VOL. CLXXX – NO. 4 – INDEX 293 APRIL 25, 2005 ESTABLISHED 1878 COMPLEX LITIGATION What Clients Can Do To Prepare for E-Discovery Companies should be proactive in controlling and managing the potential e-evidence they generate By Donald W. Kiel, Kathy Dutton Helmer and Tammy E. Henderson o a company striving to compete and succeed in today’s global and Web-based market places, electronic communication is essential to doing business. Should the company be sued, however, those electronic communications are subject to discovery and may be a source of damaging or embarrassing information. Information accessible from computers, servers, laptops, hard drives, internal and external e-mails, electronic reports, Power Point presentations, backup files or tapes, and disaster recovery systems are all popular targets of increasingly aggressive efforts aimed at discovering so-called “e-evidence.” E-evidence has become a “high value” litigation target and one that can escalate litigation costs and increase potential exposure. The horror stories abound. In a breach of contract claim, plaintiff sought e-mails sent by over 700 of the defendants’ employees and stored on 93 backup tapes. Restoration of the T Kiel is a partner, Dutton Helmer is counsel and Henderson is an associate in the insurance coverage group at Kirkpatrick & Lockhart Nicholson Graham of Newark. e-mails was estimated to take six months at a cost over $6.2 million. Murphy Oil USA, Inc. v. Flour Daniel, Inc., 202 WL 246439, *3 (E.D. La. 2002). In SEC proceedings, a broker-dealer paid $2.1 million in fines and penalties to settle charges that it violated securities laws by failing to preserve email communications in an easily accessible place. In Matter of J.P. Morgan Securities Inc., Admin Proc. File No. 3-11828 (Feb. 14, 2005) (decision available at http://www.sec.gov/liti g a t i o n / admin/34-51200). Individual defendants who were not based in New Jersey but who used the company’s electronic message board “with knowledge that the messages would be published in New Jersey” were subject to jurisdiction in New Jersey. Blakey v. Continental Airlines, Inc., 164 N.J. 38 (2000). A recent survey of 840 companies by the ePolicy Institute and American Management Association found that one out of every five has either received subpoenas for employee e-mail or used e-mail to defend the company against allegations of sexual, racial or other discrimination claims. See, http://www.epolicyinstitute.com/ survey/index.html. Recognizing that electronic communications or data could well become e-evidence in litigation, there are a number of pro-active measures that companies can and should consider implementing to prepare in advance for potential e-discovery. Conduct pre-emptory due diligence. Before being confronted with litigation involving e-discovery, learn how your computer and electronic systems are structured and how they actually operate. Identify the individuals or organization responsible for your systems and understand the chain of command so you can quickly and effectively disseminate information and instructions pertinent to e-discovery when necessary. See, Keir v. Unumprovident Corp., 2003 WL 21997747 (S.D.N.Y. Aug. 22, 2003) (criticizing defendant’s delayed and abortive efforts to comply with court order to preserve e-mail and appointing an expert to determine whether “all that needs to be done to retrieve the email … is being done”). Also, familiarize yourself with document retention and e-mail policies. Where such policies do not exist, propose their immediate creation; where such policies do exist, make sure they are being applied to computers and other electronic devices. Consider hiring outside counsel to conduct a “due diligence” review of the policies. Finally, make sure that the policies are This article is reprinted with permission from the APRIL 25, 2005 issue of the New Jersey Law Journal. ©2005 ALM Properties, Inc. Further duplication without permission is prohibited. All rights reserved. 2 actually followed. See, Murphy Oil, supra (defendant, by not following its own document retention policy, had failed to recycle the 93 backup tapes at issue). Limit the creation of e-data. Consider means to reduce the types and amounts of e-data currently created. These efforts can save time and money while also reducing the volume of data later subject to discovery. E-mail is a good first target because of its sheer volume and ever-increasing use. The International Data Corporation predicts that in 2006, the total number of e-mail messages sent daily will exceed 60 billion worldwide, up from 31 billion in 2002. See h t t p : / / w w w. c o m p u t e r w o r l d . c o m / softwaretopics/software/group ware/story/0,10801,74682,00.html?fro m=story_picks. Because of the speed and informality of e-mail, people tend to write and disseminate things in email that they would never say in person. See, Blakey, supra (despite pendency of a sexual discrimination lawsuit, male co-workers continued to post a series of electronic messages that the plaintiff viewed as harassing, genderbased messages, e.g. “if the porn bothers you, don’t look”). Consider creating an e-mail policy limiting use to business purposes and educate all personnel about the dangers of overuse, informal use and misuse of e-mail. Engage computer professionals to help identify specific measures to limit the creation of edata. Identify and protect confidential materials. Because of the sheer volume of e-data