Please Stop Speaking After the Tone… Mark S. Sidoti and Paul E. Asfendis 10-5-2009 Modern companies are presented with many options for generating, receiving, storing, retrieving and disposing of electronic business communications. Perhaps nowhere is the progression of technology more evident than in the context of voicemail. Where voicemail messages were once stored on analog tapes, many organizations now utilize digital technology, and some opt for "unified" technology in which a company's telephone and computer systems are integrated. Not surprisingly, such advances raise a number of e-discovery issues. Businesses considering implementation of new voicemail technology should evaluate the effect, if any, that implementation will have on the company's obligations to preserve, search for, and disclose relevant voicemail messages. The purpose of this article is to provide an overview of various digital voicemail arrangements, from very basic to fully unified, and to identify and discuss related e-discovery issues and practical considerations. Four Digital Arrangements In this article, we discuss four digital voicemail arrangement options. Option 1: Basic Digital Voicemail. This digital arrangement is similar to analog in that notification of voice messages is only available to the user via the message light on the telephone and an advisory when a user calls in remotely. Received voice messages are digitally stored on a voicemessage server. We assume for purposes of this article that the voice message server is separate from the e-mail servers and will contain the sole copy of all stored voice messages. Option 2: E-mail Notice. This is similar to Option 1, but with the addition of an e-mail alert notifying users only that a voice message has been received. As with Option 1, voice messages are exclusively stored on a central server, and users would be required to access voice 1 messages via their office phone or remotely. The added benefit to this arrangement is immediate notification of messages to remote users. Option 3: Link. A "link system" (sometimes referred to as "integrated messaging") provides a separate folder within the e-mail program. Voicemail messages in the user's integrated mailbox are visible in this folder as "links" to messages on the voicemail server. While the messages can be reviewed and played via these links and the messages are not physically stored in the e-mail system, we presume an arrangement in which these messages could also be copied to the local client or email system as .wav files and then forwarded as e-mail attachments or saved in the end user's computer. Option 4: Unified Messaging. In this arrangement, the full functionality of the unified system is enabled, allowing delivery to users of an e-mail containing an attached audio (.wav) file of the voice message. Users can retrieve the messages remotely or simply play the message on a media player, such as a BlackBerry device or iPhone. The message is typically stored on the e-mail server along with other standard email, and would be subject to the company's e-mail auto deletion and back-up schemes. As with standard e-mail, users may control retention or deletion of the messages by, for example, "double deleting" (permanently) the files, storing the messages in e-mail subfolders that aren't subject to the auto deletion scheme, or copying the files to the hard drive. Also, absent restrictions placed on the system, a user may forward the e-mail with attached audio file to others, thus allowing for copies of the voice message to reside in multiple locations. Issues and Discussion Before implementing one of the above arrangements (or some hybrid), companies need to determine the effect, if any, that this will have on their e-discovery obligations. Once triggered, the duty to preserve applies to all relevant existing or subsequently created data. It would not apply, of course, to data, including voicemails, properly discarded in the normal course prior to the triggering of the hold.1 Thus, once triggered, the company's obligation to preserve relevant voicemail messages and/or notification e-mails would necessarily encompass messages and e-mails already 2 received and retained pursuant to the company's voice message retention policy, and those received on a going forward basis. Option 1, digital voicemail. Of the four arrangements, Option 1 would impose the least onerous voicemail preservation obligation on a company. Although possible, identification of relevant voice messages that have already been received and are within the retention period could be difficult. In theory, upon issuance of a litigation hold notice or on receipt of a discovery request, a company would have to suspend its retention policy and halt destruction of potentially all voice messages on the voicemail server. Then, each message would have to be reviewed for a relevance determination. This could be prohibitively time consuming and expensive.2 Notably, however, since the voice messages are digitally stored and might be identifiable through metadata fields, such as sender/recipient or date received, preservation may be considered feasible in a case where preservation efforts can reasonably be limited to voicemails received by certain individuals or groups within the company. Case law, however, indicates that the obligation to undertake this effort might only be triggered in the unusual circumstance when the producing party is aware (or reasonably should have been aware) of the existence of a highly relevant message (e.g., the central issue in the case turns on the voice message). This would be akin to the court's holding in Columbia Pictures v. Bunnell, in which the data stored in random access memory (RAM) was extremely ephemeral, yet worthy of preservation given its central relevance to the issues at bar. See Columbia Pictures v. Bunnell, 2007 U.S. Dist. LEXIS 46364 (C.D. Cal. 2007). Preservation of voice messages received on an ongoing basis after implementation of the litigation hold can be accomplished by instructing employees subject to the hold notice to notify the legal department on receipt of any potentially relevant voice message so that it can be reviewed and, if necessary, preserved. Courts would likely impose such an ongoing obligation on a company notwithstanding the nature of this type of system, because once the hold notice is disseminated, custodians and the company are aware of the need to sequester the post-hold created information. Probably the most significant attribute of the Option 1 arrangement is the lack of any automatic written notification of a voice message. This simplifies and 3 centralizes the litigation hold process. Since voice messages will not be stored on an e-mail server or any individual's computer, individual employees will have little or no involvement with identification and preservation of voice messages already received and stored and deletion schedules can be much more carefully controlled by the company's IT department.3 Option 2, e-mail notice. A company's preservation obligations under an e-mail notice arrangement will be similar to its obligations under the Option 1 arrangement. However, an e-mail notice set-up will create an additional data point within the end user's e-mail system that, if not regularly and permanently deleted, may point an inquiring party to the fact that a voicemail message was received on a certain date and at a certain time. If the particular date, time and custodian are highly relevant to the litigation issues, a company may have an obligation to preserve the message. (Of course, if the company strictly enforces a short deletion schedule, some relevant voicemails may be routinely discarded prior to the hold