NYCLA BRIDGE THE GAP January 25, 2012 eDiscovery 101: The Discovery of ESI - A Practitioner’s Guide to Handling Electronically Stored Information in Litigation Instructors: Kenneth Rashbaum - Rashbaum Associates, Principal Jason Lichter - Seyfarth Shaw LLP, Senior Counsel eDiscovery and Information Governance Matthew Knouff - eDiscovery Counsel ,CDS Christopher O’Connor - Director of Litigation Support. CDS 2012 © Your Instructors: Matthew Knouff is General Counsel and eDiscovery Counsel with Complete Discovery Source, Inc. (CDS), a global, full-service provider of eDiscovery services and technologies, managed document reviews, and litigation / investigation support solutions. Matthew advises law firms and corporations worldwide on eDiscovery and information governance best practices and defensible deployment of technology during legal proceedings. He is an active member of Working Group 1 of The Sedona Conference, is Chairman of the New York County Lawyers’ Association’s Cyberspace Law Committee’s eDiscovery Sub-Committee, has developed numerous e-Discovery programs and CLE courses, and is a frequent writer and speaker on issues related to eDiscovery and information governance nationally. Em: mknouff@cdslegal.com Ph: 212-813-7006 Your Instructors: In his thirty years of experience as a litigator, trial lawyer and counselor, Kenneth N. Rashbaum has been the trusted advisor to health care providers, health plans and multinational corporations on information governance and its compliance with federal, state, and international law. He has served as partner and Co-Chair of the E-Discovery, Compliance and Data Management Practice Group of Sedgwick, Detert, Moran & Arnold, LLP, and Director of Consulting of Fios, Inc., where he founded the Cross-Border divisions. Ken has vast experience counseling multinational corporations on data protection and privacy laws and regulations in Europe, Asia, Canada, and South America. Ken served as Co-Editor-in-Chief of The Sedona Framework For Analysis of Cross-Border Discovery Conflicts. Em: krashbaum@rashbaumassociates.com Ph: 212-421-2823 Your Instructors: Jason Lichter is Senior Counsel and East Coast lead in the eDiscovery and Information Governance practice group of Seyfarth Shaw LLP, resident in the New York office. Jason has advised clients and colleagues on all major electronic discovery issues, both during and outside of litigation, including document preservation and retention policies, efficient approaches to document review, forensic collections, backup tape remediation strategies, cost shifting, vendor selection, and cloud computing initiatives. Jason has also given presentations and published articles on a number of timely electronic discovery and legal technology topics and is a member of the Sedona Conference’s Working Group 1 on Electronic Document Retention and Production. In 2009, Jason was named a “Future Star” by Benchmark Litigation: The Definitive Guide to America’s Leading Litigation Firms & Attorneys. Jason graduated cum laude from Yale University in 2000 and received his J.D. from Harvard Law School in 2004. Prior to law school, Jason worked as a Software Engineer for Sapient Corporation, an international IT consulting company. Em: jlichter@seyfarth.com Ph: 212-218-5563 Your Instructors: Chris O’Connor is the Litigation Support Services Manager with Complete Discovery Source, Inc. (CDS), a global, full-service provider of eDiscovery services and technologies, managed reviews and litigation/investment support solutions. Chris has been advising and working with law firms in the areas of eDiscovery for the past decade. While his career has drawn him more and more into advising and strategy creation for reviews and firms, he is still actively managing cases and working with clients to find the best solution to their eDiscovery challenges. In addition to working with clients, Chris is a prolific speaker on various eDiscovery topics, focusing on practical and defensible application of the FRCP, state law, and cutting-edge technology to the full EDRM lifecycle. Em: coconnor@cdslegal .com Ph: 212-718-7031 eDiscovery 101: The Discovery of ESI - A Practitioner’s Guide to Handling Electronically Stored