CHAPTER ❖ 3 Practical Legal Implications 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 ESI Legal Overview ..................................................................... Early Case Assessment ............................................................... Discoverability ............................................................................ Duties of Counsel ....................................................................... Data Locations and Accessibility ............................................. Retention, Preservation, and Sanctions for Spoliation ........... Privilege and Inadvertent Waiver ............................................ Requesting and Responding ...................................................... Review and Production Considerations .................................. Cost Allocation ............................................................................ Trial Issues ................................................................................... 56 57 60 67 72 82 95 104 125 135 142 By the end of this chapter, you will be able to: • Understand the special characteristics of ESI and challenges faced in e-discovery. • Prepare for litigation by implementing a document preservation plan to avoid sanctions. • Know the standards counsel must follow during e-discovery to meet judicial expectations. • Partner with IT experts and ESI consultants to achieve costsavings in the e-discovery process when gathering data not readily accessible. 55 Order now: http://bit.ly/Io6OzM 56 ELECTRONIC EVIDENCE AND DISCOVERY • Minimize e-discovery disputes over contentious issues such as production, privilege, cost allocation, and protocols through early discovery discussions. • Craft winning arguments when disputes do arise. • Ensure that your data is admitted into evidence through compliance with legal requirements. • Understand the importance of hiring a jury consultant and using effective trial presentation methods. 3.1 ESI Legal Overview The practice of law around the world is at a tipping point, driven by the changing way in which the world stores and handles information. The statistics are a bit varied, but the quantity of electronically stored information (“ESI”) being created every year is undeniably massive. A recent report revealed that the digital universe in 2007 was 281 billion gigabytes large, and that the size of the digital universe in 2011 will be ten times the size it was in 2006. See The Diverse and Exploding Digital Universe: An Updated Forecast of Worldwide Information Growth through 2011 (March 2008), available at http://www.emc.com/leadership/ digital-universe/expanding-digital-universe.htm. In-house counsel has identified unmanageable volumes of ESI as the biggest challenge for legal departments. Twenty-eight percent of U.S. survey respondents (as compared to twenty-one percent in 2007) and twenty-three percent of UK respondents (compared to eleven percent in 2007) stated ESI volume was their greatest concern. Second Annual ESI Trends Report, Kroll Ontrack (2008). Putting the statistics aside, the punch-line is undeniable—companies are acutely aware of the growing burden that ESI could have on their organizations. There is an enormous amount of data making its way around the globe each day, and this data is fully discoverable in civil litigation. In the legal realm, the term “ESI” is used to describe this colossal volume of digital information. The terms “electronic discovery” and “e-discovery” simply refer to the discovery of ESI in legal matters. Characteristics unique to ESI (its potential to be inadvertently destroyed by normal computer usage, metadata, the costs associated with its Herculean volume, etc.) have forced the law to reconsider how it treats the discovery of ESI rather than merely treating it in the traditional manner it has handled paper document discovery. When the previous edition of this book was published in 2004, the universe of e-discovery was controlled by case law trickling from the courts in response to dealing with e-discovery issues. The first edition Order now: http://bit.ly/Io6OzM Practical Legal Implications 57 of this book included a list of case summaries of every decision concerning e-discovery that we could find, and it totaled approximately sixty pages. At that time, we considered ourselves fortunate if we were able to find two to three cases a month relevant to e-discovery. Today, there are two to three relevant cases published each day! Moreover, legislators have formally recognized the need for legal guidelines to govern e-discovery and have amended the Federal Rules of Civil Procedure accordingly. It is vitally important to stay up-to-speed on the law regarding the discovery of ESI. In many cases, discovery is the most expensive aspect of litigation. Lawyers today are responsible for requesting and producing ESI at the same levels of competency as paper discovery, and courts have little tolerance for lawyers who fail to meet these responsibilities. The law and best practices governing e-discovery are still developing, and lawyers must stay abreast; the consequences of falling behind could be catastrophic. This chapter provides a comprehensive overview of the case law and rules governing e-discovery as they exist today. As you read this chapter, pay attention to the facts of the cases discussed, how these cases have applied the recent rules changes, and how the facts of these cases compare to your situation. 3.2 Early Case Assessment WHAT IS EARLY CASE ASSESSMENT? Often the first question many lawyers, paralegals or litigation support professionals facing an ESI discovery project ask is, “Where do we start?” A document request or preservation order arrives on your desk and, like a racehorse out of the starting block, you are expected to sprint down the track. In most cases involving ESI discovery, the racetrack is not clearly defined and many ligation teams feel like they are racing in the Kentucky Derby with a young, untrained horse who has a tendency to run back to the starting gate and not the finish line. With the FRCP amendments in 2006 came a new term that has been championed as the official starting line for any e-discovery exercise—early case assessment (“ECA”). Most traditionally this term was connected to the early meet and confer provisions in Rules 16(b) and 26(f); many legal professionals then used this term to refer to the plethora of preparation prior to meeting with opposing counsel before a scheduling conference is to be held or a scheduling order is due. Very quickly, however, this term has grown to reflect a much broader Order now: http://bit.ly/Io6OzM 58 ELECTRONIC EVIDENCE AND DISCOVERY definition, encompassing almost everything from pre-litigation preparedness, before a suit is even commenced, to looking at documents, interviewing witnesses, examining pleadings, and preparing a damages analysis in the first sixty days of a case. In the e-discovery realm, a whole suite of early case assessment software tools have emerged designed to aid counsel in understanding the pervasiveness of a claim, investigating the scope of employees involved in a matter, and reducing document volumes for discovery review. Such tools boast features that allow users to see e-mail usage reports and graphs, search document management archives for potentially responsive information, and group unstructured sets of documents and e-mail into thematic topic folders. Akin to several other en vogue terms in pop-culture, the term early case assessment caught on in the e-discovery community and today various audiences use it to convey innumerable ESI concepts. MEET AND CONFER Despite this development in our legal lexicon, the question still remains— where does one start when it comes to e-discovery? Turning back to the FRCP amendments, the Advisory Committee sought to encourage legal teams to start by taking stock of their client’s situation and then prudently communicating with the opposing party to avoid e-discovery disputes down the road. As the Committee Notes to Rule 26(f) succinctly state, the purpose of the amendment to Rule 26(f) is to “direct the parties to discuss discovery of electronically stored information during their discovery-planning conference.” This early case assessment rule establishes a timeframe for discussing ESI issues early on in the case. However, the specific provisions of Rule 26(f) do not dictate a precise formula for early electronic discovery planning. Rather, the Rule directs the parties to meet as soon as practicable (but no later than twenty-one days before a scheduling conference) in order to develop a plan that addresses essentially any and all foreseeable discovery issues. As a lawyer, when you sit down face to face with your counterpart on the other side, what topics will you discuss? To what level of detail will you delve? How long will the discussion last? The FRCP provisions are silent when it comes to the specifics, so it is up to the litigation teams to collaboratively design their own discovery framework early on in the case. At a minimum, attorneys should use the Rule 26 conference as an opportunity to: Order now: http://bit.ly/Io6OzM Practical Legal Implications 59 • Clarify expectations regarding document preservation, sampling, search strategies, collection, keyword lists, processing, and cost-allocation; • Establish which sources of data they expect to receive from their opponent, and the format in which they expect to receive it; • Discuss how privileged documents will be handled and what happens if privileged documents are inadvertently produced; and • Raise issues pertaining to volume, cost, time, and other factors affecting the accessibility and burden of producing the data in their client’s possession or control. Besides seeking to develop a discovery plan, proficient litigators will take a strategic approach to these seemingly innocuous meetings. Counsel should take this time to learn the opponent’s perspective on e-discovery and exactly how savvy they are when it comes to the issues surrounding electronically stored information. Most importantly, counsel should move beyond high-level e-discovery conversations and engage in detailed discussions with the opposing party. For instance, instead of agreeing to produce metadata generally (which could mean anything given the vast differences in metadata fields across operating systems and applications), counsel should come to an agreement on which metadata fields are the most important and must be produced. As with any technical subject matter, the firm’s litigation support team and the client’s information technology staff will be instrumental in identifying and raising any issues it determines may complicate the electronic data collection, review, and production processes. For example, this team of individuals can begin to identify technical hurdles that may arise if proprietary databases or complicated spreadsheet data is involved in the collection. Litigation support and IT can help counsel understand the limitations associated with the native file format for production. Lastly, litigation support and IT also can prepare counsel for the questions they will have to answer about their own client’s information technology infrastructure, which are likely to be asked by the opposing party. In addition, consider consulting with an ESI expert to lend a hand in preparing for these important early planning conferences. The bottom line: the discovery provisions decided at the early case assessment meetings will affect all electronic discovery activities going forward. Be prepared. Order now: http://bit.ly/Io6OzM 60 ELECTRONIC EVIDENCE AND DISCOVERY Figure 3.1 Practice Point: Making the Most of the Meet and Confer When preparing for the first meet and confer session, counsel will want to have a checklist of facts and issues prepared relating to the following issues: • Preservation Practices • What is being done to preserve ESI? • Is a protective order necessary? • Scope of Discovery • Will there be any deviations from the default initial disclosures specified in Rules 26(a)? • What file types and time range is the opposing party seeking? • Who are the main data custodians the opposing party is interested in? • Will any data sampling protocols be used? • What will be the timing for exchanging discoverable ESI? • Accessibility • What type of data is the opposing party interested in? Backup tapes? Hard drives? Servers? Removable media? Deleted data? • How easy will it be to access this data? • Will the use of an e-evidence expert be necessary? • Production of Metadata • What fields will be exchanged for the various file formats? • Costs and Burdens • Who will bear the costs associated with gathering, restoring, and producing the ESI? • Form(s) of Production • In what format or formats will the ESI be produced? • Privilege Issues and Waiver • How will inadvertently produced privileged documents be handled? • Variations from FRCP rules • Are there any local rules that apply in the jurisdiction? • Inventory of opponent’s IT infrastructure • • Which operating systems and software packages were used to develop key data? Are those systems still be used? What are the opponent’s document retention policies? Are they being enforced? • Other • Is there any other information that may be important to the e-discovery activity in the case? 3.3 Discoverability The 2006 Advisory Note to FRCP 34 states, “Rule 34(a) is amended to confirm that discovery of electronically stored information stands on equal footing with discovery of paper documents.” What exactly these new statutory rules mean to practitioners is being flushed out by case law; however, there is one inescapable truth that is absolutely certain Order now: http://bit.ly/Io6OzM Practical Legal Implications 61 today when it comes to the discoverability of ESI. ESI is every bit as discoverable as paper documents and practitioners must be prepared to request and produce it. Federal Rule of Civil Procedure 34(a), which explicitly makes ESI discoverable, provides in relevant part: A party may serve on any other party a request within the scope of Rule 26(b): (1) to produce and permit the requesting party or its representative to inspect, copy, test, or sample the following items in the responding party’s possession, custody, or control: (A) any designated documents or electronically stored information—including writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations— stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form; Fed.R.Civ.P. 34(a)(1) (emphasis added). This rule makes it clear beyond dispute that ESI is broadly discoverable. As you may have noticed, Rule 34 provides a list of things that are included in the category ESI, but does not limit what is included in the category. In fact, nowhere in the Federal Rules of Civil Procedure is an attempt made to define “electronically stored information.” Thus, practitioners are left wondering what the term ESI encompasses. Does the rule make metadata discoverable? Voicemail messages? Instant messages? Text messages? Web sites? Contrary to being an oversight, the absence of a definition of electronically stored information is critical to fulfilling the broad intent of the ESI amendments to the Federal Rules of Civil Procedure. The Advisory Notes to the 2006 amendment states, “Rule 34(a)(1) is intended to be broad enough to cover all current types of computer-based information, and flexible enough to encompass future changes and developments.” By not pigeon-holing the definition of what constitutes electronically stored information, Congress allows for the unforeseen (e.g., holographic images, fingerprint payment records, black-box recorders from space flights, etc.) to be discoverable years, even centuries, from now. Who knows what data type will contain the most salient discoverable information in civil cases in 2059? Naturally, disputes as to what is discoverable still arise. The task of resolving these disputes, just as naturally, falls squarely onto the courts. It is left up to case law to flush out the exact details of Rule 34’s intent and to determine what is discoverable and under what circumstances. The prevalence of ESI in litigation has caused the case law concerning ESI discoverability to develop at a breakneck speed. Some of the discoverability cases that were cutting-edge when this book was previously published in 2004 are now sitting on the bookshelf collecting dust. Order now: http://bit.ly/Io6OzM 62 ELECTRONIC EVIDENCE AND DISCOVERY DISCOVERABILITY—HOW BROAD IS THE RULE? It is important to understand the foundation of the discoverability of electronic documents, and that foundation developed in the case law long before the Federal Rules of Civil Procedure created the statutory duty to produce ESI in discovery. In 1985 (just one year after the 3.5 inch floppy disk drive was introduced to the public), the Federal District Court in Utah foresaw that computer data was valuable and could not be overlooked in discovery: “[C]ertain propositions will be applicable in virtually all cases, namely, that information stored in computers should be as freely discoverable as information not stored in computers, so parties requesting discovery should not be prejudiced thereby.” Bills v. Kennecott Corp., 108 F.R.D. 459 (C.D. Utah 1985). Linnen, the seminal case for the discoverability of electronically stored information, confirmed the principle that electronic evidence is discoverable. Linnen held, “A discovery request aimed at the production of records retained in some electronic form is no different in principle, from a request for documents contained in any office file cabinet.” The court reasoned that to permit a corporation, such as the responding party in Linnen, to “reap the benefits of such [computer] technology and simultaneously use that technology as a shield in litigation would lead to incongruous and unfair results.” Linnen v. A.H. Robins Co., 10 Mass. L. Rptr. 189 (Mass. Super. 1999). An important dispute arose early in the evolution of the case law when parties argued that all the “good evidence”—meaning all the important evidence—had already been printed and produced in paper form, thus there was no need to allow ESI to be discovered. However, requesting parties saw the value in receiving electronic documents in electronic form even if previously produced in paper form because electronic documents are: easy to transport, easy to import into existing case management systems, searchable and contain valuable metadata that paper copies do not contain. Case law shows that antitechnology arguments are no longer successful. In 1995, the court in Anti-Monopoly stated, “The law is clear that data in computerized form is discoverable even if paper ‘hard copies’ of the information have [already] been produced.” Anti-Monopoly, Inc. v. Hasbro, Inc., 1995 WL 649934 (S.D.N.Y. Nov. 3, 1995). The bottom line is that litigants today should be prepared to produce electronic evidence in electronic form. For a more complete discussion of production considerations, please refer to section 3.9 of this chapter. As mentioned above, Federal Rule of Civil Procedure 34(a) makes electronically stored information discoverable but does not explicitly define Order now: http://bit.ly/Io6OzM Practical Legal Implications 63 what that term encompasses. It is well-established that, “The Federal Rules of Civil Procedure should be liberally construed, but they should not be expanded by disregarding plainly expressed limitations.” Schlagenhauf v. Holder, 379 U.S. 104 (1964). In accordance with this principal of liberal construction, courts have been very accepting of the discoverability of evidence produced by various technologies. Courts have largely considered virtually all evidence produced by technology to fall within the ESI label and thus be discoverable under the Rules, and we predict that the remaining and emerging technologies will virtually all be deemed discoverable as they come before the courts. Let’s look at several examples: E-Mail: Evidence of e-mail communications form the bread and butter of the majority of e-discovery cases. Courts have uniformly accepted records of e-mail communications as ESI. RAM: The defendant in Columbia Pictures argued that server log data stored in random access memory (RAM) is not “electronically stored information.” The defendant argued that to constitute ESI information must not just be stored, but stored purposefully for later retrieval. The defendant also argued that the period of storage for RAM, which may be as much as six hours, is too temporary to constitute ESI. The court held that information held in a computer’s RAM does constitute ESI and is within the scope of discoverable information, citing the broad intended scope of the amendment to Rule 34. Columbia Pictures, Inc. v. Bunnell, 2007 WL 2702062 (C.D. Cal. Aug. 24, 2007). Text Messages: The discoverability of text messages has not been fully flushed out by the courts at this time. Flagg, arguably the most important case to discuss the discoverability of text messages, determined that text messages are discoverable if they are relevant. The court further stated that the relevancy of a text messages turns on the content of the communication and set up protocols for reviewing text messages, including reviewing some text messages under seal. Flagg v. City of Detroit, 2008 WL 787061 (E.D. Mich. Mar. 20, 2008); 2008 WL 3895470 (E.D. Mich. Aug. 22, 2008). Instant Messages/Chat Rooms/Message Boards/Social Networking Sites: The discoverability of information contained in instant messages, internet chat rooms, online message boards and social networking sites has not been heavily disputed in the case law. Rather, the discoverability of these live time communications seems to be assumed if the evidence can be located and meets general discoverability requirements applicable to all evidence. The disputes that have arisen around these internet communications largely involve authentication. For instance, how do you authenticate that a message posted on an internet bulletin board truly came from the user shown? Other disputes have arisen regarding whether evidence of communications that occur in chat rooms or by instant messaging fall within the Order now: http://bit.ly/Io6OzM 64 ELECTRONIC EVIDENCE AND DISCOVERY meaning of a “meeting” subject to the Freedom of Information Act (FOIA) prohibitions and protections. In Beck, the Court held that an e-mail exchange was not a meeting within the meaning of the FOIA, but in its dicta speculated that the virtually simultaneous nature of instant messaging may place it, unlike e-mail, within the meaning of a meeting for purposes of the FOIA. Beck v. Shelton, 593 S.E.2d 195 (Va. Sup. Ct. 2004). Sound Recordings: Federal Rule of Civil Procedure 34(a), since the 2006 amendments took effect, explicitly states that sound recordings are discoverable. Sound recordings are an emerging issue in the law of discoverability, and case law has not yet had much opportunity to address the burgeoning technologies that can phonetically search sound recordings. Phonetic searching technologies obviously have the potential to make the discoverability of sound recordings much more feasible, and thus much more prevalent. In two notable decisions, the courts both held that preserving audio recordings does not constitute an undue burden and ordered their preservation in audio format. See Del Campo v. Kennedy, 2006 WL 2586633 (N.D. Cal. Sept. 8, 2006); In re Vioxx Litig., N. J. Super. Ct. Case No. 619 (order dated Sept. 8, 2006). LIMITATIONS ON ESI DISCOVERABILITY The universe of e-discovery looks bright with the potential to discover just about any form of electronically stored information that a practitioner can imagine. The e-discovery world is your oyster. But that is not to say that litigants are afforded unfettered access to all electronically stored evidence in the possession of their opposing parties. All the discovery limitations that apply to paper discovery apply with equal force to e-discovery. These limitations include, but are not limited to the following: the best evidence rule (discussed in section 3.11), foundation and authentication requirements (discussed in section 3.11), hearsay (discussed in section 3.11), the attorney-client privilege and work product doctrine (discussed in section 3.7), the requirement that discovery be relevant, and the requirement that the discovery be reasonable (discussed below and further discussed in section 3.8). Relevancy Requirement The threshold question for any discovery matter is whether the discovery sought is relevant. The principle that “discovery rules are not a hunting license to conjure up a claim that does not exist” has stood the test of time and remains as true today as when it was stated in 1987. Avnet, Inc. v. American Motorists Ins. Co., 115 F.R.D. 588 (S.D.N.Y. 1987). This principle was aptly demonstrated in the context of e-discovery in the case of Ex Parte Wal-Mart. Order now: http://bit.ly/Io6OzM Practical Legal Implications 65 In Ex Parte Wal-Mart, the plaintiff brought a personal injury suit against Wal-Mart after a falling merchandise incident, and sought discovery of Wal-Mart’s electronic database containing customer incident reports and employee accident review forms. The district court granted the request without limitation, but the appellate court held that the discovery order granted was overly broad and should have been restricted to falling merchandise incidents within a set geographical area and temporal period. Basically, the other incident reports and review forms were not relevant to the plaintiff’s case and thus not discoverable. Ex Parte Wal-Mart, Inc., 809 So.2d 818 (Ala. 2001). More recently, the importance of the concept of relevancy was demonstrated in the case ClearOne Communications, where the plaintiff moved for entry of a search protocol order that would allow the search of keywords pertaining to specific names, technologies, licensing agreements, and the defendants’ source code. The defendants objected that the keyword search would produce overly broad and intrusive results. The court tailored its order to allow some of the proposed keyword searches to be used and others to be used only in conjunction with other keywords in order to produce only results that are likely to be relevant. ClearOne Commc’ns, Inc. v. Chiang, 2008 WL 920336 (D. Utah Apr. 1, 2008). In summation, parties do not have special access to non-relevant information just because it is stored electronically. While litigators are frequently given access to their opponents’ electronic records in discovery, they cannot ask for the moon—ESI is not any more accessible than traditional paper discovery. An interesting development in the law of relevancy in the world of e-discovery is the ability of litigants to gain access to personal data on home computers, rather than just the business computers of their opponents and third parties. In the world of paper discovery, only in the most extraordinary cases would business litigants be permitted (or have the need) to go to the homes of employees in search of responsive documents. However, the current reality of today’s business practice is that employees can and frequently do conduct business at home from their computers. This reality has influenced the discoverability of home computers, and courts recognize the relevancy of information stored on these computers. In illustration, let’s look at a few cases. In a relatively early case, Northwest Airlines, flight attendants used their home computers to organize an illegal “sick out” during a labor dispute. The court granted access to the flight attendants’ home computer even though the computers also contained personal data because the computers contained relevant information; the court sought to protect the personal data by fashioning a protocol where a neutral third party collected and imaged the personal computers and then provided the parties with the relevant data. Northwest Airlines v. Local 2000, C.A. No. 00-08DWF/AJB (D. Minn. Feb. 29, 2000). Order now: http://bit.ly/Io6OzM 66 ELECTRONIC EVIDENCE AND DISCOVERY A myriad of cases have confirmed that courts have little to no hesitation ordering the production of relevant information stored on home computers or personal laptops; however, courts often seek to provide some sort of protection for non-relevant, personal information. In an employment discrimination case, the court ordered the plaintiff to produce her personal computer for inspection by a forensic specialist to search for responsive evidence. Benton v. Dlorah, Inc., 2007 WL 3231431 (D. Kan. Oct. 30, 2007). In a trade secrets misappropriation case, the court allowed the plaintiff to conduct a computer forensics analysis of the defendant’s home laptop and home computers. Keystone Fruit Mktg., Inc. v. Brownfield, 2007 WL 788358 (E.D. Wash. Mar. 14, 2007). In a case where a teacher had allegedly exchanged sexually explicit e-mails with students, an administrative law judge ordered production of all computers in the teacher’s household. The judge sought to protect the teacher’s rights by allowing the teacher to have his own expert present at the inspection and by prohibiting the school board’s expert from retaining any privileged communications. Reasonableness Requirement Lastly, it is worth mentioning the reasonableness requirement that must be met before any evidence is discoverable (discussed further in section 3.5). The reasonableness or proportionality rule is arguably the most powerful tool for a litigator seeking to not produce electronically stored evidence. The reasonableness rule, or proportionality test, is codified in Federal Rule of Civil Procedure 26(b)(2)(C), which reads in relevant part: When Required. On motion or on its own, the court must limit the frequency or extent of discovery otherwise allowed by these rules or by local rule if it determines that: (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues. Fed.R.Civ.P. 26(b)(2)(C) (2008) (emphasis added). Rule 26(b)(2)(C) embodies practical considerations, those of burden and expense, which necessarily have legal ramifications. In short, if the evidence sought is not worth the burden and expense, the discovery must be prohibited. In contrast, the previously mentioned requirements (relevancy, best evidence rule, hearsay, privilege, etc.) are legal considerations that ask whether the evidence is legally competent. Order now: http://bit.ly/Io6OzM Practical Legal Implications 67 The court in McPeek, a landmark case, summarized the rationale of the reasonableness requirement: “[E]conomic considerations have to be pertinent if the court is to remain faithful to its responsibility to prevent ‘undue burden or expense’. . . . If the likelihood of finding something was the only criterion, there is a risk that someone will have to spend hundreds of thousands of dollars to produce a single email. That is an awfully expensive needle to justify searching a haystack.” McPeek v. Ashcroft, 202 F.R.D. 31, 34 (D.D.C. 2001). Just as in the paper world, the legal and other costs incurred in retrieving and producing electronically stored information must be proportionate to the size of the claim and the value of the evidence sought. In the special context of e-discovery, however, litigators must be able to grasp the technical realities of e-discovery in order to adequately demonstrate burden and expense (or lack thereof) to the court. Litigators must be able to show concretely that it would be unreasonable for a producing party to search through electronically stored information (such as e-mail or electronic documents) from every hard drive, server, backup tapes, etc. in light of the relative need for the information. In the final analysis, electronically stored information is discoverable, but not any more discoverable than hardcopy evidence; however, special attention must be paid to the unique characteristics of ESI when making arguments that apply the traditional reasonableness rule. 3.4 Duties of Counsel Like any other aspect of a lawsuit, counsel has oversight duties associated with the preservation and production of electronically stored information in discovery, and a lawyer can be held individually responsible for discovery failures in the form of professional discipline (i.e., bar reprimands, license suspension, etc.) and sanctions. See Qualcomm Inc. v. Broadcom Corp., 2008 WL 638108 (S.D. Cal Mar. 5, 2008). These duties as they have evolved in relation to e-discovery arise from a plethora of sources, including: court orders and opinions, discovery rules, and professional responsibility guidelines. A practitioner’s responsibilities with regard to e-discovery can be categorized into four distinct duties: (1) duty to locate, preserve, and produce electronic data; (2) duty to monitor conformity with the discovery obligations; (3) duty to communicate about the discovery process; and (4) duty to disclose information to the court. Notably, a landmark case, Zubulake v. UBS Warburg, 229 F.R.D. 422 (S.D.N.Y. 2004), provides attorneys guidelines about how to fulfill their e-discovery duties. As a threshold matter, before delving into what each of the individual duties entails, it is extremely important to note that each of Order now: http://bit.ly/Io6OzM 68 ELECTRONIC EVIDENCE AND DISCOVERY Figure 3.2 Duties of Counsel the duties of counsel with regard to e-discovery are affirmative duties. This means that counsel must actively pursue the fulfillment of each duty, and it is insufficient to wait until a discovery issue is impossible to ignore before addressing it. Rather, counsel must proactively seek information to meet their discovery duties. DUTY TO LOCATE, PRESERVE, AND PRODUCE ELECTRONIC DATA The first duty is the duty to locate, preserve, and produce electronic data, as illustrated in Zubulake V where the court determined that defense counsel was partly to blame for the document destruction because it had failed in its duty to locate relevant information, to preserve that information, and to timely produce that information. The first step to fulfilling this responsibility is to locate sources of relevant information. To successfully locate data, counsel must familiarize themselves with the client’s document retention architecture and policies—or in some cases the unfortunate lack of an organized architecture or established policies. If an organization has not previously created a “data map” showing where information within its organization is stored, counsel should consider advising the client to hire an outside, experienced consultant to locate the data quickly before data is destroyed. An additional benefit of hiring an outside consultant, especially once data is being located for the purpose of litigation, is the appearance of objectivity that comes from using a third party consultant. Regardless of whether counsel personally performs this task or utilizes an outside provider, it is essential to communicate with IT Order now: http://bit.ly/Io6OzM Practical Legal Implications 69 personnel to learn about the client’s backup and recycling procedures. IT personnel have a wealth of technical information about the day-today operations of an organization and are a precious resource for attorneys looking to fulfill their data location, preservation, and production duties. Lastly, it is absolutely necessary to also communicate with the key players in the litigation or investigatory matter to understand how they store their information. For example, if the company president is a key player, ask whether they ever perform any work from a home computer or store their information in removable storage mediums. After the relevant electronic data is located, counsel must follow proper preservation protocols with regard to that data. The first thing counsel must do (immediately!) upon notice of litigation or a credible threat of litigation is to issue a litigation hold. The events that trigger a litigation hold are discussed in further depth in section 3.6 of this chapter. The litigation hold should suspend ordinary business document destruction policies until a defensible preservation plan is implemented. Moreover, the extent of the preservation duty must be clearly communicated with the key players to the litigation, and a standardized method of preservation should be implemented among all custodians of potentially relevant data. Unfortunately, preservation efforts that depend solely on individual custodians to preserve their data are prone to oversights and failures. Therefore, it is prudent to safeguard potentially relevant information by backing it up on backup tapes. Once data is preserved, it will be processed for relevant data, which must be produced unless it constitutes an undue burden or expense under FRCP 26. Lastly, it is important to note that counsel’s duty to preserve is an ongoing duty, which largely takes on the form of the duty to monitor discovery obligations. DUTY TO MONITOR DISCOVERY CONFORMITY Attorneys have an ongoing duty to monitor their client’s discovery efforts for conformity with preservation duties, production duties, agreements between the parties, court orders where applicable, etc. In Zubulake V, Judge Scheindlin declared that “it is not sufficient to notify all employees of a litigation hold and expect that the party will retain and produce all relevant information. Counsel must take affirmative steps to monitor compliance so that all sources of discoverable information are identified and searched.” DUTY TO COMMUNICATE ABOUT DISCOVERY PROCESS Practitioners have a duty to communicate with their clients about the discovery process. Communication is a requirement because it is Order now: http://bit.ly/Io6OzM 70 ELECTRONIC EVIDENCE AND DISCOVERY necessary to ensure compliance with their discovery obligations. As you have probably noticed at this point, the various duties of counsel are all closely related and intended to together ensure that evidence preservation and production obligations are met. Communication, as any student enrolled in “Communications 101” will tell you, is a two way street. After you inform your client about their preservation duties and assist them in implementing a litigation hold, insist that your client communicate back to you how those measures are working. Make a point to receive regular status reports from your chosen e-discovery service provider, or in house IT team, who are actually performing the data location, collection and processing. Moreover, have the individual custodians and employees of your client communicate to your client, preferably to a designated e-discovery response team composed of multidisciplinary professionals. A more detailed discussion of creating an e-discovery response team can be found in section 3.6 of this chapter. The court in Zubulake V summed up the importance of communications before issuing monetary sanctions and an adverse spoliation inference sanction: “Counsel failed to communicate the litigation hold order to all key players. They also failed to ascertain each of the key players’ document management habits. By the same token, UBS employees—for unknown reasons—ignored many of the instructions that counsel gave. This case represents a failure of communication, and that failure falls on counsel and client alike.” Proper communication between counsel and their clients demonstrates to a court your good faith effort to satisfy discovery obligations and will reasonably ensure that all relevant information is discovered, retained on a continuing basis, and all relevant, non-privilege documents ultimately produced to the opposing party. DUTY TO DISCLOSE INFORMATION TO THE COURT The final duty of counsel with regard to discovery is the duty to disclose information to the court. To be clear, this duty does not require lawyers to volunteer every piece of information learned in the course of the attorney-client relationship; clearly, that would destroy the relationship. The duty does, however, require that a lawyer not lie or perpetuate a lie, both of which would constitute a fraud on the court and violate the lawyer’s duties as an officer of the court, even if to do so would be a breach of confidence otherwise protected. See Model Rules of Prof’l. Responsibility. § 3.3(c) (2008). An example of a fraud in the context of discovery would be if counsel represented or certified to the court that his or her client had made a good faith effort to locate, preserve, and produce relevant information when the counsel knows that is not the case. See Coleman (Parent) Order now: http://bit.ly/Io6OzM Practical Legal Implications 71 Holdings, Inc. v. Morgan Stanley & Co., 2005 WL 679071 (Fla. Cir. Ct. Mar. 1, 2005) (“Aware of the tapes’ discovery, Mr. Riel knew when he executed the certification that it was false.”). For another example, a lawyer would be committing fraud on the court if he or she intentionally hid evidence or presented evidence known to him or her to be altered by spoliation. See Qualcomm Inc. v. Broadcom Corp., 2008 WL 66932 (S.D. Cal. Jan. 7, 2008) (court sanctioned six attorneys for intentionally hiding or recklessly ignoring relevant documents and blindly accepting their client’s claims that the discovery searches were adequate). Many states have adopted, in whole or in part, the American Bar Association’s Model Rules of Professional Responsibility. Rule 3.3 outlines the duties of counsel with respect to disclosure to the courts. As with all of the Rules of Professional Responsibility, take the time to familiarize yourself with it. If you are unsure whether a particular course of action may violate the Rules, most states have a Bar organization you can call for ethical advice. Consulting this organization and acting in good faith reliance on that advice serves as a valid defense against potential ethical violations. Figure 3.3 ABA Model Rules of Professional Conduct: Rule 3.3 Candor Toward The Tribunal (a) A lawyer shall not knowingly: (1) make a false statement of fact or law to a tribunal or fail to correct a false statement of material fact or law previously made to the tribunal by the lawyer; (2) fail to disclose to the tribunal legal authority in the controlling jurisdiction known to the lawyer to be directly adverse to the position of the client and not disclosed by opposing counsel; or (3) offer evidence that the lawyer knows to be false. If a lawyer, the lawyer’s client, or a witness called by the lawyer, has offered material evidence and the lawyer comes to know of its falsity, the lawyer shall take reasonable remedial measures, including, if necessary, disclosure to the tribunal. A lawyer may refuse to offer evidence, other than the testimony of a defendant in a criminal matter, that the lawyer reasonably believes is false. (b) A lawyer who represents a client in an adjudicative proceeding and who knows that a person intends to engage, is engaging or has engaged in criminal or fraudulent conduct related to the proceeding shall take reasonable remedial measures, including, if necessary, disclosure to the tribunal. (c) The duties stated in paragraphs (a) and (b) continue to the conclusion of the proceeding, and apply even if compliance requires disclosure of information otherwise protected by Rule 1.6. (d) In an ex parte proceeding, a lawyer shall inform the tribunal of all material facts known to the lawyer that will enable the tribunal to make an informed decision, whether or not the facts are adverse. Model Rules of Prof’l. Responsibility § 3.3 (2008) (emphasis added). Order now: http://bit.ly/Io6OzM 72 ELECTRONIC EVIDENCE AND DISCOVERY CONCLUSION The bottom line with regard to counsel’s discovery duties is that they are real and the consequences of failing to meet them are likewise real. Many counsel linger under the impression that their duty is to tell the client that it has to preserve relevant data and the burden then fully shifts to the client. The truth of the matter is that discovery is a responsibility shared by both counsel and their clients, and both must work together in a cooperative fashion. 3.5 Data Locations and Accessibility The process of discovery necessarily involves discovering the location of relevant information and collecting that information. In the days of yesteryear when paper documents comprised the core of discovery production, the discovery team focused their efforts on locations where paper would be stored, such as: filing cabinets, boxes, warehouses, and even behind bookcases and desks where relevant papers may have fallen. Counsel today who face e-discovery production duties must similarly know where ESI resides in order to find the responsive materials in response to a discovery request. Unlike paper documents which must physically reside somewhere, the locations where ESI can reside are virtually endless. Moreover, the potential storage locations where ESI can reside change almost daily as new technologies develop. The graphic below lists just a few of the possible locations where electronic data can reside. Figure 3.4 Data Sources and Storage Locations Order now: http://bit.ly/Io6OzM Practical Legal Implications 73 Electronically stored data differs fundamentally from paper documents in terms of its potential range of accessibility. For example, although a paper document stored in a warehouse that caught fire is irrevocably gone, a laptop computer that was stored in a warehouse that caught fire still may contain electronic documents that can be retrieved through the use of computer forensics. This greater number of locations where ESI can be stored and the increased accessibility challenges of some ESI make finding and retrieving electronic evidence more challenging than finding and retrieving paper documents in certain circumstances. The Federal Rules of Civil Procedure recognize that greater accessibility challenges can arise in the context of discovery of ESI due to the greater number of storage locations and potential greater accessibility challenged. Moreover, the Rules recognize that sometimes the burden of recovering inaccessible electronically stored information simply is not reasonable and should not be required. Federal Rule of Civil Procedure 26(b)(2)(B) provides in relevant part: Specific Limitations on Electronically Stored Information. A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause . . . . Rule 26(b)(2)(B) embodies a practical consideration of undue burden or cost. In short, if the data sought is not worth the burden and expense of discovering it because it is not reasonably accessible and will cost more than it is worth to locate and retrieve, the court has discretion to prohibit the discovery. Therefore, every attorney who engages in electronic discovery must understand not only where electronic data potentially can be located but also must understand what accessibility barriers, if any, exist in locating and retrieving that data in order to make convincing arguments to prohibit or permit discovery under Rule 26(b)(2)(B). The good news is that an attorney does not need a technical background or an exhaustive understanding of how computers operate to effectively navigate discovery in today’s electronic age. The simplest, and indeed best, approach to locating evidence and making Rule 26(b)(2)(B) arguments is to concentrate on the types of media that can store electronic evidence. Concentrating on media storage devices is more straightforward than the alternative of analyzing data collection Order now: http://bit.ly/Io6OzM 74 ELECTRONIC EVIDENCE AND DISCOVERY from an IT topography point of view, which focuses on the role that a computer plays in the larger network system. Describing accessibility in terms of media storage devices and categories of data is also easier for judges, who also do not necessarily have a comprehensive understanding of how computers operate, to understand. THE ACCESSIBILITY SPECTRUM The current rule that is embodied by Rule 26(b)(2)(B) is that documents are discoverable if they are reasonably accessible. The foundation for the current rule was laid forth in the landmark case of Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003). Understanding this case is essential to understanding the law as it currently applies Rule 26(b)(2)(B). The court in Zubulake stated, “[W]hether production of documents is unduly burdensome or expensive turns primarily on whether it is kept in an accessible or inaccessible format (a distinction that corresponds closely to the expense of production).” The Zubulake court created a two-tier system for determining whether information sought in discovery is reasonable to discover. The first tier is comprised of information that is identified as accessible. Accessible information in the first tier must be automatically produced when requested. The responding party bears the burden of proof to show that information should be identified as inaccessible rather than accessible due to undue burden or cost associated with production. If the responding party successfully meets this burden, the information sought is identified as inaccessible. The second tier is comprised of information that is not inaccessible. The burden of proof in the second tier shifts to the party requesting the information to show good cause for production in spite of the burden and cost. This two-tier system was largely adopted in the reasonable accessibility language of Rule 26(b)(2)(B). As stated above, the analysis of whether evidence may be deemed non-discoverable by a judge due to under burden and expense under Rule 26(b)(2)(B) comes down to the single question of whether the information sought is reasonably accessible. So what is reasonably accessible? The determination of what is reasonably accessible is a fact specific determination unique to each case. In many circumstances, the importance of the ESI sought makes data that has been erased, fragmented, or damaged reasonably accessible. Likewise, active data may not be reasonably accessible if the data sought is so unimportant that even the relatively straightforward search is not reasonably justified. The determination whether ESI is reasonably accessible is a balancing of the accessibility of and the importance of the data sought. Order now: http://bit.ly/Io6OzM Practical Legal Implications 75 The Zubulake court identified five categories of data, listed them in the order it deemed most accessible to least accessible, and stated that the first three categories are “typically identified as accessible and the latter two as inaccessible.” It is important to note that the court says the categories are typically identified one way or another; the guidelines are not fast, hard rules. Nevertheless, the categories are extremely useful in determining the accessibility of the data that can then be weighed against the importance of the data sought. The five categories of data are the following: 1. 2. 3. 4. 5. Active, online data: Data that can be seen and accessed upon normal booting of the computer is known as active, online data. This data is generally stored on desktop, laptop, and server hard drives. Active data is accessed frequently and quickly by users. Near-line data: Near-line data typically consists of a removable storage device that houses data. Data can be created on and read from the storage device if placed into a computer system. Today, the most common type of removable media, the 3.5 inch floppy disk, has virtually gone the way of the dinosaur due to the small amount of data these disks can hold. The more likely find is the floppy disk’s descendants, the CD-ROM and DVD or their high density counterparts such as the Zip disk and USB memory cards. Near-line data is easily accessible if already placed in the appropriate read device. Offline storage/archives: Offline storage media is a removable optical disk or magnetic tape, which can be labeled and stored in a shelf or rack. Offline storage of electronic records is traditionally used for making disaster copies of records. Likelihood of retrieval of offline storage is minimal and accessibility is much slower than online or near-line storage. Backup tapes: Backup tape data is created by a device much like a tape recorder that reads data from the computer system and writes it onto a tape. As with offline storage, organizations typically back data up to tape to archive electronic information in the event of catastrophic loss or disaster recovery. Tape drives have data capacities of anywhere from a few hundred kilobytes to several gigabytes. Data contained on backup tapes is not very accessible because the lack of data organization on the tape and the special restoration software needed to restore the tape. Erased, fragmented, or damaged data: Media storage devices may contain deleted data contained in temporary files or Order now: http://bit.ly/Io6OzM 76 ELECTRONIC EVIDENCE AND DISCOVERY damaged data. This data is not accessible to the common computer user. Instead, skilled computer forensic engineers are needed recover and analyze the data in order to make it accessible. The most useful way to think about the five categories above is as a spectrum. On this accessibility spectrum, the data on the left is generally the most accessible and the data on the right is generally the least accessible. As a general rule, information deemed “accessible” is stored in a readily usable format and does not need to be restored or manipulated to be usable. Inaccessible data, on the other hand, is not readily usable and must be restored, recovered or repaired to be usable. The spectrum drawn below provides examples of media storage devices that typically fall beneath each category. Somewhere on this spectrum a line exists that determines whether data should be identified as accessible or inaccessible. Where this line should be drawn is fact intensive and will differ from case to case. For example, damaged data may be reasonably accessible if it is not that badly damaged and can be easily retrieved by a computer forensic expert, even though it is typically inaccessible. Rule 26(b)(2)(B) negotiations and arguments before a court are in fact arguments about where the line should be drawn given the specific facts of a case. It is prudent to consult an ESI consultant to determine the true accessibility of the data sought when making these arguments. Figure 3.5 Categories of Data Accessibility Order now: http://bit.ly/Io6OzM Practical Legal Implications 77 DATA DOWNGRADING The failure to prevent the downgrading of discoverable data may lead the court to order production of data that is otherwise inaccessible, or impose sanctions. In Treppel v. Biovail Corp., 233 FRD 363 (S.D.N.Y. 2006), the court indicated that parties who fail to prevent data downgrading after reasonable anticipation of litigation violate preservation obligations and may be liable for sanctions. Another case demonstrating the unwillingness of some courts to use data downgrading as an acceptable inaccessibility defense is Disability Rights Council of Greater Wash. v. Wash. Metro. Transit Auth., 242 F.R.D. 139 (D.D.C. 2007). In this case, Magistrate Judge John Facciola stated: “[T]he newly amended Federal Rules of Civil Procedure initially relieve a party from producing electronically stored information that is not reasonably accessible because of undue burden and cost, I am anything but certain that I should permit a party who has failed to preserve accessible information without cause to then complain about the inaccessibility of the only electronically stored information that remains.” However, in Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006), the court did not sanction the defendant for deleting accessible data because it had maintained a backup copy of the information. Since the responding party could still “produce the electronic evidence by restoring it from an inaccessible format, albeit at a higher cost,” the downgrading was not tantamount to spoliation. While downgrading did not constitute spoliation in Quinby, the magistrate judge determined that “if a party creates its own burden or expense by converting it into an inaccessible format data that it should have reasonably foreseen would be discoverable . . . then it should not be entitled to shift the costs of restoring and searching the data.” THE GOLD MINE PROBLEM The use of consultants can largely help you determine how much effort it will require to retrieve information sought, although not entirely. On the other hand, it is far more difficult to determine the importance of the information sought before the information sought has been retrieved. In other words, how do you determine whether the responding party’s discovery efforts will produce gold, fool’s gold, or just a bunch of dirt? It is difficult to make an effective Rule 26(b)(2)(B) argument when you do not know the value of the information sought to weigh against the expense of obtaining the information. The solution to this problem is to survey the land. Gold surveyors rely on geographical readouts, reports of prior gold findings, and Order now: http://bit.ly/Io6OzM 78 ELECTRONIC EVIDENCE AND DISCOVERY samples of the terrain to determine whether the likelihood of finding gold justifies the expense of digging. Similarly, attorneys engaged in discovery can conduct depositions, request interrogatories, and conduct data samplings to determine what information is likely to be discovered should discovery be conducted. MEDIA STORAGE DEVICES Each media storage device has unique characteristics that may be relevant to: (1) how to search for data to meet production duties; (2) the accessibility of data storage on the devices; and (3) the likelihood of discovering important information. The following is a brief discussion of various considerations for common types of media storage devices. Laptop and Desktop Hard Drives In the world of paper discovery, an individual’s most recent and perhaps most valuable information would be the papers and files lying directly on their desk. These files are considered “active files” in the paper world, and are usually a good indication of what an individual has been working on at that point in time. In the e-discovery world, data that can be seen and accessed upon normal booting of the computer is known as active data. Today, the active data contained on an individual’s desktop or laptop computer is usually the best place to begin an electronic evidence investigation when attempting to ascertain an individual’s most recent pursuits. In addition to active data, a laptop or desktop hard drive can contain important deleted data. Deleted data can be found in either the form of slack data (i.e. fragments of data found in the unused portions of a hard drive) or data created automatically by the computer system (i.e. swap and temporary files). The process of recovering and analyzing this data, which is not accessible to the common user, is known as computer forensics; see chapter five for an in-depth discussion of computer forensics. Often, an electronic evidence production will take on both electronic discovery and computer forensics aspects in relation to laptop and desktop hard drives. Networks and Servers In addition to an individual’s paper files, an organization will likely have a common file room where paper documents and other resources can be shared amongst all users. In the information age, this file room concept can be compared to an organization’s computer network. Order now: http://bit.ly/Io6OzM Practical Legal Implications 79 Rarely does an individual in a corporate environment operate his or her computer in a stand-alone state. Typically, the single desktop or laptop is connected to a network server. A network allows users to share hardware, software, and files, in addition to having group scheduling and messaging capabilities. An organization’s IT department can arrange the network in countless ways. However, most networks are arranged in a clientserver arrangement where each individual’s computer is a “client” of a centralized server (i.e. a large computer infrastructure with a large amount of hard disk space). In this configuration, each individual user has access to information placed on the network, but cannot access the hard drives of other individuals. Just as counsel would examine a central file room for responsive or privileged paper documents, counsel must search an organization’s server hard disks when conducting electronic discovery. Backup Tapes Organizations typically back up data to magnetic tape and archive the electronic information. This is done most often so that the data can be retrieved in case of a catastrophic event that destroys the original data. Also, organizations backup data to magnetic tape in order to free up space on their active computer systems while still retaining the data in case it is needed for an investigation or litigation. In the precomputer era, this would be similar to making copies of important files and storing them off-site in case of a fire or flood at the organization’s main center of operations. Usually, an IT staff member is charged with implementing the organization’s backup policy and procedures. Backup software programs are used to copy system information to magnetic tape or another removable archival device. Backups are completed according to a backup procedure or calendar. Most organizations create nightly backups, using a different tape for each night’s backup which will capture only changes that occurred during that day. Often, an organization’s backup policy requires these nightly backup tapes to be recycled or overwritten after one week. In addition to nightly incremental backups, organizations usually conduct full weekly or monthly backups, copying everything that exists on their systems at that time. These backups are stored, sometimes offsite, for longer periods of time, sometimes up to one year or more if the backup tape storage policy goes unchecked. Both the courts and parties in litigation are coming to recognize that archival data is valuable in discovery because it provides a Order now: http://bit.ly/Io6OzM 80 ELECTRONIC EVIDENCE AND DISCOVERY complete snapshot of the documents and e-mail communications at a single point in time. Backup data may be most beneficial when comparing it to active hard drive data to detect data deletion, file modifications, evidence tampering, or to reveal a string of e-mail communication that no longer exists in a user’s e-mail system. Backup tapes often contain evidence that is no longer available from any other source. Backup tapes, however, are not always a panacea for gathering electronic evidence from a single point in time. In certain circumstances, data important to a legal proceeding will be missed if backup tapes are the sole source of gathering evidence. For example, a potentially responsive e-mail that is received and deleted on the same day will not reside on the backup