created, maintained and distributed, e-discovery often raises thorny issues of confidentiality. By taking steps to identify and protect confidential business information, clients can avoid future problems and expense. Documents containing confidential information should be appropriately labeled in their electronic version. Staff should be educated on how to classify e-data as, among other things, confidential, proprietary, privileged, workproduct or related to settlement. Access to such documents should be restricted to the personnel responsible for such NEW JERSEY LAW JOURNAL, APRIL 25, 2005 matters. See, Target Advertising, Inc. v. Miller, 202 WL 999280 (S.D.N.Y. May 15, 2002) (plaintiff advertising company alleged that after firing two graphic designers, numerous computer files and data disks had been removed from the offices and the company’s intellectual property, work product, customer information and financial information had been stolen). Companies subject to laws or regulations that require certain data to be maintained in “accessible form,” must also assure that data generated years earlier is either stored in a format compatible with current, upgraded systems or that the equipment and software used to create the data remain available and functional. See, J.P. Morgan Securities, supra. Preserve potential evidence. Whether potential evidence has been preserved is often at the focal point of e-discovery battles. Organizations must create and consistently follow a document retention policy that specifically addresses all computers, servers and other electronic devices used to create or store e-communications or data. A sound document retention policy: (1) complies with any statutory or regulatory obligations governing the different types of documents to be retained; (2) specifies the length of time each type of document will be retained; (3) establishes a destruction schedule and method of destruction; and (4) provides a detailed protocol for halting the routine destruction of documents in the event of anticipated or actual litigation (i.e., a “litigation hold” or “freeze”). The obligation to preserve e-data can be triggered even before a lawsuit is filed. Zubulake v. UBS Warburg, 203 U.S.Dist. LEXIS 18771, at *16 (S.D.N.Y. Oct. 22, 2003) (“Once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a ‘litigation hold’ to ensure the preservation of relevant documents.”) The obligation to preserve e-data can also be triggered by statutory and regulatory obligations (including the SarbanesOxley Act), court-issued preservation orders, and “preservation letters” sent by litigants to their opponents. See, e.g., 180 N.J.L.J. 293 J.P. Morgan Securities, supra (discussing obligation under SEC regulations to preserve e-mail documents in easily accessible form). Courts have sanctioned litigants engaged in intentional, or even innocent, spoliation of e-data by imposing, among other things, monetary sanctions, evidentiary sanctions precluding the offer of certain evidence, adverse inferences, default judgments and socalled “rummaging” (i.e., giving the discovering party “hands-on” access to the respondent’s computer system.”) See, e.g., Mosaid Techs. Inc. v. Samsung Elecs. Co., Ltd., 348 F.Supp.2d 332 (D.N.J. 2004) (Where defendant failed to produce e-mails requested in discovery and allowed emails to continue to be deleted, the court imposed sanctions including an adverse inference instruction to be given to the jury, along with the fees and costs associated with trying to obtain the required discovery); United States v. Philip Morris USA Inc., 327 F.Supp.2d 21 (D.C. 2004) (for noncompliance with court order requiring preservation of e-evidence, court imposed $2.9 million sanction and precluded certain employees from testifying at trial). In light of these preservation issues, it is important that those responsible for a client’s computer system not only implement the document/data retention policies that are adopted but also design effective procedures for interrupting the deletion process in the event of a “litigation hold.” See Keir, supra. Understand the costs. E-discovery differs from traditional paper discovery because e-data tends to be more voluminous, harder to retrieve and is frequently in need of translation. These characteristics can render e-discovery vastly more expensive than paper discovery and increase the risk that discovery will be used offensively. While it is generally presumed that the responding party bears the costs, where a litigant has requested data that is not readily “accessible,” some courts have been willing to shift or allocate the costs to the party requesting the discovery. Zubulake v. Warburg LLC, 216 3 F.R.D. 280 (S.D.N.Y. 2003) (shifting to requesting party one-fourth of the estimated $166,000 cost of restoring and searching backup tapes, but declining to shift the estimated $108,000 cost of producing the restored e-mails); AntiMonopoly, Inc. v. Hasbro, Inc., 1996 NEW JERSEY LAW JOURNAL, APRIL 25, 2005 U.S. Dist. LEXIS 563 (S.D.N.Y. Jan. 23, 1996) (requiring requesting party to bear the cost of special programming to recover electronically restored data). Be proactive, not reactive. The adage that an ounce of prevention is worth a pound of cure certainly 180 N.J.L.J. 293 applies to the modern-day dilemma of balancing the business necessity and convenience of computers and other electronic media while effectively controlling and managing all the potential e-evidence that they generate. ■