Avoiding the Hazards of E-Discovery: Preparing for a Conference Pursuant to Federal Rule of Civil Procedure 26(f) Eric E. Bensen and Rebecca Myers Overview 1. E-Discovery Overview 2. Preparing for the 26(f) Conference 3. Topics to Discuss at the 26(f) Conference 4. After the Conference 1 I. E-Discovery Overview Environmental litigation takes many forms. The approach to discovery in these different actions will take many forms as well. Toxic Tort Litigation Enforcement and Defense of Environmental Issues Criminal Prosecution Citizen Suits CERCLA, RCRA, CWA Regulatory and Permitting 1 I. E-Discovery Overview • Some flexibility for eDiscovery, e.g.: – edocuments need not be produced in more than one form. – No need to produce if not reasonably accessible because of undue cost. – Party may select method of preserving documents. – No penalty for loss due to routine, good faith operations of electronic system. – Duty to preserve is fact intensive inquiry. • Moreover, cooperation is emphasized – Sharing information and working collaboratively to address e-discovery challenges is a focal point for Judges. – Cooperation has become integral in e-discovery pilot programs, standing orders and judicial decisions. 3 I. E-Discovery Overview • But: E-Discovery carries significant responsibilities and the potential for sanctions: – Anticipation of Litigation = Duty to Preserve – Duty to Preserve + Relevance + Negligence = Sanctions – Duty to Preserve + Willfulness = Sanctions • Available Sanctions (nonexclusive): – Deeming Facts Admitted (FRCP 37(b)(2)(A)) – Precluding Evidence (FRCP 37(c)(1)) – Striking Privilege Assertions (FRCP 26(b)(5)) – Striking Designated Witnesses (FRCP 37(c)(1)) – Monetary Sanctions (FRCP 37(b)) 4 I. E-Discovery Overview Amendments to the Rules as they apply to ESI are currently underway FRCP 37(e) “Failure to Preserve” section has been a focal point and was hotly debated during the public comment period on amendment proposals that ran from Aug. 2013-Feb. 2014. – FRCP 37(e) has caused parties to over-collect and over-preserve in fear of sanctions – Very costly – Standard needs to be one of reasonableness, not strict liability At the last Advisory Committee meeting (Apr. 10-11, 2014), a new version of FRCP 37(e) was introduced. It is restricted to losses of ESI, drops the list of “factors” for courts to employ and ignores existing Rule 37(e). On May 29th and 30th, the Standing Committee is scheduled to review the Advisory Committee’s recommendations, after which the proposals (if approved) will be submitted to the Judicial Conference and Supreme Court. The earliest that any FRCP amendments could go into effect is December 1, 2015. 5 I. E-Discovery Overview Being prepared for E-Discovery is key (Don’t fall behind!) 6 I. E-Discovery Overview F.R.C.P. 26(f) Generally: Requires that all parties confer “as soon as practicable—and in any event at least 21 days before a scheduling conference is set” to: 1. Discuss the nature and basis of their claims and defenses; 2. discuss the possibilities for promptly settling or resolving the case; 3. arrange for the disclosures required by Rule 26(a)(1); 4. discuss any issues about preserving discoverable information; and, 5. develop a proposed discovery plan. 7 I. E-Discovery Overview F.R.C.P. 26(f) ESI: The parties should be prepared, prior to the meet-andconfer discussions, to discuss: 1. The specific data sources in their respective electronic systems. 2. The reasonableness of e-discovery of these data sources. 3. Stipulations regarding ESI discovery plans that encompass an evaluation of the “proportionality factors” (an evaluation performed by the parties themselves at the outset of the discovery phase). 8 II. Preparing for the 26(f) Conference 1. 2. 3. 4. Issuing the Litigation Hold Identify and Speak with Key Players Understanding the Client’s Systems Understanding the Client’s Systems - Backups 9 II. Preparing for the 26(f) Conference Litigation Holds Litigation Holds “The scope of a party’s preservation obligation can be described as follows: Once a party reasonably anticipates litigation, it must suspend its routine document retention/ destruction policy and put in place a “litigation hold” to ensure the preservation of relevant documents.” Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003) (Zubukake IV) 10 II. Preparing for the 26(f) Conference Litigation Holds Issue a Litigation Hold (i.e., a Document Preservation Notice) • Identify: – – – – – Categories of documents to be preserved Time period Business units effected Sources subject to the hold (e.g., backup tapes, home computers) Exceptions to routine procedures (e.g., suspension to routine deletions) • Issue to: Key players, their staffs, pertinent department heads and, IT personnel responsible for pertinent systems. • Follow up: – Send regular reminders to key players and departments – Have HR and IT provide notice of pertinent personnel changes. • Document the steps taken. 