trigger.) Because the actual voicemail messages would continue to reside solely on the voicemail server, IT could maintain strict control over deletion schedules. A simple "voice message received" e-mail advisory with no content or sender information would further minimize the risk of discovery and triggering of the obligation to preserve. Option 3, Link. Identifying and preserving voice messages using a link, or integrated messaging, arrangement would be similar to Options 1 and 2 in that voice messages reside in one location, the voicemail server. The degree of risk involved with this option will depend greatly on the information contained in the advisory e-mail containing the message link and whether copying of the voice message is possible. The relevance of the message may be identifiable based on the context of the metadata regarding the sender, recipient and date/time received. Additionally, even though the actual voice message file resides on a central server, not as an attachment to an e-mail, if the recipient forwards the e-mail containing the sender information, or accesses the message through the Web interface and copies it, the profile of the message increases. Also, depending on the security implemented on message links, forwarding an e-mail link may allow users to share the content of a voice message. Users of this type of arrangement should be educated about the 4 risks of disseminating voice message notification e-mails to unintended or unnecessary recipients and copying messages. Option 4, unified messaging. The fully unified messaging system (i.e., with all functionality enabled) poses the greatest risk relating to identification and preservation of voice messages. In this type of system, voice messages, generally in the form of .wav files, are forwarded directly to the user through the company's e-mail system. Like standard e-mail, the voice message resides on the e-mail server but can be duplicated, preserved and forwarded with ease. Although a fully unified system is the most attractive in terms of user convenience, it poses several risks and cost concerns: • Because the messages will enter the end user's inbox, and frequently remain in folders or hard drive locations, the volume of searchable data and the likelihood of discovery will increase significantly. • The company will lose much of its ability to centrally control the retention of the data as well as the dissemination of the messages. These factors increase the overall scope and cost of the company's preservation obligation. • Voice messages residing on the company's e-mail server(s) may be subject to the typically longer e-mail retention period. In fact, courts will likely treat voice messages similar to e-mails for identification and preservation purposes. See, e.g., In Re: Seroquel Products Liability Litigation, 244 F.R.D. 650, 661 (M.D. Fl. 2007) (defendant's failure to produce any voicemails, despite the fact that defendant's unified system delivered same to Outlook inboxes, was one of several discovery failures argued by plaintiff and listed in the court's decision granting sanctions against defendant). • Unified messages typically have identifying information in their e-mail "vehicles," such as the originating telephone number or internal extension. This information can be easily searched and most courts would likely analyze search requests for relevant phone numbers or names no differently than now-standard requests for email searches using search term protocols. • This, in turn, will significantly increase the cost of e-discovery processing at every stage and may entail full message review through listening (which takes more time than reading) or implementation of new and expensive voicemail transcription technologies. 5 Other Considerations Given the unquestionable discoverability of voice messages and the penalties for spoliation, regardless of which voicemail arrangement is used, counsel should consider express inclusion of voicemail messages in litigation hold notices. Note that the corporate duty to preserve can be triggered where the custodian simply recalls that he or she received a relevant voicemail that may still exist on the company's server and brings that to the company's attention (of course, depending on the employee, that knowledge might be simply imputed to the company). Moreover, the critical task of litigation hold enforcement procedures could be affected by the type of system a company decides to install. With the digital voicemail and e-mail notification systems (Options 1 and 2), courts would be less likely to impose preservation, retrieval and production obligations on an organization absent a specific notification by a custodian that a relevant message was received and may still exist. Moreover, these systems (particularly if Option 2 does not include any identifying information in the notice e-mail) would effectively render a company unable to identify relevant voice messages. However, because Options 3 and 4 systems would leave a trail in a user's inbox, the company will need to carefully assess whether custodians have searched for and identified relevant voicemail messages or e-mails "pointing" to existing messages. Additionally, the company's litigation hold procedures should provide instruction to users regarding creation of folders to preserve relevant voicemails and their transmittal e-mails. Regardless of the digital arrangement, voicemail policies and practices should be tailored to minimize the risks. Users should be educated as to proper usage of voice messages, including keeping them brief and as non-substantive as possible; requesting in their voice message greeting that callers call back or leave name and number; avoiding messages regarding questionable or controversial matters, including litigation; not treating voice messages as business documents and not unnecessarily saving or circulating messages. While this will not eliminate all of the risks associated with digital voice messages, companies should encourage and enforce responsible use of voicemail (and all business communications, especially those that are written or recorded) and consider implementing a short retention period on voicemail. Through these steps, an organization can go a long way towards reducing the risks and costs associated 6 with preservation and production of voicemail messages in today's legal environment. Mark S. Sidoti, a director at Gibbons, is chair of the firm's e-discovery task force. Paul E. Asfendis is an associate at the firm and a member of the e-discovery task force. Both authors also practice in the firm's products liability department. Endnotes: 1. For companies seeking to reduce the discoverable data pool, unless there is a business need to the contrary, voice messages ideally should not be regularly retained for long periods of time. Of course, the shorter the retention period, the shorter the amount of time a company whose duty to preserve has been triggered will have to take steps necessary to ensure that potentially relevant messages are preserved before they are auto-deleted. 2. Such a burden could provide a basis to argue that the information is not "reasonably accessible" and thus need not be preserved, restored and produced. 3. Of course, to the extent that an individual employee has saved or is aware of a relevant voice message received within the retention period, that employee should be instructed in the litigation hold notice to contact the legal department for possible preservation. Reprinted with permission from the October 5, 2009 edition of the New York Law Journal© 2009 Incisive Media Properties, Inc. All rights reserved. Further duplication without permission is prohibited. 7
© Copyright 2026 Paperzz