once seen photographs of some of the items lost in the fire. Defendant sought an adverse inference instruction telling the jury that it could infer that plaintiffs had failed to produce relevant evidence. Plaintiffs, in turn, argued that the appraiser was mistaken as to when she saw such photographs and they were no longer in existence at the time of the fire and the subsequent lawsuit. The court gave a permissive adverse inference instruction which told the jury that it found that the photograph existed and was in plaintiffs’ possession at the time of the suit and plaintiffs had failed to explain its absence, then the jury ...been unfavorable to plaintiffs. Plaintiffs objected to this instruction and appealed the verdict in favor of the insurer. The appellate court approved the giving of a permissive adverse inference instruction holding that this instruction was not a sanction but...
- ., 306 F.3d 99 (2d Cir. 2002), that “discovery sanctions, including an adverse inference instruction, may be imposed where a party has breached a discovery obligation not only through bad faith or gross negligence, but also through ordinary negligence.” The case involved the late production by plaintiff of a vast trove of relevant email. Defendant was unable to effectively use the tardy production at trial and asked for an adverse inference instruction against plaintiff. The trial court refused defendant’s request, finding that plaintiff had not acted in bad faith or with gross negligence. The appellate court reversed, holding that even the negligent destruction of evidence may warrant an adverse inference. The court found that plaintiff’s “purposeful sluggishness” in producing the email suggested more than negligence. While the failure to properly handle the ESI may have been due to negligence, and did not ...ESI, the failure to adequately communicate with opposing counsel and...
- It is interesting that the Rule now speaks of “measures’ rather than sanctions. This could be to protect parties from the stigma associated with sanctions and concentrate instead on levelling the playing field. The Committee Note lists examples of possible measures. It begins by noting that “serious” measures might be warranted in some cases and might include “forbidding the party that failed to preserve information from putting on certain evidence.” Another example is “to exclude a specific item of evidence to offset prejudice caused by failure to preserve other evidence that might contradict the excluded item of evidence.” Most interesting, however, is a third suggestion which would permit “the parties to present evidence and argument to the jury regarding the loss of information, or giving the jury instruction to assist in its evaluation of such evidence or argument.”
- Rule 37(a) of the Federal Rules of Civil Procedure gives the court power to issue orders to compel disclosure or discovery, and Rule 37(b) gives the court power to sanction a party—and sometimes the party’s attorney—for failure to comply with such an order. The court has broad discretion to determine the appropriate sanction. The following sanctions are identified in Rule 37(b)(2)(A):
- Open Chapter
Chapter XI. Privilege Issues Arising During Electronic Discovery 24 results (showing 5 best matches)
- Several states have adopted their own versions of Rule 502. But in states without such a rule the question is whether the state court must enforce a 502(d) order entered by a federal court—which provides that disclosure in the federal court could not be a waiver in the state court. The Advisory Committee on the Federal Rules of Evidence concluded, after significant research, that a state court would be required, under the Supremacy Clause, to enforce a Rule 502(d) order. In 2009 WL 464989 (N.D. Tex. Feb. 23, 2009), a law firm sued a client in a billing dispute, and defendants removed the action from state to federal court. After removal, defendants sought to stay discovery, arguing that production of privileged information in the federal proceeding would waive privilege in a related state court proceeding. The court denied the stay, recognizing that a 502(d) order would protect against waiver and that the state court should “recognize” the federal court order. The court issued a...and
- A. THE RISKS OF WAIVER AND THE COSTS OF PRE-PRODUCTION PRIVILEGE REVIEW OF ELECTRONIC DATA
- Consequently, parties often enter into agreements to control the risks of waiver when privileged ESI is disclosed during discovery. These agreements typically cover inadvertent disclosure, but can also cover intentional disclosures. Generally speaking there are two kinds of agreements: “quick peek” and “claw back.” Under a “quick peek” agreement the producing party provides certain requested materials for initial examination, without waiving any privilege or protection. The requesting party then designates the documents it wishes to have produced. This designation is the Rule 34 request. The responding party then responds in the usual course, screening only those documents actually requested for formal production and asserting privilege claims as provided in Rule 26(b)(5)(A). Under a “claw back” agreement, a mistaken disclosure of privileged data is not deemed to be a waiver as long as the producing party identifies the documents mistakenly produced, and the documents must then be...
- Fear of the consequences of mistaken disclosure of privileged information—a phenomenon known as inadvertent waiver—added cost and delay to the discovery process for all parties. The risks inherent in mistaken disclosures were aggravated by some decisions holding that a mistaken disclosure constituted a waiver of privilege for all documents or ESI on the same subject matter of how carefully the party tried to prevent disclosure of privileged information during discovery. Moreover, the risks of an adverse ruling on a privilege question were significantly increased by the Supreme Court’s decision in
- When lawyers produce information in response to a discovery demand, they must take care not to disclose their clients’ privileged information. In the past, such a disclosure could constitute a waiver of the privilege and, under some circumstances, might have resulted in a finding of
- Open Chapter
Copyright Page 3 results
- and the Nutshell Logo are trademarks registered in the U.S. Patent and Trademark Office.
- The publisher is not engaged in rendering legal or other professional advice, and this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should seek the services of a competent attorney or other professional.
- West, West Academic Publishing, and West Academic are trademarks of West Publishing Corporation, used under license.
- Open Chapter
Advisory Board 3 results
Table of Cases 4 results
- Aguilar v. Immigration and Customs Enforcement (ICE) ............................................................................ 222
- Law Firms of McCourts and McGrigor Donald, In re Application of .............................................................. 287
- National Day Laborer Organizing Network, et al. v. U.S. Immigration and Customs Enforcement Agency ....... 122
- Warrant to Search a Certain Email Account Controlled and Maintained by Microsoft Corp., In the Matter of a ................................................................... 250
- Open Chapter
- Publication Date: December 24th, 2015
- ISBN: 9781634597487
- Subject: Civil Procedure
- Series: Nutshells
- Type: Overviews
- Description: A concise treatment of all issues relating to electronically stored information (ESI) in litigation today, and a must-own for both civil and criminal practitioners. The authors have substantially rewritten each chapter and added chapters on anticipated changes to the Federal Rules of Civil Procedure governing ESI (which take effect December, 2015), technology-assisted review of ESI, and the use of ESI in criminal cases. Includes extensive treatment of preservation, search for and production of ESI, privilege protection, sanctions, ethical obligations of attorneys with respect to technology, and how the federal rules can be and have been adopted to accommodate digital evidence. Written by the author of the landmark Zubulake opinions and the Sedona Conference, which is at the forefront of thinking and writing on electronic discovery.