11 II. Preparing for the 26(f) Conference Identify and Speak with Key Players • Who are they key players and how do they store their information? – Anything on home computers, laptops, tablet computers? • What kinds of relevant documents have they created? E.g., – – – – – – – – Audio recordings, voicemail Hazmat related information (invoices, transportation manifests) Proprietary Systems and Databases Social Media Internet use history Lab analysis Modeling data Project plans, specs, drawings 12 II. Preparing for the 26(f) Conference Identify and Speak with Key Players • Who else might have potentially responsive information or documents? – Are there relevant shared documents? – Third-parties? 13 Things II. Preparing You MUST for theKnow: 26(f) Conference Understanding the Client’s Systems • Who are the key IT people, and their roles? • What are the company’s data retention policies? – Are the policies applied and followed consistently? – Has any potentially relevant data been inadvertently destroyed or overwritten? • What applications are used by custodians and for what purpose? • What are the best ways to find and access relevant data? • What format is data usually stored in? 14 II. Preparing for the 26(f) Conference Understanding the Client’s Systems – Backup Systems • Are any backup systems available? – If so, how are those systems accessed? – What is the backup schedule? Is it followed? – Do they contain unique data? • What would be the approximate costs of restoration or recovery, if necessary? 15 II. Topics to Discuss at the 26 (f) Conference Top 10 Topics Parties should be prepared to discuss 16 II. Topics to Discuss at the 26(f) Conference e 1. Litigation Hold and Retention • Confirm that litigation holds are in effect. – As of when? • Scope of hold – – – – – – “Mirror images” of hardware? Geographic or business units subject to hold Servers? Laptops? Home computers? Backup tapes and inaccessible materials? Suspension of deletion and media recycling Cross-border discovery: check local laws! • Duration of hold 17 II. Topics to Discuss at the 26(f) Conference Information 2. Systems and Sources of Electronically Stored Information • Disclosures about locations and types of electronically stored information – – – – Start with email applications, but don’t stop there Proprietary databases Permit applications Paper files • Schedule for additional disclosures or follow up? • Is either side requesting an on-site inspection? – If so, establish protocols 18 II. Topics to Discuss at the 26(f) Conference 3. Scope of Discovery • The scope of discovery – Relevant time period for discovery – Limits on number of custodians – Limits on sources of data – Limits on locations – Discovery from agents under the parties’ control 19 II. Topics to Discuss at the 26(f) Conference 4. Inaccessible Data • Discuss any possible data that may be inaccessible. This can be of particular importance in environmental litigations that possibly reach back decades or longer – – – – – – – – Basis for claim that it is inaccessible What is the data? Is it unique? How much is there? Is it likely to be important or relevant? How can it be recovered? How much would recovery cost, and how long would it take? Beyond backup tapes: legacy systems, deleted data 20 II. Topics to Discuss at the 26(f) Conference 5. Protocols for Finding Responsive Documents • Manual review? – May be overall unreliable and miss many relevant documents. Also, an enormous volume of data may make human review impractical. – Could be best choice when dealing with a dispute involving a narrow, limited scope. • Keyword searching? – Uses terms and/or Boolean searches to locate particular words or phrases in documents. – If using keywords, seek agreement on terms or deadline to exchange terms. – The results can be overinclusive, returning many “false hits.” – But the results can also be underinclusive, and will not capture all relevant documents. 21 II. Topics to Discuss at the 26(f) Conference 5. Protocols for Finding Responsive Documents • Predictive Coding – Concept searching is designed to find and categorize documents based on concept similarity, not merely on the words they contain. – Uses computer technology, linguistics, and mathematical models. – Getting a lot of attention. – Early reports say it increases efficiencies and decreases cost/time. – Some clients/attorneys still wary of the technology. 