tape archives for either the day prior, day of, or day after the e-mail is received and deleted. However, a forensic investigation of the hard drive of either the sender or the recipient of that e-mail may yield a copy of that e-mail, depending on the amount of time elapsed since its deletion. Removable Media In order to conduct a comprehensive search for all paper evidence, lawyers need to consider whether any documents have been physically removed from the main premises that are the subject of the search for documents. In a search for responsive ESI, lawyers face a similar challenge in the form of removable media. Removable media includes such storage devices as CD-ROMs, DVDs, Zip drives, and USB flash drives, just to name a few. Also, although the 3.5 inch floppy disk has gone the way of the dinosaur in today’s computer world, the floppy disk was the most common type of removable media in the 1990s and could still be floating around an office containing valuable information that can be found nowhere else. Attorneys must make reasonable inquires into whether any removable storage devices exist that may contain information responsive to a discovery request. Because documents can grow legs and travel, a simple search of a premise will not necessarily locate relevant data on removable storage devices. The following are questions that counsel must pose directly to their clients or to the opposing party about evidence contained on removable media to ensure that relevant evidence is located: • Do the users in question typically store data on any removable devices? • Has any person downloaded excessively large amounts of data since commencement of the suit? • Is there a central storage location for archived removable media? Order now: http://bit.ly/Io6OzM Practical Legal Implications 81 Cell Phones, PDAs, and BlackBerry Smartphones The depth and breadth of this category of electronic evidence sources runs the gamut of technology’s latest and greatest developments— personal digital assistants (“PDAs”) with and without e-mail capabilities, cell phones with e-mail or other computing functions, handheld computers, and electronic tablets, just to name a few. The existence of these electronic evidence sources should be explored in discovery and the wording of counsels’ discovery requests should be expanded to include relevant evidence stored therein. Antiquated Data Locations Because technology changes so quickly, today’s high-tech gadgets are tomorrow’s relics. Yet, the data contained on these antiquated data sources might contain the smoking gun piece of evidence in litigation. As such, it is important that out-of-date media sources are not overlooked, especially if they reside in close proximity to or have some other strong connection to other relevant evidence. Such antiquated data locations might include optical disks or older desktops or laptops that have been exchanged for newer models. In addition, do not neglect seemingly “broken” hard drives, computers, or media sources. Oftentimes, qualified computer forensic experts can retrieve data that is outwardly inaccessible to the average person. THIRD PARTY SOURCES AND ACCESSIBILITY Whether searching for paper based evidence or electronic evidence, the last location attorneys should consider when uncovering discoverable information is third parties. In the paper world this means investigating whether any documents were mailed or distributed to people outside the company. In the electronic world, the important questions to ask differ only slightly. For example, were the files e-mailed to someone who might still have them saved on their computer? Did the e-mail travel through an internet service provider (“ISP”) who might possess a copy of the information? Did a third party save a copy to a disk and store it at another location? Is a third party operating a database of information that might be relevant? Oftentimes data that has been destroyed by a party, either pursuant to a document retention policy or intentionally in bad faith, the data might still exist somewhere with a third party. Federal Rule of Civil Procedure 45 allows parties to subpoena third parties to produce responsive ESI; for a more complete discussion of Rule 45 third party subpoenas see section 3.10. Order now: http://bit.ly/Io6OzM 82 ELECTRONIC EVIDENCE AND DISCOVERY Whether looking for one single e-mail or searching for every relevant document, it is important that counsel think globally rather than restrict themselves to only the desktop of the key individuals involved. Counsel should ask broad questions that help ascertain how the targeted individuals and their companies use technology on a day to day basis. Just as a good forensic scientist would not go straight for the dead body and ignore the blood spatters, fingerprints, and bullets scattered on the ground, an electronic evidence investigator cannot proceed straight for the desktop computer and ignore removable media, servers, and backup tapes. With a little “Perry Mason” creativity, an attorney can develop a discovery strategy that encompasses the wide range of potential locations where ESI may be stored. 3.6 Retention, Preservation, and Sanctions for Spoliation Attorneys who go to trial must be aware of the unique spoliation hazards that are particular to electronic data. The unique characteristics of ESI are of critical importance when it comes to the topics of retention, preservation, and sanctions for spoliation, which all are critical to sound electronic document management that is necessary to protect an organization’s informational assets. Retention is the routine practice of appropriately destroying stale documents in the ordinary course of business. Preservation refers to the duty to preserve relevant evidence once litigation is reasonably anticipated. Spoliation is the alteration or destruction of a document so as to make it invalid or unusable as evidence. Sanctions are court-imposed penalties that can be imposed on a party when the party fails to abide by court rules, including rules against spoliation of electronic evidence. This section provides practitioners step-by-step advice on how to manage the potential pitfalls specific to the spoliation of electronic evidence. The law regarding a party’s duties to preserve electronic evidence and the potential sanctions for failure to meet that duty are still evolving in the case law. It is vital that lawyers representing organizations with significant electronic records collections keep abreast of this evolution, and follow current best practices relating to retention and preservation. The key to a successful electronic document management is to have a plan and to follow it. Electronic document management should be seen as a business initiative that is continually reviewed, updated, and audited. Because of the threat of sanctions for non-compliance with retention and preservation rules, this topic should garner top-priority for corporate leadership and counsel. Order now: http://bit.ly/Io6OzM Practical Legal Implications 83 An interesting, but hardly surprising, finding is that in-house counsel cited lack of time and lack of budget as the top two barriers to executing ESI policies. Specifically, thirty-one percent of U.S. and twenty-seven percent of UK respondents cited lack of time and resources as the largest barrier. Additionally, eighteen percent of U.S. and twenty percent of UK respondents cited lack of budget/investment as their number one barrier. Second Annual ESI Trends Report, Kroll Ontrack (2008). These findings show a lack of understanding that the investment in the frontend effort to create a retention and preservation plan can pay off many times over in the form of saved collection costs and frustrations that will likely occur without a plan. Moreover, courts tend to view conduct in accordance with a plan as far more reasonable and far less suspect than conduct that occurs ad hoc; adherence to a reasonable electronic document management policy can be a convincing defense against sanctions. ELECTRONIC DOCUMENT MANAGEMENT: WHAT NOT TO DO A good example of what an organization should not do with regards to electronic document management was played out in the corporate scandals of 2002. Throughout 2002 and well into 2003, prominent newspapers across America headlined stories of companies encouraging their employees to delete files in the wake of a lawsuit or government investigation. For example, in the wake of a pending federal investigation into an initial public stock offering, Frank Quattrone sent an e-mail containing the following language to hundreds of workers, “We strongly suggest that before you leave for the holidays, you should catch up on file cleanup.” United States v. Quattrone, 441 F.3d 153, 166 (2d Cir. 2006). For this act, Mr. Quattrone was sentenced to eighteen months imprisonment for obstruction of justice, obstruction of agency proceeding, and witness tampering. However, the sentence was vacated and remanded for a new trial because of a bad jury instruction, and Mr. Quattrone reached a deferred prosecution deal on August 22, 2006, prior to a new trial. Nonetheless, this case—and the hundreds of others exactly like it—illustrates that spoliation can have severe consequences, including criminal charges, in some cases. RETENTION Defensible document retention requires the development, implementation, and continued monitoring of a thorough and thoughtful Order now: http://bit.ly/Io6OzM 84 ELECTRONIC EVIDENCE AND DISCOVERY electronic document retention policy that is tailored to an organization’s particular needs. A thoughtful retention policy requires the systematic review, retention, and destruction of documents received or created in the course of business. Implementing and following a document retention policy is crucial because it can be a mitigating factor in litigation when documents are destroyed in accordance with the policy. Courts see destruction of electronic documents according to a plan as permissible while destruction of electronic documents that occur haphazardly or contrary to a plan is viewed suspiciously. For example, in Hynix Semiconductor, the court found that documents destroyed pursuant to a retention policy did not constitute spoliation. The court stated, “[The defendant’s] adoption and implementation of its content neutral Document Retention Policy in mid-1998 was a permissible business decision.” Hynix Semiconductor, Inc. v. Rambus, Inc., No. C-00-20905 RMW (N.D. Cal. Jan. 4, 2006). Having the document retention policy in place well before litigation or the threat of litigation arises is also important. Courts are understandably suspicious of retention policies that look like housecleaning campaigns conveniently established with the possibility of litigation on the horizon. As one court warned, “[A company cannot] make a document retention program an integral part of its litigation strategy and, pursuant thereto, target for destruction documents that are discoverable in litigation.” Samsung Elecs. Co., Ltd. v. Rambus, Inc., 439 F. Supp. 2d 524 (E.D. Va. 2006). An initial question that might be asked is, “Why not retain everything forever? What’s wrong with being overly inclusive in document retention?” There are several things wrong with an overly-inclusive document retention policy that will make an organization that chooses this option regret it. First, it is completely unnecessary to retain “everything forever.” An overly inclusive document retention policy ties up resources by requiring vast amounts of computer storage space and decreases system efficiency. Second and more importantly, courts can and do demand that you produce what you have even when it is not reasonably accessible because of undue burden or cost. See Fed. R. Civ. P 26(b)(2)(B) (“the party from whom discovery is sought must show that the evidence is not reasonably accessible because of undue burden [in order to exclude evidence]. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause”) (emphasis added). On the other hand, if the documents were destroyed pursuant to a reasonable document retention policy prior to the time when a preservation duty arises, the courts cannot demand that you produce it because it does not exist. As you probably grasp by now, retention and preservation sometimes feels like walking a tight rope. Order now: http://bit.ly/Io6OzM Practical Legal Implications 85 Steps to Create a Document Retention Policy Having a document retention policy, clearly, is critical. What organizations need to know to create an effective electronic document retention policy, however, is not as complicated as one thinks. The following are a few simple steps that can guide your organization in creating its own policy: Step One: Create an Inventory: The best place to start when creating an electronic document retention policy is to create an inventory of your organization’s ESI. This inventory provides a “table of contents” for the document retention policy—supplying an outline of the company’s electronic framework. The more information you have about your organization’s informational status and needs, the better you can plan for your document retention policy. Inventories are also sometimes referred to as “data maps.” Regardless of what you call or how you organize this inventory, it should include the following: • All active storage devices in use throughout the company (e.g. laptops, cell phones, PDAs, etc.) and their locations; • All archived electronic data storage formats and locations; and • All methods in which data can be transferred to/from the organization. Step Two: Classify Your Records: Every organization should define specific classifications of business records. Differing types of business records have different purposes and different “useful life” periods. It is important to know what the useful life of a record is so that the person creating a retention policy can make a reasonable decision as to how long the record should be retained; documents should be destroyed sometime after their useful life period expires. Setting up record classifications and corresponding useful life periods will streamline record keeping decisions after the record retention policy is in place. Step Three: Determine Retention Periods and Procedures: This step is the bulk of any retention policy. A retention policy must specify retention periods from different classifications of records and procedures for destroying those records. Moreover, a retention policy should include a method for determining retention periods so that a reviewing court can understand the rationale behind the determination so as to be able to judge its reasonableness. In determining appropriate retention periods first determine whether there are any statutory or regulatory retention requirements. Many documents (such as tax documents and SEC filings) must be retained for a certain period of time by law. The statutory retention requirements vary Order now: http://bit.ly/Io6OzM 86 ELECTRONIC EVIDENCE AND DISCOVERY by jurisdiction and can differ for each company. Organizations should consult their in-house or external counsel to conduct their due diligence and find any applicable statutory requirements. The standard for all records not governed by regulations is reasonableness. What is reasonable is determined according to individual business practices, industry standards, and relevant statute of limitations periods. All categories of records do not have to be treated equal. Some data, such as e-mail, can be retained for relatively short time periods, such as thirty to ninety days. Other categories of data, such as financial records and legal documents, may need to be permanently preserved, depending on their contents. The majority of routine business correspondence and project files, such as purchase orders, human resource files, vendor reports, sales reports, inventory/production schedules, etc., can be retained anywhere from one to five years depending on the document’s useful life period as reasonably defined in step two. Retention procedures are also important to determine at this stage. One critical procedure that should accompany all document retention policies is the maintenance of a destroyed records log book that details what was destroyed, when, and by whom. Another important procedure to determine in advance is where and in what format the documents should be retained, and when the documents should be converted to that format, if applicable. The storage requirements for mass amounts of data often require that electronic documents be stored on backup tapes rather than in an active format such as a harddrive. While it is frequently a practical necessity to store documents on backup tapes, keep in mind that it is typically a timely and expensive process to convert data from backup tapes into a readable format again. Also, keep in mind the importance of maintaining an electronic document’s metadata when retaining the document. Step Four: Choose a Records Custodian: An electronic document retention policy should also include appointing a records custodian for each department. Similar to a company’s main organizational chart, the company should set up a records management reporting structure that determines which individuals in the company are directly responsible for developing and enforcing records management policies. Step Five: Create a Discovery Response Team to Ensure Ongoing Compliance: Additionally, an organization should appoint a discovery response team to handle records management issues in the event of pending or impending litigation. Such litigation response teams should be comprised of outside counsel, corporate counsel, human resource supervisors, business line managers, and IT staff. This team should be officially authorized to quickly alter any document retention policy in the event of an emergency and ensure compliance with record preservation duties. Order now: http://bit.ly/Io6OzM Practical Legal Implications 87 Figure 3.6 E-Discovery Response Team It is important that your discovery response team document the day-to-day operations of the retention policy. A compliance monitoring program is an essential component of a document management policy. Also, the team should be responsible for making sure that new and existing employees are training on how the retention policy impacts the day-to-day operations of their work. For example, it is a good idea to educate employees about how often they are allowed to delete e-mail and under what circumstances e-mail files must be retained. The team should work closely with human resources and IT to have a posted policy and informational materials on the company’s Intranet website for employees to easily be able to access. PRESERVATION There is a common law duty to preserve evidence that is relevant to litigation. Once the duty to preserve comes into place, counsel should initiate a litigation hold to preserve all relevant documents and communications. The litigation hold should encompass all documents within the scope of the litigation that are held by both the parties to the litigation and reasonably identifiable third parties. Order now: http://bit.ly/Io6OzM 88 ELECTRONIC EVIDENCE AND DISCOVERY Before the invention and widespread use of the computer and other technologies, document preservation was rather straightforward; counsel gathered the important documents contained in the client’s filing cabinets and informed them not to put any documents through the paper shredder until after the suit was resolved. However, the problem of spoliation of evidence has grown more acute in the context of electronic evidence because the dynamic nature of evidence allows evidence destruction (i.e. spoliation) to occur inadvertently. Destruction of ESI can occur by simply maintaining the status quo. For example, computers will overwrite deleted data when it needs the space for new data. The duty to preserve electronic evidence is triggered, in some instances, even before litigation or an investigation ensues. For sure, a litigation hold must be put in place once notice that litigation has been filed or an investigation has begun is received. The emerging view was stated by the court in Zubulake IV, “The obligation to preserve evidence arises when the party has notice that the evidence is relevant to litigation or when a party should have know that the evidence may be relevant to future litigation.” Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003). In essence, the emerging standard triggers the duty to preserve evidence when there is a reasonable or credible threat of litigation. Not every complaint by an unhappy employee or every rumor is a credible threat of litigation. When a situation arises that may be a credible threat of litigation, an organization should turn to their in-house counsel or outside counsel immediately for advice on whether the duty to preserve evidence has been triggered. That counsel, in turn, can look into the jurisdiction-specific case law and see how the courts in that jurisdiction have treated events with regard to triggering a preservation duty. Generally, examples of situations short of actual notice of litigation or an investigation that trigger the preservation duty include notice of the occurrence of an event which typically results in litigation (i.e. a train crash, a malfunctioning medical device that caused injury, the filing of an insurance claim over a disputed insurance payment, etc.). A litigation hold should be initiated immediately after it is determined that the duty to preserve evidence has been triggered, and that determination should be made as quickly as possible. This is true because electronic records may be inadvertently destroyed by simply maintaining the status quo. It is therefore vital that preservation efforts begin as soon as possible. Unfortunately, many organizations are unprepared and unable to quickly suspend automated document destruction, which regularly occurs due to backup tape recycling procedures. The potential consequences of this automated destruction are severe, both in terms of potential lost evidence to support your case Order now: http://bit.ly/Io6OzM Practical Legal Implications 89 and sanctions. Therefore, it is very important for counsel representing organizations with electronic records collections (which is virtually every organization doing business) to advise clients prior to notice of litigation to evaluate their retention policies, specifically their automated tape recycling protocols. Determining the scope of a preservation duty means determining what evidence must be preserved. The first thing to note is that the duty to preserve evidence encompasses evidence in the possession of your client and in the possession of third parties. A party’s preservation duties include a duty to reasonably identify and notify nonparties of their duties to preserve potentially relevant information. See In re Flash Memory Antitrust Litig., 2008 WL 1831668 (N.D. Cal. April 22, 2008). The triggering of a litigation hold should prompt an attorney to notify anyone that potentially has possession of relevant information, including: third parties, opponents, and potential opponents. This notification should occur at the earliest possible point in time; again, the earlier preservation efforts begin the more likely it is that the inadvertent destruction of relevant evidence will occur. The second thing to note is that the scope of the duty to preserve evidence is an ongoing duty that continues throughout the litigation. An attorney has not meet his or her obligations simply by notifying all potential parties of a litigation hold, but rather an attorney must also monitor compliance. See Zubulake v. UBS Warburg, 229 F.R.D. 422 (S.D.N.Y. 2004) (“A party’s discovery obligations do not end with the implementation of a ‘litigation hold’—to the contrary, that’s only the beginning. Counsel must oversee compliance with the litigation hold, monitoring the party’s efforts to retain and produce the relevant documents.”). The third, and most important, thing to note is that the scope of a litigation hold should be determined as early as possible, and the determination should involve the agreement of the opposing party if possible. In fact, a good faith attempt to work through discovery issues (including the scope of a preservation duty) is mandated by Federal Rule of Civil Procedure 26(f), which requires a conference between the parties as soon as possible and at least twenty-one days before a scheduling conference or the due date of a scheduling order. Rule 26(f)(2) reads in relevant part: In conferring, the parties must . . . discuss any issues about preserving discoverable information; and develop a proposed discovery plan. The attorneys of record and all unrepresented parties that have appeared in the case are jointly responsible for arranging the conference, for attempting in good faith to agree on the proposed discovery plan, and for submitting to the court within 14 days after the conference a written report outlining the plan. . . . Order now: http://bit.ly/Io6OzM 90 ELECTRONIC EVIDENCE AND DISCOVERY Should the parties be successful in reaching an agreement at a Rule 26(f)(2) conference or otherwise as to the scope of preservation duties, the agreement will be submitted as a written report to the court within thirteen days after the conference. Fed. R. Civ. P. 26(f)(2) (2008). The court may then issue a scheduling order pursuant to Federal Rule of Civil Procedure 16. However, in the event an agreement is made that occurs outside of the Rule 26(f) framework, it is prudent to put the agreement with your opponent into a written stipulation. These stipulations can and should be specific with regard to date ranges, individuals, or organizational groups within each party engaged in the litigation. Either a court scheduling order issued pursuant to Rule 16 or a stipulation will provide a framework for each organization to adequately preserve the electronic evidence that is relevant to the case, while avoiding any undue business interruption which would certainly occur if each party were required to suspend all backup tape recycling organization-wide. Should a good faith attempt to reach agreement regarding the scope of the duty to preserve relevant information fail, a party should seek court intervention as early as possible. Although document production under the Federal Rules of Civil Procedure is intended to take place without judicial intervention, see Margel v. E.G.L. Gem Lab Ltd., 2008 WL 2224288 (May 29, 2008), sometimes judicial intervention is necessary and courts are extremely unlikely to penalize you for going to them so long as you first made a good faith effort on your part to resolve the discovery issues. There are several forms judicial intervention can take. First, a party may seek a preservation order from the court, seeking preservation of the opponent’s data. In some instances, these orders may be maintained on an ex-parte basis. When requesting a preservation order for an opponent’s electronic data, a practitioner should be certain to make the request with sufficient specificity as to dates, places, individuals, and topics so as to prefect a reasonable request to the court. Requests that are overbroad or do not define data that can be visibly segregated by one’s opponent are unlikely to be granted. A second option for judicial intervention is to seek an order from the court defining the scope of both parties’ duty to preserve ESI. This motion to the court can include suggestions as to date ranges, lists of individual electronic documents, custodians, and keywords to narrow the duty to preserve. An order defining the scope of preservation duties may be necessary on your end when faced with the challenge of advising a client regarding the proper preservation of relevant electronic evidence, while at the same time ensuring that the business of the client is not unduly interrupted. Order now: http://bit.ly/Io6OzM Practical Legal Implications 91 A third option for judicial intervention is to ask the court to appoint a special master. A special master is appointed by an order of the court, as authorized by Federal Rule of Civil Procedure 53(a), to assist with discovery. Generally, in an electronic discovery dispute, a special master will regulate electronic discovery proceedings, conduct evidentiary hearings, issue orders and sanctions if necessary, and conclude by issuing a Special Master’s Order, Report, or Recommendations to the court. A special master will have technical expertise and experience with ESI issues and can often save parties money by efficiently resolving discovery issues. See Appendix H for a sample special master appointment order. Similarly, the early stages of litigation provide a good opportunity for parties to consider utilizing a third party neutral electronic evidence expert to handle the parties’ electronic data. Such an expert can assist the parties with capturing and storing data, providing the data to the court for in-camera review, and production. A neutral expert can be appointed by the court and be designated as an officer of the court. See Simon Prop. Group L.P. v. mySimon, Inc., 194 F.R.D. 639 (S.D. Ind. 2000). Alternatively, parties may agree to use a third party neutral to assist them with discovery issues without court appointment. The benefit of having the third party neutral be court-appointed is court supervision and approval of the third party’s role. However, obtaining a third party neutral without a court order may be an attractive option in smaller cases where attorneys are more cost sensitive because it will avoid the costs associated with obtaining the court order; nonetheless, make sure you stipulate any agreement in writing. See Appendix G for a sample third party neutral appointment order. A final note about the duty to preserve electronic data is that the duty ends when a matter (litigation or investigation) concludes. Attorneys should advise the client to end the preservation hold and resume routine document destruction in accordance with the organization’s document retention police when the duty to preserve ends. Failure to resume a document retention policy increases storage costs and the amount of available information that may need to be searched for discovery in future litigation or investigations. SANCTIONS FOR SPOLIATION Sanctions are penalties imposed by a court on a party or on a party’s attorney for violation of a court rule. Courts have authority to issue sanctions against parties that violate the law or a previous court order both under their inherent judicial authority and under the Federal Rules of Civil Procedure. Sanctions can be issued for a plethora of discovery Order now: http://bit.ly/Io6OzM 92 ELECTRONIC EVIDENCE AND DISCOVERY misconduct (e.g. untimely production, providing production in a format contrary to agreement, or court order, etc.). In this section, however, we shall narrowly discuss sanctions for spoliation of evidence. Spoliation is the alteration, destruction, or failure to preserve evidence so as to make the evidence unavailable for litigation. See Zubulake v. UBS Warburg, 220 F.R.D. 212, 216 (S.D.N.Y. 2003). Spoliation often results in unfair prejudice to the opposing party because the lack of evidence can make it impossible for a party to prove out his or her case. Rule 37(e) Safe Harbor Provision New provisions were added to Federal Rule of Civil Procedure 