22 II. Topics to Discuss at the 26(f) Conference 5. Protocols for Finding Responsive Documents • No matter what process you use, the document review & production must: – Be constructed with efficient and effective processes – meet a “reasonableness” standard – be defensible • In reality, a defensible process, well-conceived and executed, is imperative to reducing expenses and it minimizes risk. 23 II. Topics to Discuss at the 26(f) Conference 6. File Formats and How to Produce Documents • The formats in which ESI will be produced. • Format may be different for structured and unstructured ESI – Structured: database, collaboration sites, etc. – Unstructured : email, presentations, word processing, etc. • The extent, if any, to which metadata will be produced and the fields of metadata to be produced. 24 II. Topics to Discuss at the 26(f) Conference 7. Proportionality and Cost Savings • The amount and nature of the claims being made by either party. • The nature and scope of burdens associated with the proposed preservation and discovery of ESI. • The likely benefit of the proposed discovery. 25 7. Topics II. Proportionality to Discussand at the Cost-Savings 26(f) Conference 7. Proportionality and Cost Savings • Costs that the parties will share to reduce overall discovery expenses, such as the use of a common electronic discovery vendor or a shared document repository, or other cost-saving measures. • Limits on the scope of preservation or other costsaving measures. 26 II. Topics to Discuss at the 26(f) Conference 6. 8. Privilege and Confidentiality Issues • Do the parties want a confidentiality agreement? – Bring a proposal to the conference, if possible – Attorneys’ eyes only? – Outside counsel only? – Procedures to challenge designations? – Third parties can be bound? 27 II. Topics to Discuss at the 26(f) Conference 8. Privilege and Confidentiality Issues • Effect of Federal Rule of Evidence 502 • Do the parties want to use a “clawback” or a “quick peek” arrangement? – “Clawback” allows the parties to retract inadvertently-disclosed, privileged documents. – A “quick peek” provision requires parties to produce documents first and assert privilege claims later. 28 9. Topics II. Phasing to Discuss and Timeframes at the 26(f)forConference Disclosure 9. Phasing and Timeframes for Disclosure • Should discovery of ESI be conducted in phases? • The parties should discuss: – Sources of ESI most likely to contain discoverable information that will be included in the first phases of Fed. R. Civ. P. 34 document discovery (e.g., email, reports). – Sources of ESI less likely to contain discoverable information from which discovery will be postponed or avoided. 29 II. Topics to Discuss at the 26(f) Conference 9. Phasing and Timeframes for Disclosure • The parties should discuss: – Custodians (by name or role) most likely to have discoverable information and whose ESI will be included in the first phases of document discovery. – Custodians (by name or role) less likely to have discoverable information and from whom discovery of ESI will be postponed or avoided. – The time period during which discoverable information was most likely to have been created or received. 30 II. Topics to Discuss at the 26(f) Conference 10. Application of Federal and Local Rules • Number and duration of depositions • Interrogatories • Rule 30(b)(6) depositions on document preservation and collection? • Limitations on expert discovery? – Drafts – Communications with testifying experts 31 III. After the Conference • Submit a report of the Rule 26(f) conference to the court within 14 days – Describe the agreements reached, and plans made, by the parties at the conference – Judges are stressing and encouraging cooperation, particularly in the eDiscovery stage • Make the required initial disclosures to other parties within 14 days. F . R. C . P. 26(a)(1) ED IV • Attend Rule 16 conference 32 Parting thoughts… • Plan, plan plan!! E-Discovery process is very manageable if you sit down ahead of time and think through the process from preservation to production. • When you are prepared, your case is easier to handle and you can focus on zealously advocating for your client when you have your arms around the process. • Consider adding a specialized E-Discovery lawyer to the litigation team. • Thank you and good luck! © 2014 Vandenberg & Feliu LLP. ebensen@vanfeliu.com rmyers@vanfeliu.com 33 Parting thoughts… Bensen & Myers on Litigation Management Available from LexisNexis Eric E. Bensen Rebecca K. Myers For more information, please visit: www.ericbensen.com 34