37 as part of the 2006 amendments to the Rules that establish a “safe harbor” from sanctions. Rule 37(e) provides in relevant part: Failure to Provide Electronically Stored Information. Absent exceptional cir- cumstances, a court may not impose sanctions under these rules on a party for failing to provide electronically stored information lost as a result of the routine, good-faith operation of an electronic information system. The addition of this safe harbor provision to the Federal Rules of Civil Procedure offers limited protection against sanctions for a party’s good faith inability to produce ESI that was lost as the result of “routine” data management practices. Rule 37(e) expresses a clear intent that parties should not generally be sanctioned for spoliation that occurs despite good faith. It is important to note that the rule does not preclude the possibility of sanctions for all non-intentional spoliation for several reasons. First, loss of ESI that is the result of a reckless or negligent electronic information system can hardly be said to be loss due to a “good-faith operation.” Second, the rule allows for sanctions to be issued when information is lost despite a party’s good-faith routine operation of a computer system in “exceptional circumstances.” Third, the phrase, “routine, good-faith operation of an electronic information system” is not defined in the rules and thus leaves room for courts to exercise discretion in issuing sanctions by interpreting “routine” and “good-faith” either narrowly or broadly. Importantly, however, the Committee Note to Rule 37 offers that the routine operation refers to “the ways in which such systems are generally designed, programmed, and implemented to meet the party’s technical and business needs.” With regard to good faith, the Committee Note explains that steps taken by a party “to comply with a court order in the case or party agreement requiring preservation of specific electronically stored information” should be considered Order now: http://bit.ly/Io6OzM Practical Legal Implications 93 “among the factors that bear on a party’s good faith.” Fourth, Rule 37(e) does not preclude the court from imposing sanctions for negligent spoliation derived from the court’s inherent judicial authority. Finally, keep in mind that Rule 37(e) governs federal proceedings and state proceedings are governed by jurisdiction-specific rules, which may not include any safe harbor provisions. Generally, courts are adhering to Rule 37 and declining to issue sanctions if spoliation is the result of routine, good-faith data management practices. For example, in Diabetes Center of America, the court denied requests for sanctions after determining there was an absence of bad faith in a case where both parties failed to backup or otherwise preserve relevant e-mails. Diabetes Ctr. of Am. v. Healthpia Am., Inc., 2008 WL 336382 (S.D. Tex. Feb. 5, 2008). On the other hand, courts that find deliberate destruction of electronic evidence have little hesitation issuing sanctions. See Hawaiian Airlines, Inc. v. Mesa Air Group, Inc., 2008 WL 185649 (Bkrtcy. D. Haw. Jan. 22, 2008). Severity of Sanctions Courts have granted very severe sanctions against parties for committing spoliation of electronic evidence. Potential sanctions for spoliation include, but are not necessarily limited to, the following: • Monetary sanctions; • Preclusion of evidence sanctions; • Adverse jury instructions allowing an adverse inference that the destroyed evidence would have been harmful; and • Default judgment, summary judgment, or dismissal. See Linnen v. A.H. Robins Co., 1999 WL 462015, (Mass. Super. June 16, 1999). The severity of sanctions is a determination “confined to the sound discretion of the trial judge, and is assessed on a case-by-case basis.” Zubulake v. UBS Warburg LLC, 220 F.R.D. 212 (S.D.N.Y. 2003). There are a number of factors, however, that courts will likely consider when evaluating motions for sanctions and determining whether to issue sanctions, and the appropriate severity of the sanctions. These factors include, but are not necessarily limited to, the following: • The nature and scope of the preservation duty (e.g. was the scope of the preservation duty reasonable, was there a court order to preserve that was broken by the spoliation, etc.); • The circumstances surrounding the breach of the preservation duty (e.g. is there evidence that the breach by the spoliation was Order now: http://bit.ly/Io6OzM 94 ELECTRONIC EVIDENCE AND DISCOVERY willful, reckless, negligent, or due to the routine, good-faith operation of a computer system, whether there was adequate notice that the documents should have been preserved); and • The consequences of the breach (e.g. the extent of the prejudice to the opposing party). The key factor in determining whether more severe sanctions (e.g., default judgment) versus less severe sanctions (e.g., monetary sanctions) are warranted seems to be the level of culpability or intent in the destruction of the electronically stored information. A good example of a case where the most severe sanction of default judgment was found appropriate is William T. Thompson Co. In this case, an electronic document preservation order was issued by the court. In contravention of that order, executives within the organization directed their employees to continue with backup tape recycling procedures, indicating that this was permissible under the order. The court disagreed, ordering default judgment against the party and individually sanctioning the executive issuing the memo in the amount of $450,000. This decision is of particular note because it is not a new case; rather, the case was decided in 1984. William T. Thompson Co. v. General Nutrition Corp., 593 F. Supp. 1443 (C.D. Cal. 1984). More recently, in Ingoglia, the court found the severe sanction of dismissal appropriate based on the plaintiffs’ conduct of deleting numerous files from his home computer following a request for production but preceding the production. Ingoglia v. Barnes & Noble Coll. Booksellers, Inc., 2008 WL 458504 (N.Y. App. Div. Feb. 19, 2008). Use of Sanctions as a Trial Tactic For better or for worse, a common tactic used by counsel engaged in complex litigation involving e-discovery is setting up the other party for potential sanctions relating to spoliation of evidence. It is important to note that when responding to requests, one should consider whether the requesting party has sought the particular information with the intent of establishing that the opposing party has not retained or preserved all relevant e-evidence. CONCLUSION The potential consequences of spoliation are severe both in terms of lost evidence that can help you prove out your case and potential sanctions, and necessitate that retention and preservation efforts play a predominant role in any trial attorney’s case strategy. The key to avoiding lost evidence and sanctions is to have a retention policy, preservation Order now: http://bit.ly/Io6OzM Practical Legal Implications 95 plan, and discovery response team in place long before the threat of litigation arises. Having a plan in place, following that plan, and documenting that you are following that plan will go a long way in convincing a court that your discovery conduct was reasonable, and that any spoliation was the result of routine, good-faith operation of an electronic information system that should thus fall within the safe harbor provision of Rule 37(e). 3.7 Privilege and Inadvertent Waiver The concepts of attorney-client privilege, work-production protection, and inadvertent waiver are extremely familiar to practicing attorneys. For those who may not be as familiar with the concepts, attorneyclient privilege is a legal doctrine that protects communications between an attorney and his or her client about the subject matter of the representation, with a few narrow exceptions. Similarly, the workproduct protection protects from discovery any materials prepared under an attorney’s direction in anticipation of litigation, with a few narrow exceptions. However, both attorney-client privilege and workproduct protection can be waived, thus allowing the previously protected communications and materials to become discoverable. Waiver can be made knowingly with a party’s consent or inadvertently by disclosing privileged information accidently. The danger of inadvertent waiver is particularly high in the context of e-discovery. The volume of responsive electronically stored evidence was previously unknown in the paper world. Any lawyer who has engaged in large scale document review understands that reviewing every single document contained in every electronic file to determine whether it contains privilege is a Herculean task. Teams of temporary attorneys and paralegals are often necessary to assist in the review of tens of thousands, or even millions, of electronic documents. With so many reviewers, there is bound to be differences in judgment as to whether a particular document is privileged or responsive. The sheer volume of documents reviewed in a certain day can allow privileged documents to slip unnoticed into the production set. The potential consequences of allowing a privileged document containing damaging information to slip past you are severe. As discussed below in the section regarding the substantive law of waiver, there is a real danger in some state jurisdictions that the waiver of privilege will extend to all documents pertaining to the subject matter disclosed by the inadvertently produced document. This could have catastrophic results for the client, and could even result in a successful malpractice action by the client against his or her counsel if it is determined that Order now: http://bit.ly/Io6OzM 96 ELECTRONIC EVIDENCE AND DISCOVERY the attorney acted negligently in inadvertently producing privileged documents. The federal legal framework governing inadvertent privilege is best thought of as having two counterparts that act together in symphony. First, Federal Rule of Civil Procedure 26(b)(5) provides the procedural law governing privilege; Rule 26 determines the procedural framework for treating an inadvertent production after it has already occurred. Second, newly enacted Federal Rule of Evidence 502 provides the substantive law governing privilege, including: the scope of privilege waiver, the determination of waiver in the event of inadvertent disclosure, the effect of waiver agreements and court orders, and the interplay between waiver determinations in federal courts and state courts. Counsel must understand both parts of this framework in order to fashion a strategic plan to avoid inadvertent disclosure whenever possible and to mitigate damages when inadvertent waiver nonetheless occurs. RULE 26 AND THE PROCEDURAL LAW OF WAIVER Federal Rule of Civil Procedure 26(b)(5) provides a framework for the producing party to notify the court and their opponent of an inadvertent production, should it occur, and to belatedly seek determination of attorney-client privilege or work-product protection. Rule 26(b)(5)(B) provides: Information Produced. If information produced in discovery is subject to a claim of privilege or of protection as trial preparation material, the party making the claim may notify any party that received the information of the claim and the basis for it. After being notified, a party must promptly return, sequester, or destroy the specified information and any copies it has; must not use or disclose the information until the claim is resolved; must take reasonable steps to retrieve the information if the party disclosed it before being notified; and may promptly present the information to the court under seal for a determination of the claim. The producing party must preserve the information until the claim is resolved. Rule 26(b)(5) is a procedural rule that provides that the receiving party of information subject to a claim of privilege or protection cannot use or disclose the information automatically. Rather, the information must be returned to the producing party, sequestered by the court, or destroyed. The court must then make a determination whether waiver due to inadvertent disclosure has occurred. Keep in mind that damage has likely already occurred when privileged information has been inadvertently produced as the likelihood that the information has been seen by the opposing party is great. Even if the information is returned, Order now: http://bit.ly/Io6OzM Practical Legal Implications 97 you cannot erase that information from the memory or minds of counsel despite a court order to disregard the contents. In other words, you cannot put toothpaste back into the tube. RULE 502 AND THE SUBSTANTIVE LAW OF WAIVER In response to the widely-disparate common law treatment of privilege issues in federal courts and real inadequacies in the previously existing framework, Congress recently enacted Federal Rule of Evidence 502, titled “Attorney-Client Privilege and Work Product; Limitations on Waiver.” Since Rule 502 was signed into law by the president on September 19, 2008, at the time of the printing of this book, the exact impact of the new rule as it will be interpreted by the courts has yet to be determined. Without a doubt, however, Rule 502 will provide much needed uniformity to federal privilege law and significantly increase the prevalence of privilege agreements and privilege court orders in discovery practice. Rule 502 aims to increase efficiency and decrease the risks and costs associated with document production by providing protections against inadvertent disclosure and broad waiver. The rule was proposed by the Judicial Conference Rules Committees who have “long been concerned about the rising costs of litigation, much of which has been caused by the review, required under current law, of every document produced in discovery, in order to determine whether the document contains privileged information.” Committee on Rules of Practice and Procedure of the Judicial Conference of the United States, Advisory Letter to Hon. Patrick J. Leahy, Chairman, Committee on the Judiciary United States Senate, Sept. 26, 2007, available at http://www.uscourts. gov/rules/Hill_Letter_re_EV_502.pdf#page=16. The newly enacted Rule 502 has the potential to achieve its stated goals of costs savings and to significantly change the way parties and courts manage privilege disputes. Subject Matter Waiver under Rule 502 Prior to the enactment of Rule 502, federal courts varied in their treatment of when a privilege disclosure constituted subject matter waiver (i.e. the waiver of privilege over documents when one related privileged document is disclosed). Some federal courts strictly held that any disclosure, no matter how innocent, waived privilege over all related documents while other courts held that a privileged disclosure must be intentionally made to constitute subject matter waiver. Rule 502(a), which reads as follows, limits subject matter waiver to instances where: Order now: http://bit.ly/Io6OzM 98 ELECTRONIC EVIDENCE AND DISCOVERY “(1) the waiver is intentional; (2) the disclosed and undisclosed communications or information concern the same subject matter; and (3) they ought in fairness to be considered together.” Several important things should be noted by practitioners regarding Rule 502(a). First, by limiting the circumstances under which inadvertent disclosure can constitute subject matter waiver, Congress has significantly relieved the fear that the inadvertent disclosure of one innocent document can legitimately force the producing party to turn over a smoking gun. This provision strongly supports a notion of fairness, especially in light of the increased likelihood of inadvertent disclosure given the enormous volume of ESI which frequently must be reviewed in modern litigation. Second, Rule 502(a) requires state courts to honor federal court determinations regarding the scope of privilege waiver. The binding effect of the federal determinations provides certainty to litigants in trying their cases insomuch as a later court cannot second guess a privilege determination and mandate full subject matter disclosure in a separate action. In short, subject matter waiver will occur less frequently under Rule 502 than it would have under the previously existing common law in many jurisdictions. Inadvertent Disclosure under Rule 502 Rule 502(b) requires all courts to follow a consistent framework in analyzing inadvertent waiver claims. Rule 502(b) provides: Inadvertent Disclosure—When made in a Federal proceeding or to a Federal office or agency, the disclosure does not operate as a waiver in a Federal or State proceeding if: (1) the disclosure is inadvertent; (2) the holder of the privilege or protection took reasonable steps to prevent disclosure; and (3) the holder promptly took reasonable steps to rectify the error, including (if applicable) following Federal Rule of Civil Procedure 26(b)(5)(B). Rule 502 adopts the balancing approach previously taken by the majority of federal courts in analyzing waiver claims when privileged documents are inadvertently disclosed. The crucial component of Rule 502(b) is that it still requires the holder of the privilege to take “reasonable steps to prevent disclosure.” As with any new rule, judicial interpretation, advocacy, legal scholarship, and circumstance will undoubtedly mold the meaning of the phrase “reasonable steps” into a term of art. However, rules do not exist in a vacuum and courts will look to existing precedent to determine standards of reasonableness. The recent judicial trend under the common law balancing test has been to demand high standards of privilege review. Moreover, the common law balancing approach placed the burden of showing reasonable Order now: http://bit.ly/Io6OzM Practical Legal Implications 99 precautions to avoid inadvertent waiver on the producing party. See Victor Stanley, Inc. v. Creative Pipe, Inc., 2008 WL 2221841 (D. Md. May 29, 2008); See also In re Sealed Case, 877 F.2d 976 (D.C. Cir. 1989). The Victor Stanley case, recently decided by Chief Magistrate Judge Paul Grimm, analyzed the inadvertent production of 165 privileged documents under the balancing approach. The 165 privileged documents slipped through a keyword search undertaken to recognize privileged documents. The court in this case focused most of its analysis on the reasonableness of precautions taken to prevent inadvertent disclosure and found that the producing party had not met its burden of proving that it took reasonable precautions. The Victor Stanley court found the producing party had not met its burden because it failed to provide the court with information regarding the keywords used when conducting the privilege search, the rationale for the keyword selection, the sophistication level of the keyword search, the qualifications of the persons who made the keyword selection, or whether any sampling was done to ensure the accuracy of the keyword selection results. Keyword searches for privilege are becoming increasingly common, and this case was significant insomuch as it set a high standard for privilege searches. The case also gave concrete guidance on what characteristics of a keyword search is required for a keyword search to be considered a reasonable precaution under the intermediate approach. Accordingly, it is unlikely that courts will read Rule 502 to allow for a decreased standard of reasonableness. In fact, it is more likely that courts will continue to order parties to produce specific evidence of cautionary measures (i.e. “reasonable steps”) taken to avoid inadvertent disclosure. Party Agreements and Court Orders Regarding Privilege under Rule 502 Rule 502 clarifies the effect of non-waiver orders and agreements. Prior to the enactment of Rule 502, sophisticated counsel were increasingly forming clawback agreements and attempting to obtain clawback court orders. A clawback agreement is a non-waiver agreement in which the parties agree that the inadvertent disclosure of a privileged document does not constitute a waiver of privilege, that the privileged document should be returned or a certificate should be provided that the document was destroyed, and that any copies or notes about the document should be destroyed. Some courts, but far from all, sanctioned the clawback agreements by issuing them in the form of a stipulated order. Prior to Rule 502, forming a clawback agreement or obtaining a Order now: http://bit.ly/Io6OzM 100 ELECTRONIC EVIDENCE AND DISCOVERY clawback order was sometimes prudent, but there was no guarantee that the agreement or order would be honored by state courts or in proceeding brought by a third party. The significance of Rule 502 with regard to privilege agreements and orders cannot be stressed enough— Rule 502 changes everything! Under Rule 502(d), a court order regarding privilege is binding on the entire world, including third parties and state courts. The security of knowing that Rule 502(d) privilege orders will be enforced will allow counsel to enter into them more freely than ever before. By entering into these agreements, counsel hugely protect their privileged documents and also decrease the likelihood of costly discovery disputes over privilege waiver. Rule 502(d) provides: Controlling Effect of a Court Order. A Federal court may order that the privilege or protection is not waived by disclosure connected with the litigation pending before the court–in which event the disclosure is also not a waiver in any other Federal or State proceeding. In sum, Rule 502(d) provides attorneys with a powerful legal tool to prevent waiver by incorporating a clawback or other privilege agreement into a court order. Notably, however, Rule 502(d) provides that a court may order privilege not waived by disclosure; the Rule does not require that an order must be issued in any situation. Importantly, it also appears from a reading of the Rule’s plain language that courts may issue Rule 502(d) orders sua sponte or in response to privilege disputes. Accordingly, practitioners should be prepared to advocate for their clients and argue why the court should or should not incorporate their privilege agreements into a binding order. Courts will most likely grant these orders with increasing frequency given the clear intent of Congress in passing this statute of encouraging privilege orders, provided counsel can articulate the reasonableness of the requested order. Rule 502(e) also addresses the effect of a party agreement: Controlling Effect of a Party Agreement—An agreement on the effect of disclosure in a Federal proceeding is binding only on the parties to the agreement, unless it is incorporated into a court order. Note that Rule 502(e) agreements are binding only on the parties to the agreement; Rule 502(e) provides no protection in subsequent proceedings or against third parties. It is hard to imagine a situation in which an attorney would not want to take the extra step of obtaining a Rule 502(d) order, which enforces the agreement against the entire world instead of just the agreeing parties. Absent extraordinary circumstances, the only time a Rule 502(e) agreement should be Order now: http://bit.ly/Io6OzM Practical Legal Implications 101 entered into instead of a Rule 502(d) order is when the order is denied by the court. As a final note, the common law prior to the enactment of Rule 502 decreed that negotiated non-waiver agreements did not excuse parties from undertaking pre-production privilege review or taking less than reasonable precautions to avoid the inadvertent disclosure of privileged documents. See Hopson v. Mayor & City Council of Baltimore, 232 F.R.D. 228 (D.Md. 2005). In other words, a clawback agreement should be used as a backup defensive strategy, not as a first line of defense. Interplay Between Federal and State Courts under Rule 502 Rule 502 is unprecedented in that it mandates that state courts honor federal court determinations regarding scope of privilege waiver under Rule 502(a), determinations regarding waiver due to inadvertent disclosure under Rule 502(b), and Rule 502(d) court orders. Rule 502(f) further provides that these federal determinations are binding on federal-annexed and federal court-ordered arbitration proceedings. Furthermore, Rule 502(c) provides that federal courts will be bound by state court privilege determinations under application of the law that is most protective against waiver, be that either Rule 502 or the law of the state where the disclosure occurred. Notably, however, Rule 502 does not provide that a state court determination is binding on another state. The binding effect of federal and state privilege determinations is essential to achieving Congress’ goal of decreased costs associated with discovery; it allows holders of privileged documents to rely on the Rule’s protections without fear of being overruled by another court. Conclusion Rule 502 revolutionizes the law of privilege in federal courts in a much needed way, by providing consistency in federal standards and allowing attorneys to reasonably predict how courts will rule in privilege matters. Accordingly, the rule should relieve much of the anxiety that accompanies privilege review of massive amounts of ESI by providing clear expectations of what one can expect in the event of an inadvertent disclosure. However, nothing in Rule 502 excuses sloppy discovery practices. To the contrary, the finding of waiver through inadvertent disclosure falls under the court’s discretion and requires attorneys to be prepared to defend their discovery conduct. Moreover, Rule 502 will not remedy the uncomforting reality that, waiver or no waiver, disclosures provide your legal opponent with potentially case-compromising information Order now: http://bit.ly/Io6OzM 102 ELECTRONIC EVIDENCE AND DISCOVERY they would not otherwise have. Accordingly, taking reasonable steps to prevent inadvertent waiver is a requirement to responsible discovery practice, as mandated by Rule 502(a). STRATEGIES TO PREVENT INADVERTENT WAIVER There are several strategies that counsel can take to minimize the likelihood that inadvertent documents will be produced or to mitigate the consequences of the disclosure. The following is a discussion of strategies counsel should consider. Use Rule 502(d) and Rule 502(e) As discussed above, privilege orders issued by courts under Rule 502(d) now have a binding effect on the entire world, and are great tools to protect against inadvertent waiver. Counsel should attempt to obtain a Rule 502(d) order to protect against privilege waiver unless circumstances provide that an order would not be in the client’s best interests. For example, counsel may be confident in the adequacy of their privilege review and believe it is substantially likely that their opponent’s privilege review will produce evidence harmful to their case—this is a gamble however, so be careful! In the event a Rule 502(d) order cannot be obtained, counsel should consider entering into a Rule 502(e) agreement with the opposing party. Try to Limit Production Examine the scope of the requests and potential production to see if there are ways to limit the production. A colossal volume of electronic documents, such as e-mail, exists in many organizations. Often, a complete review is unnecessary when the anticipated costs are weighed against the importance of the entire data set. Try to limit the production in some manner, such as: stipulate an agreement between the parties, use technology keyword searches to narrow the responsive production, object to production arguing that the production is “not reasonably accessible because of undue burden or cost” pursuant to Federal Rule of Civil Procedure 26(b)(2)(B), etc. Limiting production will allow you to devote more resources to a careful privilege review of the smaller set of documents you do review. Utilize Quality Controls in Your Privilege Review System Perhaps the most important thing you can do to avoid inadvertently producing documents is to utilize quality controls in your privilege Order now: http://bit.ly/Io6OzM Practical Legal Implications 103 review system. One way to achieve quality control is to do a random sampling of documents that are deemed privileged and not privileged to ensure that the review produced accurate results. Your review manager should be able to craft such quality control processes. Also, it is a good idea to do a final review of the production set just before delivery to the opponent. Having a production system with sufficient checks and balances will help you withstand the light of judicial scrutiny when a reviewing court evaluates your review and production conduct for reasonableness. You will need to work closely with your electronic discovery consultants and experts to ensure quality control, as determining whether the review and production systems are well organized and meet industry standards often requires expertise. Use Technology New evolutions in technology can also assist in reducing the risk of inadvertent disclosure by segregating potentially privileged data for review. For example, if a firm engages an electronic discovery expert to assist in the collection, processing, and production of e-mail and other electronic documents, that expert may be able to set aside potentially privileged documents so that a reviewer is able to be “on guard” that certain documents he or she reviews on a particular occasion may be privileged. This is accomplished through the use of keyword searching of electronic documents to find keywords that suggest a document may be privileged (e.g. attorney, litigation, privilege, confidential, etc.). The technology can also set aside documents created by or received by named attorneys. The overall goal of this technology is to avoid the most common type of inadvertent disclosure—that which results from fatigue or inattention to detail in a large scale document review in which reviewers spend long days looking at a myriad of documents. Have a Response Plan In Place Develop a plan to react in the event you determine that a privileged document has been inadvertently produced. Both technologies and human reviewers make mistakes, and sometimes inadvertent production will occur no matter how careful you are in your review. In this eventuality, you need to be able to assert the claim in a timely manner. A timely claim of privilege is important for several reasons. First, it decreases the likelihood the opposing side has already reviewed the information and learned damaging information that you cannot erase from their memories. Second, the timeliness in which you invoke your claim of privilege is a factor in the reasonableness inquiry under the common law balancing Order now: http://bit.ly/Io6OzM 104 ELECTRONIC EVIDENCE AND DISCOVERY approach to determining whether there was a waiver by inadvertent disclosure, and is also a requirement under the Federal Rule of Evidence 502 for an inadvertent disclosure not to constitute a waiver (“the holder promptly took reasonable steps to rectify the error”). Educate Your Clients Ensure that clients are aware of the risks and the decisions made in the production process so that there are no “surprises” in the event of an inadvertent disclosure. Involve the client in each step so that the client understands attorney client privilege and waiver issues. This will accomplish two purposes. First, understanding the waiver issue and its potential consequences will likely serve as a motivation for your client to support a more careful review procedure, even if it is more expensive. Also, educating your clients about the dangers of inadvertent waiver in advance may make them less likely to be surprised in the event that inadvertent waiver occurs, and thus less likely to bring a malpractice lawsuit. 3.8 Requesting and Responding There is an art and a science to obtaining and delivering all critical electronic documents in litigation. Successful practice of this art involves a complicated dance, using all the traditional tools of discovery available to litigators. The steps to this intricate dance—which has two versions— will be discussed at length in this section. The following is an overview of the steps involved in each of the two stages: Requesting Electronic Documents in Discovery • Enforcing initial disclosure requirements; • Participating in and gaining agreements during the early “meet and confer” sessions; • Framing initial interrogatories; • Taking depositions of technical staff; • Issuing requests for production and onsite inspections; • Enforcing compliance with motions to compel and motions for sanctions. Responding to E-Discovery Requests • Understanding your client’s technical architecture; • Developing proportionality arguments to negotiate limitations on discovery; • Using sampling techniques wherever possible . Order now: http://bit.ly/Io6OzM Practical Legal Implications 105 What follows herein is a practical, step-by-step guide to help litigation teams obtain and deliver the most relevant and complete set of discovery documents possible. These steps may be expanded upon or otherwise modified to fit one’s specific case strategy, but they are designed to afford practitioners the best odds at obtaining critically important ESI and limiting overbroad ESI requests from your opponent. REQUESTING ELECTRONIC DOCUMENTS IN DISCOVERY Step One—Requesting: Enforce Compliance with Rule 26 Disclosure Requirements Federal Rule of Civil Procedure 26(a)(1)(A) requires the initial disclosure of “electronically stored information” (e.g., electronic files, databases, e-mails). Rule 26(a)(1)(A) reads in relevant part: In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court, a party must, without awaiting a discovery request, provide to the other parties: (ii) a copy—or a description by category and location—of all documents, electronically stored information, and tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or defenses, unless the use would be solely for impeachment. This means that litigators must disclose, at a minimum, all sources and locations of electronic data. Data will commonly be located on individual desktops and laptops, network server hard drives, removable media (e.g., USB drives, floppy discs, and CDs), backup tapes, and personal digital assistants (e.g., Palm Pilots, BlackBerries). Data may also be in the possession of third parties, such as Internet service providers, and on the computer systems of other peripherally involved entities. See section 3.4 in this chapter for more information on data locations. Having knowledge of how much, what type, and where data exists is essential to effective discussions in the Rule 16 and Rule 26(f) “meet and confer” conferences regarding the timing, form, and limitations on discovery. Given the requisite technical expertise necessary to competently evaluate electronic data locations, it may be in your best interest to work with someone technical—be it an IT person charged with assisting with e-discovery or an outside ESI consultant— to help you evaluate the completeness of your opponent’s initial disclosures. Whether on the producing or receiving side of a document request, forming a solid relationship with someone technical will only improve your e-discovery advocacy. Lastly, from an offensive position, enforcing your opposing party’s Rule 26 disclosures is critical Order now: http://bit.ly/Io6OzM 106 ELECTRONIC EVIDENCE AND DISCOVERY Figure 3.7 Practice Points: Disclosure of ESI Experts A subtle issue within the broader topic of requesting electronic information is the question of whether a party must disclose its retained ESI consultants and experts under the requirements of Rule 26. FRCP 26(a)(2) calls for the disclosure of any person who may be used at trial to present evidence under Federal Rules of Evidence 702, 703 or 705. Counsel must make a determination as to whether to disclose any retained electronic evidence experts involved in the case under this rule. In analyzing the text of the rule and its construing case law, as well as the Federal Rules of Evidence relating to experts, some guidance is found. The basic questions which one must ask are: 1) 2) 3) Will any testifying expert rely on computer data provided by either party, or will the expert rely on data obtained through his or her own investigations? Will any testifying expert use custom, proprietary, or publicly-available software to process data, generate a report, or present to the court? Does counsel anticipate requesting discovery of either the underlying data or the software used by any testifying expert? See KENNETH J. WITHERS, COMPUTER BASED DISCOVERY IN FEDERAL CIVIL LITIGATION (Federal Courts Law Review) (2000). Computer forensic experts likely fall within the gamut of the Rules given their similarity to other types of scientific or technical expert witnesses (e.g. medical experts, engineering experts, fire experts) and therefore should be disclosed under FRCP 26(a)(2). Examples of testimony from a computer forensic expert include opinion testimony regarding the source of a particular data fragment on a hard drive, or the date an electronic file was originally created. Electronic discovery experts, on the other hand, likely fall outside the scope of the FRE requirements. Since e-discovery experts assist with the collection, filtering, review, and production of electronic documents, they may possess the kind of “scientific, technical, or other specialized knowledge” contemplated by Federal Rule of Evidence 702. However, a parallel can be drawn between such an expert and a records-custodian who simply retrieves, photocopies and certifies hard copy documents. A discovery expert used in the simple records-custodian capacity should only perform duties that fall squarely within the work product doctrine. To the extent such an expert is necessary to establish chain of custody, he or she becomes a foundational witness and need not be disclosed under Rule 26. in helping you frame further document requests later on down the e-discovery road. Step Two—Requesting: Participate in and Gain Agreements During the Rule 26(f) Conference One of the most useful electronic discovery management tools may be the early planning provisions now mandated by the Federal Rule Order now: http://bit.ly/Io6OzM Practical Legal Implications 107 of Civil Procedure Rule 26(f) pretrial conference; see section 3.2 for a more complete discussion of Rule26(f) conferences. At this conference, lawyers should be prepared to discuss the realities of their own clients’ electronic data, as well as take this opportunity to gain good background information about how opposing parties are storing electronic information. Topics for discussion at the Rule 26(f) conference may include: • Preservation of evidence (including whether backup, archival and “deleted” files will be exchanged); • Preliminary disclosures as to the parties' computer systems and specific inventories of your opponents’ IT infrastructure (including numbers, types, and locations of computers, operating systems in use, and backup schedules); • Scope of discovery, including accessibility arguments • E-document processing, review, and production formats and protocols; • Cost allocations and whether any cost shifting arguments will be made to the court; and • Any anticipated evidentiary disputes (including inadvertent waiver of privilege). Being adequately prepared to address these topics at the Rule 26(f) conference will likely assist counsel in limiting the scope of discovery required from one's own client while maximizing the disclosures from opposing parties. In many situations it may be necessary to provide the court with expert testimony as to the nature, location, and volume of electronic data, as well as the time and cost involved in producing it. Further, take advantage of the conferences associated with Rule 16, which was designed to help both the parties and the court prepare for and seek agreement on electronic discovery issues at the outset of litigation. Know that savvy opponents will use the Rule 16 conference as an opportunity to ensure the court understands the potential technological issues involved in collecting, reviewing, processing, and producing any electronic data you may request. Step Three—Requesting: Frame Interrogatories to Obtain Technical Information about Your Opponent’s ESI Practices Based upon the information gained through the process of the Rule 26(a)(1) initial disclosures, or the Rule 26(f) conference (or any similar state court mechanisms for conferring with other parties and the court), attorneys should frame a few interrogatory questions. Note that if you are running short on allocated interrogatories you can Order now: http://bit.ly/Io6OzM 108 ELECTRONIC EVIDENCE AND DISCOVERY alternatively frame a few written deposition questions. These probes should be aimed at obtaining information about how one’s opponent manages their ESI, in essence helping to clarify the opponent’s procedures, systems, and policies. An interrogatory directed at gaining more information about the opponent’s e-mail system, might look something like this: Identify all e-mail systems in use, including but not limited to the following: (a) List all e-mail software and versions presently and previously used by you and the dates of use; (b) Identify all hardware that has been used or is currently in use as a server for the e-mail system including its name; (c) Identify the specific type of hardware that was used as terminals into the e-mail system (including home PCs, laptops, desktops, cell phones, personal digital assistants [“PDAs”], etc.) and its current location; (d) State how many users there have been on each e-mail system (delineate between past and current users); (e) State whether the e-mail is encrypted in any way and list passwords for all users; (f) Identify all users known to you who have generated e-mail related to the subject matter of this litigation; and (g) Identify all e-mail known to you (including creation date, recipient(s), and sender) that relate to, reference or are relevant to the subject matter of this litigation. For additional sample interrogatories, see Appendix D. A good starting place in formulating these interrogatories is a list of electronic evidence issues generated by Kenneth J. Withers, formerly of the Federal Judicial Center. This list provides an exhaustive roadmap of the types of information that might be obtained through your interrogatories. Consider the following inquiries for the subject of your interrogatories: • Number, types, and locations of computers currently in use; • Number, types, and locations of computers no longer in use, but relevant to the facts of the case; • Operating system and application software currently in use; • Operating system and application software no longer in use, but relevant to the facts of the case; • Name and version of network operating system currently in use; • Names and versions of network operating systems no longer in use, but relevant to the facts of the case; Order now: http://bit.ly/Io6OzM Practical Legal Implications • • • • • • • • 109 File-naming and location-saving conventions; Disk or tape labeling conventions; Backup and archival disk or tape inventories or schedules; Most likely locations of records relevant to the subject matter of the action; Backup rotation schedules and archiving procedures, including any backup programs in use at any relevant time; Electronic records management policies and procedures; Corporate policies regarding employee use of company computers and data; and Identities of all current and former personnel who had access to network administration, backup, archiving, or other system operations during any relevant time. See Kenneth J. Withers, Computer Based Discovery in Federal Civil Litigation FCLR (2000). You may also desire to inquire about the following: • IT infrastructure and systems architecture (including organizational charts or network configuration diagrams); • Password protection and encryption policies; • Use of data compression mechanisms; • E-mail mailbox management, including size limitations and retention policies; and • Litigation response policies, including any response if given notice of a duty to preserve data. If properly phrased, an opponent’s response to these interrogatories should provide direction for a follow-up FRCP Rule 30(b)(6) deposition, Rule 34 document requests, or subpoena duces tecum. These follow up steps are discussed below in this section. Conducting the appropriate inquiry into the realities of an opponent’s data management and retention is absolutely critical to the ultimate success of attempts to obtain electronic evidence. In litigation— like in life—you have to walk before you can run. If counsel does not have a basic understanding, early in the case, of what data and information is in the possession of the opponent, it will be very difficult to adequately enforce requests for production and to ensure that all relevant information has been produced. Step Four – Requesting: Take 30(b)(6) Depositions of IT Representatives Following the receipt of responses to the initial interrogatories, counsel should utilize the Rule 30(b)(6) deposition relating to the opponents’ computer systems and e-document management (a.k.a. the “person Order now: http://bit.ly/Io6OzM 110 ELECTRONIC EVIDENCE AND DISCOVERY most knowledgeable” deposition). The subparts of Rule 30(b)(6) provide in relevant part: Notice or Subpoena Directed to an Organization. In its notice or subpoena, a party may name as the deponent a public or private corporation, a partnership, an association, a governmental agency, or other entity and must describe with reasonable particularity the matters for examination. The named organization must then designate one or more officers, directors, or managing agents, or designate other persons who consent to testify on its behalf; and it may set out the matters on which each person designated will testify. A subpoena must advise a nonparty organization of its duty to make this designation. The persons designated must testify about information known or reasonably available to the organization. This paragraph (6) does not preclude a deposition by any other procedure allowed by these rules. Fed. R. Civ. P. 30(b)(6) (2008) (emphasis added). The real beauty of this type of deposition is most apparent in the e-discovery context. Rule 30(b)(6) requires the opposing party to evaluate the deposition notice and put forth the person or persons within the organization who are truly able to provide full and complete answers on the topics described in the notice. Typically, mid-level IT managers are the most knowledgeable about where and how to find their organization’s relevant data. If upon deposition the deponent is unable to answer key questions, counsel is able to require the opponent to produce another individual who is capable of answering the questions completely. A distinct advantage in using this discovery mechanism is, as we have found in our experience, that internal IT professionals often exhibit a high degree of both knowledge and candor with respect to their employer’s computer systems. For example, one of our clients, several years ago, experienced a situation in which she deposed the opponent’s Director of IT following her receipt of a discovery response indicating that all relevant e-mail had been produced. In the deposition, our client inquired at length about backup tape recycling policies and the existence of archival copies of e-mail. The deponent IT Director indicated, quite proudly from his perspective, that his department had indeed suspended backup tape recycling practices in order to ensure that they had a complete copy of all past backups. In fact, he indicated that the company had several hundred additional backup tapes containing e-mail from the target individuals for the target time period. He further went so far as to ask counsel if she would like a copy. It is important to note, however, that some corporations, with heavy dockets of litigation have taken a more proactive role in handling their e-discovery obligations. Many of these corporations have Order now: http://bit.ly/Io6OzM Practical Legal Implications 111 created IT positions with no day-to-day IT duties, and instead these technical personnel are completely responsible for working with the general counsel’s office and outside counsel when it comes to e-discovery productions on behalf of the corporation. Should you encounter this type of IT role in your Rule 30(b)(6) depositions, be prepared, as these individuals are typically exceptionally versed in ESI best practices. Consider preparing for these technical depositions using an IT or ESI consultant of your own, or have your ESI consultant accompany you to the deposition as an expert resource. We propose closely evaluating each of your opponent’s interrogatory responses, as discussed above. These responses will serve well as an outline for inquiry during the Rule 30(b)(6) deposition. Further, in taking the deposition, it is critical that counsel not simply cease questioning after the policies in place are revealed. Instead, it is crucial that counsel determine whether and to what degree the organization is complying with these policies. Successful completion of one or more Rule 30(b)(6) depositions will be a tremendous help in guiding the future requests for production of documents and interrogatories. Equally important, information gained through these depositions will prepare counsel to formulate a plan for receiving, processing, and reviewing the data that will be produced by the opponent. Step Five – Requesting: Issue Rule 34 Requests for Production and Onsite Inspections Once the groundwork has been laid by completing steps one through four, counsel is ready for the meat of discovery—the Rule 34 request for production of documents and onsite inspections. The subparts of Rule 34(a) provide in relevant part: A party may serve on any other party a request within the scope of Rule 26(b): (1) to produce and permit the requesting party or its representative to inspect, copy, test, or sample the following items in the responding party’s possession, custody, or control: (A) any designated documents or electronically stored information—including writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations—stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form; or (B) any designated tangible things; or (2) to permit entry onto designated land or other property possessed or controlled by the responding party, so that the requesting party may inspect, measure, survey, photograph, test, or sample the property or any designated object or operation on it. Order now: http://bit.ly/Io6OzM 112 ELECTRONIC EVIDENCE AND DISCOVERY Document Requests We suggest consideration of the following issues when framing FRCP 34(a)(1)(A) requests for production of electronic documents: 1. 2. 3. 4. 5. 6. 7. 8. Proportionality: Ensure that the requests are broad enough to cover the necessary electronic documents but not so overly broad as to result in legitimate burden and expense objections from your opponent. Search terms and custodians: Consider narrowing requests by providing specific keywords to be used in document searches, precise data locations or media types to be searched, key personnel to be focused on, or exact date ranges by which the search for information can be restricted. Data locations: Consider all of the various potential locations for relevant data, as discussed in detail in section 3.4 of this text. Version control: Be sure to request prior versions and drafts of word processing documents, e-mail, and other important documents so that you can be assured that you have all the relevant information which may be contained in multiple draft documents. Unique file types: Request specific information or native copies of files for documents which originate in electronic formats that are unique, or which contain additional valuable information that is not necessarily available on the face of the documents. This typically includes spreadsheet and database files. Production format: Specify the format that is preferred for the production of the information. For example, specifically request either .tiff or .pdf images, litigation support load files, native document productions, printed documents, or other formats as appropriate. Forensic analysis of deleted files: Where appropriate, consider requesting that a complete mirror image of media be produced in order to facilitate a forensic review and analysis. Depending on the circumstances, this type of production may require the appointment of a third party neutral expert to facilitate the implementation of a protocol for the review and production of this data in order to preserve privilege and relevance objections. See chapter 5 on computer forensic analysis. Document retention policies: Request an actual copy of adversary’s electronic information retention policy, and compare it to that which was learned in the Rule 30(b)(6) depositions of the IT staff. Order now: http://bit.ly/Io6OzM Practical Legal Implications 113 It is important to note here that any Rule 34 document requests must be narrow in scope and closely defined. It is our experience from first-hand conversations with several federal court judges that courts have little difficulty telling to a party seeking “all relevant electronic documents” that they need to go back to the drawing board. There is plenty of case law to support a responding party’s objections in this regard as well. See Palgut v. City of Colorado Springs, 2007 WL 4277564 (D. Colo. Dec. 3, 2007) (denying motion to compel as discovery requests were overbroad and unduly burdensome, noting requesting party no more entitled to the producing party’s ESI than to an entire warehouse storing paper documents); State ex rel. Gehl v. Connors, 2007 WL 3024436 (Wis. Ct. App. Oct. 18, 2007) (finding request for production was overbroad and overly burdensome); Menke v. Broward County Sch. Bd., 916 So.2d 8 (Fla. Ct. App. 2005) (quashing production order of computer search issued by administrative law judge as overbroad); Wright v. AmSouth Bancorp, 320 F.3d 1198 (11th Cir. 2003) (denying motion to compel as overly broad and unduly burdensome). Onsite Inspections In addition, consider requesting inspection of your opponent’s physical premises and computer infrastructure through a Rule 34(a)(2) onsite inspection. Rule 34(a)(2) provides, “A party may serve on any other party a request . . . to permit entry onto designated land or other property possessed or controlled by the responding party, so that the requesting party may inspect, measure, survey, photograph, test, or sample the property or any designated object or operation on it.” Onsite inspections are common and seldom disputed; in rare circumstances, on site inspections are disputed on individual privacy or corporate confidentiality grounds. For example, in John B. vs. Goetz 531 F.3d 448 (Tenn. 2008) an onsite inspection that ordered plaintiffs’ computer expert to enter state agencies and the offices and homes of state officials was overruled on privacy and state sovereignty grounds. John B. v. Goetz, 2007 WL 3012808 (M.D. Tenn. Oct. 10, 2007). See also GTFM, Inc., v. Wal-Mart Stores, 2000 WL 1693615 (S.D.N.Y. Nov. 9, 2000); Lawyers Title Ins. Co. v. United States Fidelity & Guar. Co., 122 F.R.D. 567 (N.D. Cal. 1988). Onsite inspections will be particularly useful if, for example, the opponent has a unique and proprietary computer system (e.g., a database) such that the retrieval of the information would be particularly difficult and burdensome. This fact is true because data stored in a database is often difficult to produce in discovery because of the inherent archi- Order now: http://bit.ly/Io6OzM 114 ELECTRONIC EVIDENCE AND DISCOVERY tecture of databases. Because a database is merely a grouping of data, as opposed to a series of actual documents, a simple Rule 34(a)(1) document request will not typically afford access to the information sought. The optimum approach to obtaining access to database information is to inspect the database onsite with a qualified database expert who can formulate the proper queries to identify and extract the relevant data in a usable format. Typically, the court or parties will establish detailed protocols for such an inspection so that non-responsive, privileged, and proprietary information is protected. It is important to note, however, that your opponent may resist such onsite inspection requests, stating that the database’s reporting mechanisms will be sufficient to generate information to the requesting party. A Kroll Ontrack case comes to mind which provides a practical example of this type of situation. In the matter, a large corporate defendant had a legacy version of a complex database which the plaintiff, a competitive corporation, believed contained relevant and discoverable information. The database was no longer in use in the defendant’s business. The plaintiff made a motion to compel discovery of the information contained in the database. In response to the motion, an electronic evidence expert retained by the defendant indicated that the data in the database was no longer accessible because it was no longer in use and no one within the defendant organization knew or had the technology to make the data available. However, Kroll Ontrack, retained by the plaintiff in this case, believed that it could gain access to the database with one of our database experts. The judge in the case ruled that the database might contain discoverable information, and suggested that Kroll Ontrack immediately put its expert on the plane to the defendant’s location in order to inspect the database to see what could be done. We did so, and in fact recovered discoverable information from the database. Step Six—Requesting: Enforce Compliance with Motions to Compel and Motions for Sanctions In analyzing your opponent’s disclosures and Rule 34 productions, you might be able to determine if your opponent undertook a complete and good-faith search for electronic documents. For example, in Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003) it became clear to the Plaintiff that the Defendant had not searched for and produced all relevant electronic documents. In this case, the Defendant responded to the Plaintiff’s electronic document request by producing approximately 350 pages of documents, including approximately Order now: http://bit.ly/Io6OzM Practical Legal Implications 115 100 pages of e-mails, and claimed that its production was complete. However, the Plaintiff knew that there were additional responsive e-mails that the Defendant had failed to produce because she herself had produced approximately 450 pages of relevant e-mail correspondence. Clearly, numerous responsive e-mails were not produced by the Defendant. If your opponent’s response to your discovery request does not seem adequate, there are plenty of cases to support your motion to compel. For example, in Two Bank Accounts the court granted the party’s motion to compel, admonishing that discovery is “not a game” but is a “two-way street” that must be diligently followed. United States v. Two Bank Accounts, 2008 WL 2696927 (D.S.D. July 2, 2008); see also Dean v. New Werner Holding Co. Inc., 2008 WL 2560707 (D. Kan. June 26, 2008) (ordering production within thirty days for failure to produce complete initial production and disclosures); Race Tires Am., Inc., a Div. of Specialty Tires of Am., Inc. v. Hoosier Racing Tire Corp., 2008 WL 2487835 (W.D. Pa. June 16, 2008) (ordering completed production within seven days noting the production was four months overdue and warning sanctions would be imposed if further discovery abuses were to occur). Moreover, courts have repeatedly found sanctions appropriate for failure to provide complete and adequate responses to discovery requests. Most often, counsel should seek sanctions in the form of attorney’s fees and costs for the opposing party’s failure to produce ESI. For example, in Attard the court awarded monetary sanctions requiring the defendant to pay reasonable attorneys’ fees and costs accrued by the plaintiff to enforce discovery due to the defendant’s production of defective data. Attard v. City of New York, 2008 WL 1991107 (E.D.N.Y. May 5, 2008). However, requesting more severe sanctions is also appropriate in cases where the responding party’s conduct has been egregiously inadequate, intentional, or otherwise contrary to the spirit of liberal discovery. For example, the court in a recent case granted default judgment sanctions against the defendants for failure to comply with court-ordered production, as well as a history of discovery abuses, and ordered the defendants to pay judgment in favor of the plaintiffs in the amount of $5.2 million dollars plus nearly $650,000 in attorneys’ fees and costs. S. New Eng. Tel. Co. v. Global NAPs, Inc., 2008 WL 2568567 (D. Conn. June 23, 2008). Conclusion The revised Federal Rules of Civil Procedure and the transformation from paper to electronic document discovery does not change the Order now: http://bit.ly/Io6OzM 116 ELECTRONIC EVIDENCE AND DISCOVERY manner in which discovery practices have been conducted for years. When seeking electronically stored information, do not stray from the tried and true discovery tools from the paper discovery world. According to the Federal Judicial Center, the most frequently used discovery devices are: • • • • • • Document production: 84% Interrogatories: 81% Depositions: 67% Initial disclosures [FRCP 26(a)(1)]: 58% Expert disclosure [FRCP 26(a)(2)]: 29% Expert discovery: 20% Source: Federal Judicial Center, Discovery and Disclosure Practice, Problems and Proposals for Change: A Case-based National Survey of Counsel in Closed Federal Civil Cases. Nov. 1997. These same discovery tools should be your best means for securing information in the electronic world. Following the six steps discussed in the sections above will assist counsel in navigating the sea of electronic discovery—everything from initial disclosures through interrogatories, depositions, document production, and onsite inspections. If counsel foregoes even one step in the process, he or she might have difficulties evaluating whether the opponent has truly “produced” everything requested. RESPONDING TO REQUESTS FOR ELECTRONIC DOCUMENTS IN CIVIL LITIGATION Typically, a party issuing a discovery request will also likely need to respond to a discovery request at some point during the lawsuit; it is the proverbial goose and gander phenomenon. In other words, what is demanded of one party may well be eventually requested of the other. Like requesting electronic documents, responding to document requests requires a high degree of savvy in order to ensure your client does not bear the burdens associated with a “fishing expedition” discovery production. The steps associated with responding to a document production, which will be discussed for the remainder of this chapter, include: • Understanding your client’s technical architecture; • Developing proportionality arguments to negotiate limitations on discovery; • Using sampling techniques wherever possible. Order now: http://bit.ly/Io6OzM Practical Legal Implications 117 Step 1—Responding: Understanding Your Client’s Technical Architecture As has been discussed in previous chapters and sections of this book, the importance of understanding both your opponent’s and client’s technical environments cannot be understated. This intricate knowledge is perhaps most critical when it comes to responding to document requests on behalf of your client. However, this is one of those areas that seems so simple to state in black-and-white text on a page, yet is so complex in the real world. Truly understanding your client’s IT systems will require that you develop a close partnership with the teams charged with setting up and maintaining those systems. Interestingly, the recent trend has been to give more responsibility to IT departments with regard to not only maintaining the systems that manage ESI but also in the development and enforcement of ESI policy. Thirty-five percent of in-house counsel in the U.S. and twenty-five percent of in-house counsel in the UK attribute primary ESI responsibility to the IT staff. This percentage is up from 2007, when eighteen percent of U.S. respondents and fourteen percent of UK respondents attributed ESI responsibility to IT personnel. Second Annual ESI Trends Report, Kroll Ontrack (2008). This transfer of authority over ESI policy is a testament to the highly technical nature of ESI and also a sign that organizations are maturing and taking a more collaborative approach to ESI to achieve superior results. However, without significant involvement of and guidance from lawyers, this trend is potentially dangerous. While IT personnel are extremely skilled at the technical aspects of maintaining ESI, they lack the legal training and experience to know what needs to be preserved or produced in response to a production request. The responsibility of the trial attorney or in-house counsel is to communicate with and work cooperatively with IT staff to ensure the ESI policy that is developed meets all legal requirements. This is where the rubber often hits the road. In a general sense, IT staff and lawyers have nothing in common and could be likened to Mars and Venus. They do not speak the same language (e.g., Dell PowerEdge 1955 Blade Servers with Quad-Core Intel® Xeon® 5000 Sequence processors and 32 GB of Ram v. expressio unius est exclusio alterius). They did not receive the same types of educational training (e.g., a degree in information systems v. a Juris Doctor law degree). They do not have the same types of hobbies or groups of friends (online gaming groups with other “techies” v. golfing events with judges). While this may be a colossal oversimplification and generalization, the underpinnings cannot be ignored. In the ordinary course of running a business, the IT and legal teams are not going to organically interact on a day-to-day basis. Only in the Order now: http://bit.ly/Io6OzM 118 ELECTRONIC EVIDENCE AND DISCOVERY artificial realm of litigation are these two teams thrown together for the good of the business. So what is a lawyer to do? Grab your “Legalese-to-Techie” dictionary and dig in. Help them understand your world and strive to understand theirs. Together, work to build best practices and hire the best suited service providers for your needs. Remove barriers and achieve some e-discovery document production successes under both of your belts. (In full disclosure, one of the authors of this book is married to a computer programmer—proving that technical and legal professionals can truly coincide in harmony.) Step 2—Responding: Developing Proportionality Arguments to Negotiate Limitations on Discovery Armed with a concrete knowledge of their client’s technical architecture behind them, attorneys facing a discovery request should consult the provisions of Federal Rules of Civil Procedure 26(b) and its subparts. Specifically, the FRCP 26(b)(1) provides, “All discovery is subject to the limitations imposed by Rule 26(b)(2)(C).” The subparts of Rule 26(b)(2)(C) provide in relevant part: Limitations on Frequency and Extent (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery otherwise allowed by these rules or by local rule if it determines that: (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues. Fed. R. Civ. P. 26(b)(2). As a threshold matter, it is absolutely critical that practitioners understand that both the accessibility provisions in Rule 26(b)(2)(B) and the proportionality provisions in Rule 26(b)(2)(C) apply to responses for requests for discovery of electronically stored information. The majority of the following discussion deals with Rule 26(b)(2)(C) because Rule Order now: http://bit.ly/Io6OzM Practical Legal Implications 119 26(b)(2)(B) was previously discussed along with data locations and accessibility in section 3.6 of this chapter. However, it is important to note how the Rule’s subsections work in tandem yet are also distinguished from one another. Rule 26(b)(2)(B) was a new addition to the Federal Rules of Civil Procedure on December 1, 2006. The addition recognized that the unique features of ESI (the enormous volume of potentially discoverable information, the many locations in which it can be found, etc.) and granted courts the discretion to take the undue burden and expense these unique features may cause into consideration and deem the electronic evidence not reasonably accessible (thus not discoverable) without good cause. Rule 26(b)(2)(B) provides an additional argument for a responding party to contest a production request that is not reasonably accessible due to undue burden or cost, which is a lower hurdle to cross than the proportionality requirements of Rule 26(b)(2)(C). Rule 26(b)(2)(C) is a rule that mandates limitations on a production request if its proportionality requirements are met, unlike Rule 26(b)(2)(B) which is largely left in the discretion of the court. Application of Rule 26(b)(2)(C) and its proportionality considerations, embodied in subparts (i), (ii), and (iii), play a predominant role in responses to requests for discovery of electronic information. Rule 26(b)(2)(C)(i) provides that discovery must be limited if the court determines that the discovery is unreasonably cumulative, duplicative, or obtainable from another source that is more convenient, less burdensome, or less expensive. Historically, parties responding to requests for electronic documents have argued that the request for their documents in electronic form is cumulative to the request for documents in paper form. Due to the special nature of electronic documents (as described at length in other sections of this text), this argument has largely been unsuccessful, particularly in recent years. Electronic documents contain metadata specific to their creation, including information relating to who created the documents, when they were created, when they were saved, when they were modified, and to whom they were sent. This and other valuable information is contained only in documents in their electronic form. Therefore, arguments that electronically created documents that have been previously produced in paper should be sufficient, often fail. However, as with all discovery, if the party has already produced information in one electronic format, or in the electronic format most convenient to it, it is a valid argument to assert that such information should not also be produced in multiple other electronic formats. Subsection (ii) of FRCP 26(b)(2)(C) permits the court to limit discovery where the requesting party has had ample opportunity to obtain Order now: http://bit.ly/Io6OzM 120 ELECTRONIC EVIDENCE AND DISCOVERY the information sought. As stated before, electronic documents are very often the best and only source of some information. The best example of this is e-mail documents. E-mail represents a uniquely accurate source of evidence and information relating to the individual’s opinions, thoughts, and actions contemporaneous to the events. Electronic documents also contain a degree of candor, which is not often seen in other forms of communication. Therefore, any argument that a party has had ample opportunity to obtain information may have only marginal success if it is used to defeat the production of electronic records, unique by their very nature. By far the most used subset of Rule 26(b)(2)(C) is subpart (iii). This subpart provides the meat of all objections to discovery, particularly document discovery in the electronic context. The rule provides an opportunity for advocacy on behalf of one’s client and the demonstration of the specific burden or expense associated with the proposed production of electronic records. As known by any party who has engaged in substantial electronic record productions, the task can be both burdensome in time, effort, and expense. Therefore, an objection to the production of one’s electronic records has the most chance of success if it is couched in a context of subpart (iii) of this rule. However, it is of the utmost importance to note that blanket objections of burden and expense have been largely unsuccessful in thwarting the discovery of electronic records. This fact is increasingly true as courts, counsel, and highly litigated organizations become more e-discovery savvy. As players in the civil litigation industry become increasingly educated on how exactly e-discovery production works, courts will be less receptive to parties crying wolf—claiming that it is plainly too expensive and burdensome to produce the requested data. Any objection to the production of electronic records based on burden and expense must be supported by an accurate and credible demonstration of that burden or that expense. With respect to the burden and expense of producing electronic records, counsel would be well advised to seek the assistance of an and IT staff member or ESI consultant to provide an affidavit or testimony as to the extent of the burden and expense associated with a particular ESI production, using specific factual data to support the burden assertions. Consider a request for production of e-mail from several company executives relating to customer accidents for a two-year period in a product liability litigation. This is not an uncommon request. The expert, which provides the demonstration of burden and expense related to the production of electronic records should, at a minimum, include statements in their affidavit or testimony which specifically address: Order now: http://bit.ly/Io6OzM Practical Legal Implications 1. 2. 3. 4. 121 The type of e-mail package used by the executives or users in question and the technological tools available to access that e-mail. If archival media (i.e., backup tapes) must be accessed in order to obtain e-mail for a past time period, the expert affidavit or testimony should specifically address any technological limitations in accessing data from the software and hardware platform used to create the backup tape. The expert statement should specifically state the amount of time necessary to restore each of the backup tapes as well as a mathematical calculation as to the number of backup tapes that must be restored in order to gain access to the subject e-mail. The expert’s statement should specifically include reference to the structure of the data on any backup tapes or media as to the time period at issue in the case. If the two-year time period in question spans several tapes, the expert’s statement should calculate any additional time or effort required to restore those tapes individually, as well as any other technological hurdles to the production of the data, including whether the target individual’s e-mail is maintained on separate servers and separate locations, thus necessitating additional tape restoration. The expert’s statement used to demonstrate the burden and expense should specifically state whether any keyword terms will be applied to the data set in order to extract information relevant to the case. The expert report should also provide an accounting for the costs of the production based on its expertise. A party can then rely on the specific statements of its retained e-evidence expert in order to make recommendations to the court and opposing parties as to specific limitations on its duty to produce electronic records. This premise was amply demonstrated in Ex Parte Wal-Mart, Inc., 809 So. 2d 818 (Ala. 2001). In the case, an individual was struck by a falling nineteen-inch television set in a Wal-Mart store a few days after Christmas. In his personal injury action against Wal-Mart, the plaintiff requested that Wal-Mart produce a wide variety of electronic documents maintained in its corporate database. Wal-Mart objected to the request for production on the grounds that the requests were overly broad, unduly burdensome, and not relevant to the case. The plaintiff moved the trial court to compel Wal-Mart to answer the questions and produce the documents. The court entered an order requiring WalMart to produce all of its customer incident reports and employee accident review forms, limiting the production to stores within the state Order now: http://bit.ly/Io6OzM 122 ELECTRONIC EVIDENCE AND DISCOVERY of Alabama and to a five-year period prior to the incident. Wal-Mart vigorously opposed this order, making motions at the trial court and appellate level. On appeal to the Supreme Court of Alabama, the Court held that the trial judge was authorized to order discovery of all of the falling merchandise incidents within the geographical and temporal limits he imposed. In so holding, the Court confirmed that within the context of the electronic document production it was appropriate to place these geographic and temporal limits. Limiting production to a narrower subject matter or set of search terms (e.g. date range, locations, relevant individuals’ computers, etc.) is par for course in modern discovery motions. For example, the court in Petcou limited the retrieval of ESI to two narrow categories of e-mail (undeleted e-mail of current employees specifically named by the plaintiffs, and any relevant e-mails of the nature cited by the plaintiff of which the defendants were aware of and had retained) in order to avoid undue burden and expense. Petcou v. C.H. Robinson Worldwide, Inc., 2008 WL 542684 (N.D. Ga. Feb. 25, 2008). Note that it is very hard to make compelling arguments regarding undue burden and expense without an expert to back you up when the subject matter (i.e. how much a search of computer systems will cost) is so highly technical. In light of the case law and our practical experiences, we propose that any objection to the production of electronic records be specific in requesting the following limitations: 1. 2. 3. 4. Time; Geography of incidents or locations within an organization; Specific individuals and organizational elements relevant to the case; and Specific to the issues of the case including the potential inclusion of keyword terms Inclusion of these elements in one’s objection or response to discovery of electronic records will significantly advance the probability that the argument will be successful in placing limits on discovery. Further, it is always critically important to provide specifically supported arguments with regard to the remainder of Rule 26(b)(2)(C)(iii) dealing with matters addressing the marginal utility of a request such as: (1) the needs of the case, (2) the amount in controversy, (3) the parties’ resources, and (4) the importance of the issues at stake in litigation. These specific factors were confirmed as important to the production of electronic records in the landmark Zubulake decision by Judge Shira Ann Scheindlin from the Southern District of New York. Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003). Order now: http://bit.ly/Io6OzM Practical Legal Implications 123 Figure 3.8 Data Sampling RESPONDING—Step 3: Using Sampling Techniques Wherever Possible When faced with a request for production of ESI that seems overly broad in scope, one should consider proposing that the client first provide a sample of representative electronic data for review and evaluation. Then, the court can have a statistically sound basis to determine whether additional data should be produced. The concept of sampling has gained particular popularity and momentum in the context of electronic discovery. One of the first cases in which the data sampling protocol was explored and used extensively was McPeek v. Ashcroft, 202 F.R.D. 31 (D.C. 2001). A “must read” e-discovery case, McPeek contains a succinct analysis of the realities of backup tape procedures within organizations and comments on the proportionality issues specific to this type of evidence. It also addresses this concept of data sampling discussed herein. McPeek involved a suit by a Department of Justice employee relating to his alleged discrimination while employed by the Department. In the context of his suit, the plaintiff requested e-mail and other electronic documents be produced from backup tapes of the Department’s e-mail system. In evaluating the request and response, the court engaged in an important discussion of the nature of backup tape data. The court stated that: Using traditional search methods to locate paper records in a digital world presents unique problems. In a traditional “paper” case, the producing party searches where she thinks appropriate for the documents requested under Fed.R.Civ.P. 34. She is aided by the fact that files are traditionally organized by subject or chronology . . ., such as all the files of a particular person, independent of subject. Backup tapes are by their nature Order now: http://bit.ly/Io6OzM 124 ELECTRONIC EVIDENCE AND DISCOVERY indiscriminate. They capture all information at a given time and from a given server but do not catalogue it by subject matter. McPeek v. Ashcroft, 202 F.R.D. 31 at 32-33. This random nature of data storage on backup tapes creates problems unique to electronic evidence. Backup tapes from multiple locations and time periods must be restored and searched in order to obtain relevant e-mail even if it is requested for a specific person and time. In order to properly address the competing needs of the plaintiff to obtain critical evidence, which may only have existed in e-mail form on the backup tapes, and the needs of the Department to control costs in alignment with the case issues, the McPeek court ordered the use of a data sampling protocol. Specifically, the McPeek court ordered the Department to perform a backup restoration of e-mails attributable to a specific Department individual during a specific time period—July 1, 1998, to July 1, 1999. The court ordered that the Department should pay for the restoration of the backup tapes necessary to retrieve information for the sample. The court stated that the Department should then search and produce the sample data for e-mails responsive to the plaintiff’s request. Importantly, the court required that the Department “carefully document the time and money spent in doing the search” and the results of the search. Upon completion of the search, the court stated that it would permit the parties an opportunity to argue why the results did or did not justify a further search for e-mail evidence. The McPeek decision was followed by McPeek II. McPeek v. Ashcroft, 212 F.R.D. 33 (D.D.C. 2003). In this opinion, the court analyzed the arguments of both plaintiff and defendant as it related to the production of additional e-mail evidence following the evaluation of the sample. The court specifically considered the issues relevant to the case, for which contemporaneous information may have been recorded via e-mail, and the time periods for which backup tapes still existed. The Court ordered the search and production of some information while denying the plaintiff’s request for search and production of other information. Other courts have expanded upon the protocols discussed in McPeek, determining the extent to which electronic records should be produced. Data sampling is continuing to grow in judicial and party popularity, and as it does so the acceptable protocols for data sampling continue to evolve. Generally speaking, however, data sampling should be conducted scientifically using statistically sound principles so that the result is one the court and parties can reasonably rely upon. In Farmers Insurance Company, for example, the court ordered the defendant to use a statistical sampling technique to meet the trial Order now: http://bit.ly/Io6OzM Practical Legal Implications 125 court’s “muster for integrity of the process and protect both litigants from distortive effects” to produce discovery. Farmers Ins. Co. v. Peterson, 81 P.3d 659 (Okla. 2003). For another example, the court in J.C. Associates ordered random file-sampling of claim files to determine relevance. J.C. Assoc. v. Fidelity & Guar. Ins. Co., 2006 WL 1445173 (D.D.C. May 25, 2006). Additionally, two notable cases employing the data sampling protocols are Murphy Oil USA, Inc. v. Fluor Daniel, Inc., 2002 WL 246439 (E.D. La. Feb. 19, 2002) and Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003). In sum, these cases illustrate that data sampling represents an important mechanism at the counsel’s disposal in responding to requests for electronic documents. With data sampling, counsel can attempt to limit its duty to restore backup tapes. First, the issues in the case should be translated into actionable technology tasks, such as restoring backup tapes for specific time periods, individuals, and topics. The results of these sample searches should then be used to advocate on behalf of one’s client as to the scope of any additional search and production, which is warranted. Conclusion The bottom line when it comes to responding to requests for document production is that understanding the data and the data environment that you are working with is crucial to making persuasive arguments against production. The three most common grounds on which production can be limited is lack of relevance, privilege, and undue burden. To make relevance or privilege arguments, you must show the judge that the data you are dealing with is either non-relevant or privileged, which can be accomplished by a comprehensive data map or data sampling. To make undue burden arguments, you must show the judge the size, layout, and features (e.g., not reasonably accessible due to extensive restorative procedures that would be needed to access the data) of the technical architecture on which your data is stored. Following the three steps discussed in this section will enable counsel, often with the aide of an IT expert or ESI consultant, to make these arguments persuasively. Limiting production will allow discovery to proceed more quickly in a less expensive manner, goals that a client will no doubt share. 3.9 Review and Production Considerations REVIEW AND PRODUCTION OPTIONS After all the legal and technical negotiations are complete comes the actionable task of physically reviewing the volume of documents for Order now: http://bit.ly/Io6OzM 126 ELECTRONIC EVIDENCE AND DISCOVERY responsiveness and privilege and then making the production to the opposing party. Attorneys not riding the wave of e-discovery law and technology advancements may believe that “old school” document review methods are best utilized here; yet, nothing could be further from the truth. FRCP rule changes and technology innovations have bread opportunities and challenges, dramatically altering the way discovery sets are reviewed and produced today. For both review and production, litigation teams have five options: • • • • • Litigation support software; Online review tools; Printed documents; Native files; and A hybrid option, involving more than one method above. Both the legal and technical aspects of these review and production options will be discussed for the remainder of this section. Litigation Support Software Before the dawn of e-discovery, many law firms chose to implement a localized litigation support database to assist litigation teams in managing sets of discovery documents, deposition transcripts, kits, case chronologies, privilege logs, and more. The law firm is responsible for loading the software onto its users computers, ensuring there is enough disk space for the database, training the users, and maintaining the system. For smaller discovery sets, these tools can be used for document review. Over the years, “load files” for these tools have grown to become the standard for exchanging sets of documents. Litigation teams produce the responsive documents (native and images), metadata, extracted text, and a load file that helps the tool import all the information into the litigation support database. Online Review Tools With the advent of e-discovery filtering and processing and the surge in volume of e-discovery sets, many service providers started developing online review tools to aid in the document review and production process. These online review repositories allow litigation teams to search, categorize, highlight, redact, and annotate documents all within a web-based, secure database hosted by the service provider. The litigation team is provided a web-URL and a series of logins and passwords to access their discovery set. Most of these tools preserve and display the document in its native form, along with a TIFF image, original metadata (to, from, cc, bcc, create date, last accessed date, Order now: http://bit.ly/Io6OzM Practical Legal Implications 127 etc.), and even can assist with basic reporting and privilege log creation. Most service providers strive to improve their online review tools, adding cutting-edge features and functionality to the tool to gain market differentiation. Cutting-edge features in some tools include, conceptual searching, advanced visualization graphs and charts, multilingual support, and auto-translation for documents in other languages. When it comes time to the produce documents, some parties will take advantage of the online repository format for production purposes as well. The service provider copies and transforms the review database into a production database by locking down the categorizations and redactions, hiding comments, annotations, and other work product, and removing all non-desired functionality (except basic searching perhaps). The locked database then can be copied to a new and distinct database for the requesting party to review. This option maintains the security of the data and annotations while allowing the receiving party to review the produced data with the benefits of technology. Print Some parties are still choosing to review and produce electronic documents in a printed format. While this option is quickly going the way of the dinosaur for large discovery sets, many small and mid-size cases are still printing documents for review and production purposes. It is important to note that should a party choose to transfer an electronic document to a paper format that certain cautions apply. For example, when an electronic document is printed, certain behind the scenes metadata fields are lost, resulting in an incomplete review and production of this piece of discoverable ESI. If this is your review and production format of choice, metadata must accompany printed pages in a separate table, slip sheet, or branded on the corners of the document. Native Files A number of recent cases demonstrate that parties are increasingly requesting production of electronic documents in the native file format during discovery. In fact, according to the American Bar Association’s 2005 corporate counsel survey, thirty percent of survey respondents reported they agreed to produce electronically stored information in native format. See http://www.digev.e-symposium.com/papers/ karticle5.pdf. This survey was conducted prior to 2006 when the new Federal Rules of Civil Procedure took effect, specifically requiring counsel to address ESI production format in Rule 34(b). But what is native file Order now: http://bit.ly/Io6OzM 128 ELECTRONIC EVIDENCE AND DISCOVERY production? What are the advantages and disadvantages lawyers need to consider when producing files in their native format? What types of arguments should lawyers expect on this issue given current case law and the changes to the Federal Rules of Civil Procedure? Native file review and production can be defined as reviewing and producing electronic files or other ESI in the original format in which they were created by the specific software applications used to create them. For example, if you are required to produce the entire contents of someone’s e-mail box, this would include the e-mail type—e.g., Microsoft Outlook 2003, and may also include various other file types that are stored in the mail box (typically as attachments to the e-mails), e.g., word processing documents, spreadsheets, presentation slides, database files, sound and video clips, etc. When files are reviewed in their raw native format, they are typically copied from a hard drive to CD-ROM, DVD, or an online repository so that they can be reviewed for responsiveness and privilege. The documents appear the same way they did when they were originally created on a computer, complete with metadata, embedded data, and other salient elements. Native documents have not been processed or converted to a standard file type such as TIFF. Native documents are highly susceptible to spoliation because of their fragile state; when opening a native file, a user has all of the features to edit the file at his or her fingertips. Files reviewed in a converted file format, on the other hand, are a derivative of the original file. The native files are converted to a standard file format and the file text and metadata is captured for searching. Converted file review can improve the efficiency of a document review because the review team can search across the entire set of documents, applying redactions, categories, notes, and Bates numbering schemes as needed. Converted file review also ensures the documents and their associated metadata and text are unaltered when opened during document review. With respect to the advantages of the native file format, in some instances native file production may be a cost effective option. If you do not produce files natively, you need to convert them to some type of image format (TIFF is common), or print them out to paper. In either case, there will be some cost involved. It bears noting, however, that money saved by the producing party may become a cost born by the requesting party, if for any reason the requesting party needs to convert some or all of the native files to another format in order to conduct their review (for instance, if they do not have access to the applications used to create the documents, as discussed below). Whether you are the producing or receiving party, other advantages to native file production are that you are able to see the document Order now: http://bit.ly/Io6OzM Practical Legal Implications 129 as it appeared in its original format and that you have access to all file attributes. This means you will be able to access potentially relevant metadata, such as formulas used to create spreadsheets, or track changes information. This is information that often is not apparent on the face of a document, and may not be available depending upon the production format. Parties producing native files will certainly want to review any metadata or embedded data before producing native files, and receiving parties should consider scanning this information for a good behind the scenes history of a document. At this point, it may seem that native file production is the way to go. But let’s consider some of the challenges it presents as well. First, as discussed previously, ESI is easily altered. Even the act of collecting native files, such as burning them to a CD-ROM or DVD, can modify the file metadata without anyone even having opened the files. Opening the files to review their contents will also necessarily alter the files. Consider that in many electronic discovery cases you may be producing hundreds or sometimes thousands of electronic files. It will be very difficult to maintain and verify the authenticity of files that are so easily manipulated, whether that manipulation is intentional or not. Second, and related to the issue of authentication, is the inability to easily index native files. Native files cannot be Bates stamped without altering the file itself. Even if you assign a Bates number at the file level (e.g., by re-naming the file to include a number), you cannot Bates stamp at the page level. Also, be aware that you cannot redact native files without altering the file text and metadata. Third, keep in mind that you will need the native application(s) used to create the files in order to view them. As previously mentioned, this may require some expense and effort to acquire licenses and install software on reviewers’ machines. Finally, another consideration is the ability to search and sort documents for quicker and more efficient access to data about your case. With native file production you may not be able to search and sort through multiple file types with one global search, as is the case when you have converted all files to a common format. Regardless of which production format is ultimately used in a case, the producing party’s counsel should not agree to a native production without being informed about the implications it will have on the effort, time and expense associated with the review and production process. Counsel opposing a native production request must be prepared to assert substantive arguments in support of their position— or face the possibility of a court order compelling compliance with the production request. Order now: http://bit.ly/Io6OzM 130 ELECTRONIC EVIDENCE AND DISCOVERY Hybrid In the course of an e-discovery project, most legal teams today quickly realize that when it comes to review and production format options, one size does not fit all. Different cases require different forms of production depending on the type of documents involved, the number of documents, the specific discovery request, the deadlines for production, the type of litigation or government investigation, and the preferences of the court, opposing party or government agency. On large discovery projects with thousands of documents and widely divergent file types, a hybrid approach is likely necessary. For example, some file formats such as e-mail and word processing documents (which are the bulk of most projects) render themselves nicely to a TIFF image format and the advantages of that review and production format can be realized. Spreadsheets and databases, on the other hand, are complex and dimensional file types that are best reviewed and produced natively. Understand that in any mid-to-large size e-discovery project, a hybrid review and production approach will be needed. REVIEW AND PRODUCTION LEGAL ISSUES Unless claims of an incomplete production arise, courts typically steer clear of instructing parties on their chosen review methods based on the fact that typically the producing party bears all costs associated with the act of physically reviewing the documents. However, when it comes to production format, there is much guidance from the Federal Rules of Civil Procedure and bench. Federal Rule of Civil Procedure 34(b)(1)(C) provides that the requesting party “may specify the form or forms in which electronically stored information is to be produced.” Rule 34(b)(2)(E) provides responses and objections to the production of ESI, which reads in relevant part: Producing the Documents or Electronically Stored Information. Unless otherwise stipulated or ordered by the court, these procedures apply to producing documents or electronically stored information: (i) A party must produce documents as they are kept in the usual course of business or must organize and label them to correspond to the categories in the request; (ii) If a request does not specify a form for producing electronically stored information, a party must produce it in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms; and (iii) A party need not produce the same electronically stored information in more than one form. The first lesson to be learned from Rule 34(b)(2)(E) is that production disputes can be largely avoided by having the requesting party Order now: http://bit.ly/Io6OzM Practical Legal Implications 131 specify in their request the desired form of production, so that any production format disputes can be worked out prior to forcing the producing party to undergo the time and expense of production and review. Production format is a topic that should be brought up at an early Rule 26(f) “meet and confer” conference. In a recent case, Autotech Techs. Ltd. P’ship, the court denied a request for native production made after the documents at issue had previously been produced in both PDF and in paper format. Finding no previous specific production format request, the court determined the plaintiff had the option to produce the document in the form in a reasonably usable form. Additionally, the court stated the defendant “was the master of its production requests [and] it must be satisfied with what it asked for[.]” Autotech Techs. Ltd. P’ship v. Automationdirect.com, Inc., 2008 WL 902957 (N.D. Ill. April 2, 2008). However, in the event that production format is not determined in advance, Rule 34(b)(2)(E) provides that production should be either in “the form or forms in which it is ordinarily maintained” or in a “reasonable useable form or forms.” Although the “ordinarily maintained” language of Rule 34(b)(2)(E) smacks of a requirement of native file production, it is important to note that it is just one option. Rule 34(b)(2)(E) also gives the responding party the alternate default option of producing ESI in a “reasonably usable” format. Thus, there is a solid argument that Rule 34 intends to allow production in either the native or TIFF format so long as any corresponding and relevant text and metadata are also produced. Production in the “ordinarily maintained” form (assuming that is synonymous with the native format of ESI) generally has the connotation of not requiring any conversion and thus less processing costs prior to production. However, this rarely bears out in reality, and production in TIFF format has several advantages that should be taken into account when choosing or arguing for a production format with opposing counsel. Consider that it is possible to produce partial text and metadata in order to protect privileged and/or non-relevant information in TIFF format. A producing party could produce a redacted image or a database with only those electronic documents and metadata fields that the party is required to produce. Largely in response to Rule 34(b), courts are ordering native file format productions more than ever before—often using the “ordinary course of business” requirement in Rule 34 as a basis for their analysis. For example, in In re VeriSign, a magistrate judge found a TIFF image document production was insufficient and ordered the defendants to produce the documents in a searchable electronic format—such as a native format. Objecting to the order, the defendants argued production in native format rather than in TIFF format was contrary to Order now: http://bit.ly/Io6OzM 132 ELECTRONIC EVIDENCE AND DISCOVERY Rule 34. The district court judge rejected this argument and declared the Rule “required [the producing party] to produce responsive electronic documents in their native .pst format if that is how they were stored in [the producing party’s] usual course of business.” In re VeriSign, Inc. Sec. Litig., 2004 WL 2445243 (N.D. Cal. Mar. 10, 2004); see also In re Pemstar, Inc. Secs. Litig., Civ. No. 02-1821 (DFW/SRN) (D. Minn. Apr. 23, 2004). When determining a production format, look at the case law in the jurisdiction where your case is being brought to see whether those particular courts have required native file production; by no means have all federal courts or state courts taken to demanding native file production. The determining factor in many jurisdictions, rather, is whether the produced documents contain metadata and extracted text, often finding that metadata and extracted text are necessary to constitute a “reasonably usable form” under Rule 34(b). There are many cases that illustrate the importance of metadata in production format. For example, in Hagenbuch the court granted a motion to compel native production noting that the TIFF production lacked metadata, e-mail attachments, and recipients, and was not produced in the “usual course of business.” Hagenbuch v. 3B6 Sistemi Elettronici Industriali S.R.L., 2006 WL 665005 (N.D. Ill. Mar. 8, 2006). Interestingly, in In re Priceline, the court did not require an outright native file production. Instead, the court ordered the producing party to produce responsive documents in TIFF or PDF format along with searchable metadata. However, the court did order the producing party to maintain the original data in native format during the litigation and provided that it would consider future requests for native file production of specific files if the requesting party demonstrated a need to “view or comprehend” the information contained in the nonnative production. In re Priceline.com Inc. Sec. Litig., 233 F.R.D. 88 (D. Conn. 2005). The bottom line is that any non-native production should be accompanied by metadata information; otherwise, the producing party runs a severe risk of running afoul of Rule 34(b)’s requirement that production be in a “reasonably usable” format. Courts have been particularly intolerant of conduct by the producing party that appears to be an intentional effort to deprive the requesting party of metadata. For example, in Williams v. Sprint, the producing party produced spreadsheets after using software to “scrub” (i.e., remove) metadata and locking cells in the spreadsheets, thus preventing access to formulas. The court ordered Sprint to produce the metadata as well as “unlocked” versions of the spreadsheets, holding that an order directing production of electronic spreadsheets as they are kept in the ordinary course of business requires the producing party to Order now: http://bit.ly/Io6OzM Practical Legal Implications 133 turn over electronic documents with metadata intact. Williams v. Sprint/ United Mgmt Co., 230 F.R.D. 640 (D. Kan. 2005). An increasing number of cases have sternly rejected the production of ESI in paper format, at least when the metadata does not accompany the printed pages as described above, as violating Rule 34(b). For example, in In re Payment Card Interchange Fee, the court chastised the producing party conduct in printing ESI and then scanning the pages to TIFF images and created a searchable text file through the use of Optical Character Recognition (“OCR”) software. The court noted, “[The producing party] have rather laboriously stripped their textsearchable electronic documents of metadata that would not appear in printed form, and then converted them back into text-searchable electronic documents without that subset of metadata.” In re Payment Card Interchange Fee & Merchant Discount Antitrust Litig., 2007 WL 121426 (E.D.N.Y. Jan. 12, 2007). Several recent cases have suggested that a producing party may be forced to comply with a native production request if the producing party fails to offer a substantive basis for objecting to the request. In Treppel, for instance, the requesting party’s counsel sent the producing party’s counsel a proposed e-discovery preservation order that, among other things, declared accessible data would be produced in native format. The producing party’s counsel declined to agree with the preservation order, arguing that the proposed order was onerous. Furthermore, the producing party argued it was inappropriate to consider production format in the absence of specific production requests. The court, however, determined native production was appropriate as the defendant failed to offer a substantive basis for its objection to native format. Treppel v. Biovail Corp., 2006 WL 278170 (S.D.N.Y. Feb. 6, 2006) Similarly, in a patent infringement case, the requesting party asserted native production was mandated by a local patent rule requiring a party defending a patent infringement claim to make available “[s]ource code, specifications, schematics, flow charts, artwork, formulas, or other documentation . . . .” The court ordered native production after finding that the producing party failed to offer relevant reasons why the documents should not be produced in their native format. Nova Measuring Instruments Ltd. v. Nanometrics, Inc., 2006 WL 524708 (N.D. Cal. Mar. 6, 2006). As illustrated by Treppel and Nova, courts are increasingly placing the burden on the producing party to show why it should not produce documents in their native format. Accordingly, merely objecting to a native file production request without offering concrete reasons for the objection is insufficient. Rather, you must be prepared to articulate the specific technical limitations associated with native file production and Order now: http://bit.ly/Io6OzM 134 ELECTRONIC EVIDENCE AND DISCOVERY not found with a converted file format production. When crafting an objection to a native file production request, counsel should consider the following substantive arguments: • Alterability and Spoliation. Once files are converted to a TIFF format, they cannot be altered. Native files, however, can be changed very easily—either intentionally or unintentionally. For example, simply opening a document can change the metadata of a native file. Ensuring a natively produced document has not been altered requires the use of a mathematical hashing algorithm. • Bates Numbering. Native file productions make it impossible to Bates number documents, precluding parties from having an effective audit trail of the documents that were produced. In addition to being time-consuming, an attempt to add Bates numbers to the native document set modifies the document from its original form. In contrast, a TIFF image production allows for Bates numbering and accurate tracking of documents produced. • Viewing Platform. Raw native file review requires the review team to have each of the original software applications for every document in the review set. Thus, in order to view a Microsoft Word file, a Microsoft Word license needs to be purchased for each member of the review team. On the other hand, a TIFF review or rendered native review does not require any native software applications, resulting in decreased costs as the producing party does not need to have all applications loaded on their review systems. • Creating Redactions. A TIFF image review and production allows parties to redact confidential or privileged information. When documents are produced natively, however, there is no effective way to place a redaction on the native file. Thus, a native file production can undermine and compromise a party’s efforts to protect proprietary or privileged information. • Searching Text and Metadata. Because all files have been converted to the same format, the ability to search across all documents and metadata in a TIFF image review and production set can easily be accomplished. Thus, whether a document is a Lotus Notes, Microsoft Word, or Microsoft Outlook file format, it can be searched as easily as any other file, in one comprehensive search query. In a raw native file document set, on the other hand, this task is very difficult and sometimes next to impossible because very few applications exist for searching across thousands or millions of native files in different formats from multiple Order now: http://bit.ly/Io6OzM Practical Legal Implications 135 computer users. Counsel should also be aware that producing TIFF images with corresponding searchable text and metadata has been found acceptable by courts nationwide. CONCLUSION It is important to remember that the fundamental basics of document production and review remain unchanged with the dawn of e-discovery. Litigation teams must still analyze the document set and determine which ones are responsive to the document requests and which ones are privileged or otherwise protected. Yet, today a majority of this work is not taking place anymore in a dusty warehouse with freight trucks delivering boxes every thirty minutes. Instead, review teams are provided a computer and Internet connection to facilitate their work. As you think about review and production options, remember that no method is the silver bullet. You must realize the limitations associated with each of the different review and production formats and choose the option or options that work best for your case. Many times this means using different formats concurrently for a busy docket of cases. Most importantly, gain consensus with your opponent early on with regard to production format, as it will guide decisions about various options for collecting, processing, and reviewing ESI. 3.10 Cost Allocation The price tag connected to an electronic discovery project can be significant, depending on the circumstances of the case. Not surprisingly, some of the most intense arguments ensue over which party should bear the costs associated with e-discovery. As Judge Scheindlin noted, “The more information there is to discover, the more expensive it is to discover all the relevant information until, in the end, ‘discovery is not just about uncovering the truth, but also about how much of the truth the parties can afford to disinter.’” Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003) (citing Rowe Entm’t, Inc. v. William Morris Agency, Inc., 205 F.R.D. 421, 423 (S.D.N.Y. 2002). This section will look at the various common law approaches the case law has taken with regard to which party bears the costs of discovery in litigation—the traditional rule, the cost-shifting approach, and the balancing test approach. All courts have the authority to require a party requesting discovery to pay the costs that will be incurred by the responding party; it is in the court’s discretion whether to exercise this authority, and under what circumstances. Thankfully, guidelines have Order now: http://bit.ly/Io6OzM 136 ELECTRONIC EVIDENCE AND DISCOVERY emerged from the case law to guide courts in this endeavor and to provide counsel with arguments and reasonable expectations. THE TRADITIONAL RULE The traditional rule is that each side bears its own costs during the discovery process. See Jay E. Grenig and William C. Gleisner, III, eDiscovery & Digital Evidence Database § 9.2 (Sept. 2007). The traditional rule is represented in Federal Rule of Civil Procedure 34(a), which reads in relevant part: A party may serve on any other party a request within the scope of Rule 26(b): (1) to produce . . . the following items in the responding party’s possession, custody, or control: (A) any designated documents or electronically stored information . . . stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form; or (B) any designated tangible things . . . . Fed.R.Civ.P. 34(a) (2008). Furthermore, FRCP 34(b)(2)(E) reads in relevant part: Unless otherwise stipulated or ordered by the court, these procedures apply to producing documents or electronically stored information: (i) A party must produce documents as they are kept in the usual course of business or must organize and label them to correspond to the categories in the request . . . . Fed.R.Civ.P.34(b)(2)(E) (2008). The language in Rule 34 does not contemplate cost-shifting; rather, the language supports the common law traditional cost allocation approach that places the costs associated with reviewing documents for responsiveness or privilege, organizing the documents, printing the documents, and then shipping the documents for production onto the producing party. However, these rules—specifically Rule 34(a)(1)—limit the universe of data that must be generated by the producing party to things that are in its “possession, custody, or control.” In other words, producing parties cannot be forced to bear the costs of producing anything outside their “possession.” Based on this limitation, many litigators have attempted to argue that electronic documents, files, and e-mails that have been deleted, archived, or are otherwise burdensome to produce are not within their “possession” and should not have to be produced. Courts that follow the traditional rule have been largely unsympathetic to arguments that a producing party should not have to bear the Order now: http://bit.ly/Io6OzM Practical Legal Implications 137 costs associated with production when the fact that responsive material is deleted, archived, or otherwise burdensome to produce is due to actions or inactions taken by the producing party. As a general rule, if a party chooses to maintain records in a relatively inaccessible format, that party must bear the financial consequences of producing any potentially relevant data contained therein. There are a myriad of cases that have determined cost-shifting is inappropriate in e-discovery cases when the cost is due to an inadequate record-keeping scheme, including the following: • “A court will not shift the burden of discovery onto the discovering party where the costliness of the discovery procedure involved is entirely a product of the defendant's record-keeping scheme over which the plaintiff has no control.” Delozier v. First Nat’l Bank of Gatlinburg, 109 F.R.D. 161 (E.D. Tenn. 1986). • “[A] party cannot avoid discovery when its own recordkeeping system makes discovery burdensome. If a party chooses to store information in a manner that tends to conceal rather than reveal, that party bears the burden of putting the information in a format useable by others.” Toledo Fair Hous. Ctr. v. Nationwide Mut. Ins. Co., 703 N.E.2d 340, 354 (Ohio C.P. 1996). • “[The court] cannot relieve [the producing party] of its duty to produce these documents merely because [the producing party] has chosen a means to preserve the evidence which makes ultimate production of relevant documents expensive.” AAB Joint Venture v. United States, 2007 WL 646157 (Fed. Cl. Feb. 28, 2007) (stating it would later consider cost-shifting after a data sampling of e-mails produced). THE COST-SHIFTING APPROACH Although the Federal Rules of Civil Procedure do not explicitly reference the concept of cost-shifting, courts may require a party requesting discovery to pay some of the costs that will be incurred by the responding party. (It is important to note that some states have taken affirmative steps to address the issue of cost allocation, and you should research the laws of the jurisdiction you are in before beginning a discovery matter that may involve cost-shifting. See e.g. Tx. R. Rcp. 196.4 (2008)). Rationale behind the Cost-Shifting Approach Courts using a cost-shifting method aim to fairly and economically allocate electronic discovery costs between the parties. The foundational rationale behind the cost-shifting approach was first laid forth by the Supreme Court of the United States in Oppenheimer Fund when Order now: http://bit.ly/Io6OzM 138 ELECTRONIC EVIDENCE AND DISCOVERY it stated, “We do not think a defendant should be penalized for not maintaining his records in the form most convenient to some potential future litigants whose identity and perceived needs could not have been anticipated.” In this case, the Court focused on the fact that the expense of creating computer programs that would locate the desired data was the same for both parties, and ultimately ordered that the party seeking the information must bear the cost of production. Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340 (1982). A second rationale has emerged for the cost-shifting approach which focuses on the utility of the evidence and the effort/expense involved in obtaining it—a burden versus benefit analysis. For example, in Zonaras, the court held that because the admissibility of the electronic information in question was still undecided, the requesting party should pay half of the production costs incurred by the producing party. Zonaras v. Gen. Motors Corp., 1996 WL 1671236 (S.D. Ohio Oct. 17, 1996). This proportionality test provides the court with the ability to shift costs when it deems the economic burden on the producing party to be too great relative to the potential probative value derived from it. Federal Rule of Civil Procedure 26(b)(2)(B) Federal Rule of Civil Procedure 26(b)(2)(B) provides the opportunity for courts to shift e-discovery costs to protect a party from “undue burden or expense.” Rule 26(b)(2)(B) reads: A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for the discovery. Fed. R. Civ. P. 26(b)(2)(B) (2008). Rule 26(b)(2)(B) is packed with important, relevant considerations for cost-shifting that need to be examined more closely. First, the statement that the “court may specify conditions for the discovery” implicitly includes the condition of who pays for discovery. Second, the rule clearly places the burden on the producing party to show why the traditional rule should not apply in the language, “the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost . . . .” Third, the language that, “the court may nonetheless order discovery . . . if the requesting Order now: http://bit.ly/Io6OzM Practical Legal Implications 139 party shows good cause” ultimately leaves the issue of cost allocation to the court’s discretion in light of the specific facts surrounding the case before it. Finally, the language “not reasonably accessible because of undue burden or cost” recognizes the two-tiers of discovery set forth in Zubulake. Under Zubulake, electronic data that is deemed accessible is automatically producible (as discussed in section 3.5) and also should not be considered for cost-shifting. Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003). The Zubulake decision, along with other recent decisions, has set forth a more formal cost-shifting approach than is embodied by Rule 26(b)(2)(B), which provides merely a skeleton framework to allow courts to develop the case law as appropriate. THE BALANCING TEST APPROACH The more nuanced cost-shifting approach that recent decisions have set forth is a balancing test that mandates consideration of several factors when determining the appropriate cost allocation of electronic data. The factors that attorneys need to know come out of an eightfactor test set forth in Rowe and a seven-factor test modifying Rowe set forth in two Zubulake decisions. See Rowe Entm’t, Inc. v. William Morris Agency, 205 F.R.D. 421 (S.D.N.Y. 2002); Zubulake v. UBS Warburg, 216 F.R.D. 280 (S.D.N.Y. 2003); Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003). The court in Rowe recognized that the traditional rule that the producing party bears the costs of discovery production needed to be reevaluated in light to the unique characteristics of electronically stored information: [E]ven if this principle is unassailable in the context of paper records, it does not translate well into the realm of electronic data. The underlying assumption is that the party retaining information does so because that information is useful to it, as demonstrated by the fact that it is willing to bear the costs of retention. That party may therefore be expected to locate specific data, whether for its own needs or in response to a discovery request. With electronic media, however, the syllogism breaks down because the costs of storage are virtually nil. Information is retained not because it is expected to be used, but because there is no compelling reason to discard it. And, even if data is retained for limited purposes, it is not necessarily amenable to discovery. The Rowe court held that consideration of eight factors was relevant to determine whether discovery costs should be shifted to the party requesting the information. In the year after publication, Rowe unquestionably became the “gold standard” for courts resolving electronic discovery cost allocation disputes. See Murphy Oil USA, Inc. v. Order now: http://bit.ly/Io6OzM 140 ELECTRONIC EVIDENCE AND DISCOVERY Fluor Daniel, Inc., 2002 WL 246439 (E.D. La. Feb. 19, 2002); In re Livent, Inc. Noteholders Sec. Litig., 2003 WL 23254 (S.D.N.Y. Jan. 2, 2003). It was therefore reasonable that the parties in an employment discrimination case (Zubulake) agreed that the eight-factor Rowe test be used to determine whether cost-shifting for their electronic discovery was appropriate. Judge Scheindlin, who presided over the Zubulake case, noted an imbalance in the decisions that applied the Rowe test when she stated: “[O]f the handful of reported opinions that apply Rowe or some modification thereof, all of them have ordered the cost of discovery to be shifted to the requesting party. In order to maintain the presumption that the responding party pays, the cost-shifting analysis must be neutral; close calls should be resolved in favor of the presumption.” Seeing an opportunity to redress perceptions of imbalance in the decisions that followed Rowe, Judge Scheindlin issued an opinion modifying the Rowe test. Judge Scheindlin eliminated one of the Rowe factors, combined two Rowe factors, and added a new factor to form the following seven factor test: 1. 2. 3. 4. 5. 6. 7. The extent to which the request is specifically tailored to discover relevant information; The availability of such information from other sources; The total cost of production compared to the amount in controversy; The total cost of production compared to the resources available to each party; The relative ability of each party to control costs and its incentive to do so; The importance of the issue at stake in the litigation; and The relative benefits to the parties of obtaining the information. Judge Scheindlin furthermore stated that each of the seven factors should not be treated equally as the courts applying the Rowe test had generally been doing: “Whenever a court applies a multi-factor test, there is a temptation to treat the factors as a check-list, resolving the issue in favor of whichever column has the most checks. But ‘we do not just add up the factors.’” Instead, the Zubulake factors are weighted roughly in descending order of importance, with the first two factors being the most important. Since Zubulake was decided in 2003, it has largely replaced Rowe as the “gold standard” in cost-allocation analyses across the country. See Haka v. Lincoln County, 2007 U.S. Dist. LEXIS 64480 (W.D. Wis. Aug. 29, 2007); IO Group, Inc. v. Veoh Networks, Inc., 2007 WL 1113800 (N.D. Cal. Apr. 13, 2007); Quinby v. WestLB, 2006 WL 2597900 (S.D.N.Y. Sept. 5, 2006); Hagemeyer North Am., Inc. v. Gateway Data Sciences Corp., 222 F.R.D. 594 (E.D. Wis. 2004); Wiginton v. CB Order now: http://bit.ly/Io6OzM Practical Legal Implications 141 Richard Ellis, Inc., 229 F.R.D. 568 (N.D. Ill. 2004); Multitechnology Servs. v. Verizon Sw., 2004 WL 1553480 (N.D. Tex. July 12, 2004); OpenTV v. Libertate Techns, 219 F.R.D. 474 (N.D.C.A. 2003); Xpedior Credit Trust v. Credit Suisse First Boston, 2003 WL 22283835 (S.D.N.Y. Oct. 2, 2003). NON-PARTY PRODUCTION AND COST SHIFTING Although the traditional rule that producing parties pay for the cost of discovery conventionally also applies to production from non-parties, attorneys need to be aware that courts are generally more lenient with non-parties than parties when it comes to cost-shifting. Federal Rule of Civil Procedure 45 was amended in 2006 to explicitly allow parties to request ESI from non-parties via a subpoena, as had been the common law practice. However, the Rules recognized the unique role of nonparties in litigation and included language meant to protect non-parties from undue burden and expense. Rule 46(c)(3)(A) allows a court to quash or modify a subpoena that “subjects a person to undue burden” upon timely motion. Moreover, Rule 45(c)(1) provides in relevant part: A party or attorney responsible for issuing and serving a subpoena must take reasonable steps to avoid imposing undue burden or expense on a person subject to the subpoena. The issuing court must enforce this duty and impose an appropriate sanction—which may include lost earnings and reasonable attorney’s fees—on a party or attorney who fails to comply. Fed. R. Civ. P. 45(c)(1) (2008). The rules and common law tendency to treat non-parties that are subpoenaed to produce discovery more leniently make common sense. Because non-parties generally have nothing at stake in litigation and nothing to benefit from the litigation, it does not make a lot of sense to force them to bear the expense of discovery. As the court in Guy Chemical Company recently stated: [N]ot only is it fundamentally unfair for non-parties to bear the significant litigations costs of others, but also if this Court were to allow litigating parties like [the defendant] to impose such a burden on non-parties, then the likelihood of cooperation by non-parties in the future would be placed in jeopardy. Guy Chem. Co. v. Romaco AG, 2007 WL 1521468 (N.D. Ind. May 22, 2007). The most important thing for attorneys to take away from this section is the knowledge that non-parties are treated differently than parties to the litigation, and sanctions may be imposed unless parties take extra efforts to protect non-parties from undue burden or expense in responding to a discovery production request. Therefore, counsel should define the scope of ESI as narrowly as possible when requesting Order now: http://bit.ly/Io6OzM 142 ELECTRONIC EVIDENCE AND DISCOVERY production from non-parties, or be prepared to pay the costs associated with that production. CONCLUSION Why has the advent of electronic evidence caused judges around the country to take a closer look at the traditional way in which discovery costs are allocated? Perhaps it is the perceived high cost of conducting electronic discovery. In fact, however, collecting sorting, and producing electronic documents may be cheaper and easier to address than its paper counterparts in many cases. As Judge Scheindlin stated, “Electronic evidence is frequently cheaper and easier to produce than paper evidence because it can be searched automatically, key words can be run for privilege checks, and the production can be made in electronic form obviating the need for mass photocopying.” Zubulake v. UBS Warburg, LLC, 217 F.R.D. 309, 318 (S.D.N.Y. 2003). Another possibility, perhaps, is the relative unfamiliarity most courts have with electronic evidence. Or perhaps it is even the fundamentally flawed view that e-discovery is somehow a luxury that the propounding party should not enjoy without some responsibility for costs. Regardless of the reason, the boom of electronically stored information in today’s world and the increasing reliance on it today in civil litigation has impacted the cost-shifting analysis, and today’s practitioner must be prepared to make and respond to cost-shifting arguments in e-discovery cases. 3.11 Trial Issues The practice of law is ultimately about getting results for your client. Clients hire lawyers to represent them because they have an objective they want to achieve—winning! While clients do care about the discovery and litigation process that gets you to the results (i.e., costs associated with discovery, the impact of litigation on business operations, etc.), clients at the end of the day want results that justify the expenses associated with litigation. The end of the litigation journey is trial (if the case does not previously settle through negotiations or alternative dispute resolution). The following sections discuss important electronic evidence admissibility and trial technology considerations trial attorneys should be focused on in the digital age. ADMISSIBILITY OF EVIDENCE After what is potentially a long discovery period, you are finally at trial. You have produced your discovery to your opponent, and visa versa. Order now: http://bit.ly/Io6OzM Practical Legal Implications 143 However, the production of documents, both electronic and otherwise, does not necessarily mean they will be admitted into evidence. As recognized by Magistrate Judge Paul W. Grimm, the admissibility of electronically stored information is determined by “a collection of evidence rules that present themselves like a series of hurdles to be cleared by the proponent of the evidence. Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534 (D. Md. 2007). The four primary hurdles that must be cleared are relevancy, authentication, the best evidence rule, and hearsay. Please refer to section 3.3 of this chapter on discoverability of ESI for a discussion of the relevancy hurdle; the remaining hurdles are discussed below. Authentication All evidence must be authenticated before it is considered by the jury (or judge in the case of a bench trial). Federal Rule of Evidence 901(a) provides: “The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.” Fed. R. Evid. 901(a) (2008). In the context of ESI, authentication requires establishing evidence’s integrity in addition to its identity. Integrity refers to soundness of evidence; for instance, that a document has not been altered or corrupted. Electronic document integrity is a huge concern given how easily ESI can be altered, both purposefully and inadvertently. The authentication concern—as it relates to forensics and e-discovery— is that the evidence presented at trial is the same as the evidence originally collected. To authenticate or lay a foundation for the identity of a document, counsel must engage in the same protocols used for laying foundation of a paper document. This includes testimony about who created the document, when it was created, who received the document, where it was located, how it pertains to the relevant legal issues in the case, etc. To authenticate or lay a foundation for the integrity of a document, counsel must show that the electronic documents presented for admission as evidence at trial have not been altered. Authentication of an electronic document’s integrity can be challenging since electronic data can be easily altered, often unintentionally and often without leaving a trace. Thus, the danger is that the electronic document may appear to be true and accurate, but actually has been altered. The proponent of evidence should be prepared to answer questions from their opponent regarding steps taken to ensure that the electronic document at issue was not falsified, such as questions regarding the document’s method of collection, storage, processing, review, and whether there is a documented chain of Order now: http://bit.ly/Io6OzM 144 ELECTRONIC EVIDENCE AND DISCOVERY custody for the electronic document. Thankfully, following the computer forensics and electronic discovery best practices throughout this text will go a long way to ensure successful authentication at trial. The single best thing you can do to ensure no integrity authentication issues arise is to make a forensic copy of the original medium at collection using forensically sound imaging techniques and do all processing to the forensic copy. That way, the original medium is always available to be compared to the forensic copy to determine whether the copy has indeed been altered from the original by comparing their hash values. The second best measure you can take to ensure no integrity authentication issues arise is to document chain of custody of the evidence from collection to presentation at trial using a detailed chain of custody log. Chapter five of this text contains an in-depth discussion of computer forensics best practices that should be utilized to ensure authentication. In most cases, the authentication hurdles have not stopped courts from admitting electronically stored information as evidence. As the court in Lorraine stated, “A party seeking to admit an exhibit need only make a prima facie showing that it is what he or she claims it to be. Id. at § 901.02[3]. This is not a particularly high barrier to overcome.” The court, however, went on to say, “Ironically, however, counsel often fail to meet even this minimal showing when attempting to introduce ESI, which underscores the need to pay careful attention to this requirement. Indeed, the inability to get evidence admitted because of a failure to authenticate it almost always is a self-inflicted injury which can be avoided by thoughtful advance preparation.” The bottom line is that you do not want to be the attorney who cannot admit a smoking gun because you failed to follow computer forensics and electronic discovery best practices. As the court in Lorraine lamented, “It makes little sense to go to all the bother and expense to get electronic information only to have it excluded from evidence . . . .” The Best Evidence Rule The Best Evidence Rule proves an additional hurdle to the admissibility of evidence and bears mentioning at this point. Federal Rule of Evidence 1002 provides: “To prove the content of a writing, recording, or photograph, the original writing, recording, or photograph is required, except as otherwise provided in these rules or by Act of Congress.” At first glance, this rule appears to require the production of original electronic data. Thankfully, however, this rule does not require counsel to bring the original custodian’s computer, monitor, and other equipment into the courtroom to display the document in question. Rather, Order now: http://bit.ly/Io6OzM Practical Legal Implications 145 Federal Rule of Evidence 1001(3) specifically states, “If data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an ‘original.’” Consequently, hard copy printouts of documents, e-mail and other digital data stored electronically qualify as originals under the Federal Rules of Evidence even if not produced on their original storage mediums. In addition, Federal Rule of Evidence 1006 provides that voluminous writings and recordings may be presented in a chart, summary, or calculation. This rule helps computerized data contained in large databases overcome the limitations of the Best Evidence Rule. Finally, note that the Best Evidence Rule only applies when the contents of a writing or electronic evidence are at issue. For these reasons, it is not surprising that the Best Evidence Rule has diminished in importance in modern litigation, and is something that litigators seeking admission of electronically stored information during trial need not focus on. Hearsay The final hurdle litigators frequently encounter when attempting to admit electronically stored information as evidence into trial is hearsay objections. There is an important distinction between computergenerated and computer-stored electronic evidence. The Federal Rules of Evidence specify that a hearsay statement can only be made by a person. Rule 801(c) provides: “‘Hearsay’ is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted.” Fed. R. Evid. 801(c) (2008). Rule 801(a) provides the following clarification: “A ‘statement’ is (1) an oral or written assertion or (2) nonverbal conduct of a person, if it is intended by the person as an assertion.” In other words, something that is not communicated by a person cannot be an assertion and thus cannot be hearsay. Hearsay is not an issue with regard to evidence gathered from parrots, radar guns, or computers, because these things cannot make statements. Therefore, if a computer automatically generates records (such as a toll both recording the number of cars that drive through it), the computer-generated records cannot be hearsay. On the other hand, electronic evidence that takes the form of computer-stored records can be hearsay since there was a human author who made the assertion that is being recorded. There is no special hearsay exception for electronically stored information. However, an exception commonly used for e-mail and other electronically stored records is the business records exception memorialized under Federal Rule of Evidence 803(6). Under this exception, exactly the same as with paper evidence, the electronic record must Order now: http://bit.ly/Io6OzM 146 ELECTRONIC EVIDENCE AND DISCOVERY have been made in the course of a regularly conducted business activity by a person with knowledge of the information contained in it, at or near the time the information was obtained, to be admissible as a hearsay exception. Other exceptions to the hearsay rule also apply to electronically stored information, the same as they generally apply to all evidence. Other hearsay exceptions frequently used when admitting electronic evidence include: admission of party opponent under Federal Rule of Evidence 801(d), present sense impression under Federal Rule of Evidence 803(1), and excited utterances under Federal Rule of Evidence 803(2). TRIAL STRATEGY AND TECHNOLOGY The ultimate goal for any legal team, again, is to get results for your clients that justify the expense of the discovery and litigation processes. Trial is the last few miles in your litigation marathon. At this time, it is not uncommon for parties to feel fatigued from the lengthy journey they have already completed (i.e., discovery, preparation of litigation strategies, negotiation attempts). Do not let frustration with or fatigue from the process cause you to fail to put forth your best effort at trial. It makes no more sense to come to trial after going through the discovery and litigation process and not undergo best trial practices than it makes to travel from the continental United States to Australia on vacation and then spend all your time in an inland Australian hotel room rather than taking the effort to drive a few more miles to a beachside resort. While trial may be the last leg of your litigation journey, it is a crucial stretch of your journey upon which success is ultimately achieved or lost. Therefore, effective litigators should consider utilizing consultants with cutting-edge technology and juror decision-making expertise. Jury Research A major hurdle to readying a case for trial is translating all of the relevant evidence and information into an understandable and convincing story that jurors can relate to. This is even more so the case when volumes of e-mail or other technical electronic documentation are involved in the matter. When the preparation for a single case sometimes lasts for years, a trial team becomes expert in the litigation’s minutiae along the way. There is a real risk that a trial team may miss seeing the forest for the trees when months of preparation must be whittled into just weeks, or even days, in the courtroom. Jury research is the best was to ensure that you are including the right information in your argument, and in the most coherent manner Order now: http://bit.ly/Io6OzM Practical Legal Implications 147 possible. Jury research is the process of presenting your case, the case’s issues, or aspects of the case before trial arrives to a group of people matched to the demographics of the case’s venue and your jury pool— commonly known as a mock trial or focus group research. There is a difference between practicing your statements in front of paralegals, or friends and family, and getting feedback from a carefully selected mixture of people—the difference is that the likely jury’s reaction to your case matters much than the reaction of your friends and co-workers. Jury research can be as simple or as elaborate as needed. It can be useful as early as the discovery period of a case or as late in the game as a week before trial. A jury consultant specifically trained in the social sciences is able to determine the most advantageous research protocol based on the facts of the case, the concerns of the trial team, and the specific hurdles faced in a particular venue. During an actual research exercise, a combination of technology and human expertise is required to cull the necessary information from the mock jurors. Oftentimes, jurors’ reactions to the case are recorded with handheld electronic dials. These dials, commonly referred to as real-time technology, are also used in market research and during political debates to measure reactions to the candidate as the candidate is speaking. In exactly the same manner, these dials are used to gauge juror reaction to specific case issues and trial presentation techniques, allowing jury consultant and trial teams to immediately receive feedback. Jurors may turn their dials during an attorney’s presentation in accordance with how convincing they find the information to be at a given moment. After the presentation of a specific issue, the mock jurors answer verdict questions as well as questions regarding their emotions relating to the parties and their opinions on various aspects of the case. All of these answers can be seen on a screen the moment the jurors enter them, which means the trial team and their consultants can see how the mock jurors’ opinions change as they hear information from each side. Jury consultants later analyze the data from the mock jurors’ answers and reactions more thoroughly to formulate specific case strategy recommendations. Jury research can be tailored to specific concerns for trial such as witness evaluation and juror profiling. For example, mock jurors’ opinions of witness depositions can be a valuable platform for witness preparation. Additionally, if an acceptably substantial number of mock jurors attend the research exercise, jury consultants may be able to construct a statistically significant profile of favorable and adverse jurors for use in jury selection, which is discussed in more depth below. It is the combination of hard data with observations of the jurors during their deliberations, focus sessions, and perhaps interactive Order now: http://bit.ly/Io6OzM 148 ELECTRONIC EVIDENCE AND DISCOVERY question-and-answer sessions with the attorneys that lays the groundwork for jury consultants to discern how potential jurors in the actual jury pool are likely to make their decisions about the case. Also, this same information provides valuable insights into what points must be emphasized, elaborated upon, or explained more thoroughly in order for jurors to be persuaded by your arguments. In conclusion, the forest becomes clearer once you’ve seen it through the eyes of mock jurors, not clouded by an undue focus on a particular tree or the wrong group of trees. Jury research eliminates the risk of debuting what may be a confusing or haphazard case in front of the actual jury when it matters. Jury Selection The outcome of your litigation comes down, ultimately, to how a handful of jurors selected from the community perceive the merits of your case. The law has developed a process known as voir dire, originating from the Latin oath to tell the truth—verum dic re, to allow parties to reject unsuitable potential jurors based on the potential jurors’ backgrounds and potential biases. The voir dire process works by allowing each party and their counsel to strike potential jurors either by mounting a challenge for cause or by exercising a finite number of peremptory challenges that allow a potential juror to be excluded from the jury without a specific reason that would be needed to satisfy a challenge for cause. The importance of the voir dire process cannot be stressed enough. Allowing a juror with pre-existing bias against your case or, worse yet, a “loose cannon” juror to slip through the jury selection process into the jury box could devastate an otherwise winning case. The art of jury selection is not one that comes naturally. Effective jury selection techniques take years to practice and hone. No matter how seasoned one’s intuition, empirical data and jury selection research remain the most reliable predictors of potential jurors’ predisposition. Because social research techniques are not skills learned in law school, but rather skills exercised by social scientists, partnering with specially trained social scientists, or jury consultants, can significantly increase your likelihood of successful jury selection and thus a successful outcome at trial. The goals of effective voir dire are twofold—to weed out potential jurors who are biased against your case and to create rapport and trust with future jurors. Jury consultants can partner with counsel to assist in all aspects of the jury selection process to accomplish these dual goals. Jury consultants can assist in jury selection through the development of supplemental written juror questionnaires tailored voir dire questions specific to your case, as well as evaluating the Order now: http://bit.ly/Io6OzM Practical Legal Implications 149 potential jurors’ responses in court. Your chosen jury consultant can help you make selection decisions based on the makeup of the jury holistically—not just individual jurors—by anticipating how the group might work together and who the group leaders will likely be. Attorneys should also consider utilizing real-time jury intelligence during voir dire. Real-time jury intelligence is a powerful tool in a jury consultant’s toolbox that utilizes cutting-edge technologies to provide timely and actionable background intelligence on prospective jurors. This intelligence can be delivered either out-of-court or electronically while the trial team is conducting voir dire. This intelligence utilizes the expertise of professional investigators who can provide your legal team with important information about prospective jurors, such as: criminal, civil litigation, and bankruptcy history; political and religious affiliations; current and previous occupations; education; family history; property and residency history; media appearances; Internet profiles; and other customized information. The benefit of utilizing real-time jury intelligence comes from being able to research information that arises in initial voir dire questioning immediately and often receive the results of that research while it actually matters. Attorneys with or without the aid of a jury consultant must plan ahead for voir dire or pay later. For example, it is a good idea for attorneys to prepare a “top 10” list of questions to ask jurors. Preparation of this relatively short list allows attorneys to remember important questions without relying on notes, thus making the attorneys appear polished and confident to future jurors. Lastly, all attorneys conducting voir dire should adhere to simple guidelines to build rapport with future jurors. For example, take the time to introduce yourself and your client. This introduction personalizes both you and your client and provides a great opportunity to make a positive first impression. Also, do not revert to a cross-examination style of questioning during voir dire. Stick to open-ended questions in order to give jurors the opportunity to talk. You want your jurors to feel as if you are an ally, not an opponent, after emerging from the jury selection process. Keep voir dire as brief as possible. Succinctness makes you appear more prepared and polished, and jurors also appreciate it when attorneys do not waste their time. Trial Presentation Another important factor to consider once you have reached trial is how you will present your legal arguments and the electronic evidence you have collected during discovery to maximize the persuasive impact. Trial presentation consultants understand how best to communicate Order now: http://bit.ly/Io6OzM 150 ELECTRONIC EVIDENCE AND DISCOVERY Figure 3.9 Juror Retention persuasively with the jury and can help you employ an effective presentation strategy through the use of demonstrative exhibits, customized to your particular jury. While there is no best way to educate every single person because people have different learning styles, visual images as opposed to words tend to dominate most Americans’ thinking. Jurors retain only twenty percent of what they hear versus eighty percent of what they hear and see. See Lisa Brennan, “Pitching the Gen-X Jury,” National Law Journal (June 4, 2004). The brain is designed to move smoothly back and forth between auditory and visual memory sites when it is presented with both visual and auditory information in an integrated format. When the brain is confronted with both auditory and visual information, working memory increases thus improving both retention and comprehension (e.g., facts, circumstances, inferences, etc.) of the information presented. The use of demonstratives can be particularly critical when presenting complex or technical information about which the average juror will lack a frame of reference. For these reasons and more, demonstrative exhibits are effective tools to illustrate, organize, reinforce, and emphasize points in a visual manner your jury is more likely to understand and find persuasive. The most seamless way to present an effective combination of exhibits, demonstratives, video clips, photographs, and other such audiovisual presentation material is to load it all into a multimedia presentation system with the ability to display any item as quickly as the click of a button. These systems are not just “PowerPoint on steroids”—they are sophisticated tools that are constantly growing in capability. Order now: http://bit.ly/Io6OzM Practical Legal Implications 151 There is an apprehension among some attorneys that the use of technology and demonstrative exhibits in trial presentation may cause jurors to view the case as a “paper-and-pencil David” versus a “hotshot Goliath.” This fear is simply unfounded. The truth is, when presentation systems are used effectively, jurors appreciate the aid in comprehension and recall key points more easily than through hearing them alone. Nationwide survey research involving thousands of jurors, who regularly watch television and conduct business on the Internet, expect high quality presentations and do not consider the “too slick” factor to be an issue. In fact, ninety-five percent of participants in a recent survey view the use of computer systems in the courtroom as professional and only five percent as too flashy. If a trial team is planning to use a presentation system in court, it is certainly advisable to notify the judge and the opposing counsel of your intention before trial begins. Presentation system software can be bought or leased and run by attorneys themselves. Some systems are run via a bar code reader; each exhibit is assigned a unique bar code and can be called up with a handheld scanner to appear on a screen in the courtroom. Tools such as a light pen can be used to highlight key words and phrases in documents by enlarging them on the courtroom screen, that is, if a demonstrative has not already been created to highlight that information. The versatility of a presentation system is handy when reacting to the other side’s argument. Another option is to hire a presentation consultant, which is particularly advantageous for complex litigation. Hiring an outside firm to create the database and run it in the courtroom is the best option when working with multiple types of files and video and audio clips. Every document must be scanned into an electronic format, old VHS video must be digitized and all digital materials must be optimized for compatibility. But once it is all together in a database, there is no hitting rewind, no flipping through charts—just a well-timed click here and there. Practice is essential to running an effective electronic presentation, however. Under-preparing and then bumbling through the database during trial is a surefire way to undermine your message. Overpreparing runs the risk of sounding scripted and not allowing yourself to think on your feet. The purpose of a multimedia presentation system is to enhance the case, not control it. Not all demonstratives or exhibits are most effective when viewed on a screen. A complex timeline, even if shown on the highest quality monitor, is easier to read on a large printed board. Trial teams who have prepared a list of key case-related definitions are better off displaying them on a foam-core poster board that remains in view of the jury so that Order now: http://bit.ly/Io6OzM 152 ELECTRONIC EVIDENCE AND DISCOVERY they may refer to it any time during trial. Presentation consultants are able to discern which exhibits belong in the database and which do not. Courtroom technology has improved by leaps and bounds over recent years, but not every courtroom is fully stocked. The trial team or their presentation consultant must inquire as to the courthouse’s capabilities and what types of outside equipment are allowable. As courts have become more used to trial teams taking advantage of technology and have recognized the benefits, resistance has decreased. Judges have noted that when attorneys employ multimedia presentation systems, a trial’s length is markedly reduced. CONCLUSION In the final analysis, discovery should not be viewed in isolation from trial issues as they are both means to achieve the same end—a positive outcome on your case. Comprehensive and defensiblyconducted discovery (i.e. proper chain of custody and use of procedures that meet the governing standards of care) will exponentially increase an attorney’s ability to admit the electronic data procured during discovery as evidence for a jury to consider. A failure, however, to consider the benefits of a deliberate trial strategy and use of trial technologies for the purpose of jury research, voir dire, and trial presentation is a failure to fully utilize the ESI you have taken the effort to collect, filter, process, review, produce, and introduce as evidence. The bottom line is that embracing technology to make informed decisions as to jury selection and trial strategies and presentation, including embracing technology to create powerful demonstrative exhibits and run an effective audiovisual presentation, will significantly increase the likelihood of success at trial—the ultimate objective in any litigation. Order now: http://bit.ly/Io6OzM
© Copyright 2026 Paperzz