Information in Litigation Our Agenda Today • eDiscovery in General • EDRM / IGRM • eDiscovery under the Federal Rules • Ethics Rules to Understand • 2011 – Year in Review • Case Law Update • Preservation, Litigation Holds, and FRCP 37(e) • Collections – Domestic and Abroad • Best Practices and Cost Cutting Throughout the Process eDiscovery 101: The Discovery of ESI - A Practitioner’s Guide to Handling Electronically Stored Information in Litigation Our Agenda Today • The Processing Stage • Review & Analysis – Keywords and Concepts • Document Production • Handling Privilege Communication and Attorney Work Product • The Meet and Confer Process • Costs Again • Best Practices Overview • What to Expect in 2012 The Discovery of ESI: eDiscovery in General What is eDiscovery? • Electronic Discovery is the process of identifying, collecting, preparing, reviewing, and producing Electronically Stored Information (ESI) during the legal process. SEE YOUR MATERIALS: • Seventh Circuit Electronic Discovery Pilot Program – Report on Phase 1. •Report of the Judicial Improvements Committee (October 2011). •Also see the “Suggested Protocol for the Discovery of Electronically Stored Information (Maryland Protocol). The Discovery of ESI: eDiscovery in General Types and Sources of ESI • • • • • • • • • • • • • • Email servers and attached storage SharePoint servers and attached storage File/Print servers and attached storage Share drives Server log files Server RAM Backup tapes or backup targets External storage facilities Failover sites Hosted archive sites Legacy systems Internet Archives Social Media (Facebook, MySpace, Twitter, LinkedIn, etc.) Cache files and cookies • • • • • • • • • • • • • • • Chat room logs Employee workstations Employee external hard disks Employee CDs/DVDs/thumb drives Cloud data Voice Mail Digital camera memory iPods/PDA Cell phones Corporate web sites/blogs/podcasts Data in the possession of a non-party Employee personal computers Employee external email accounts Registry files Data located internationally The Discovery of ESI: eDiscovery in General Why is eDiscovery Important? – EVERY case involves some type of electronic data. – It can be your best friend or your worst enemy. – No more excuses. There are too many educational/vendor resources available. – Serious consequences for not satisfying your discovery obligations. • Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., Inc. • 2011 Mid-Year Update on E-Discovery Cases, Gibson, Dunn & Crutcher. The Discovery of ESI: eDiscovery in General ESI is Discoverable • FRCP 26(b)(1) permits discovery as to “any matter, not privileged, that is relevant to the claim or defense of any party.” • The Rules now expressly call for the discovery of “Electronically Stored Information.” - FRCP 26(a)(1)(B), 33(d), and 34(a). • The intent is to eliminate ambiguity associated with “documents” and “data compilations.”1 1. 2006 Advisory Committee Note to Fed. Rule Civ. P. 26(a). The Discovery of ESI: eDiscovery in General What Makes ESI Unique? Benefits Burdens Storage Accessibility Searchability Easy to Generate Fast and Reliable Metadata Voluminous Variety Dynamic Resilient Delicate Metadata The Discovery of ESI: eDiscovery in General Is Metadata Discoverable? “Metadata” is not directly addressed by the FRCP but keep in mind Rule 26(b)(1): • Is it relevant to any claim or defense? • Does it lead to the discovery of admissible evidence? GENERAL RULE: production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party – Sedona Principles – 2nd Edition (2007). The Discovery of ESI: eDiscovery in General What is Metadata? • The who, what, where and when of a document. • Data about Data • Electronic DNA • Sedona’s Definition: Information about a particular data set or document which describes how, when and by whom it was • collected, created, accessed, modified and how it is formatted. Evidence, typically stored electronically, that describes the characteristics, origins, usage and validity of other electronic evidence. Two “Must Read” Cases: Aguilar v. Immigration & Customs, 255 F.R.D. 350, 354 (S.D.N.Y. 2008). National Day Laborer Org. Network v. Immigration & Customs Enforcement Agency, 2011 U.S. Dist. LEXIS 11655 (S.D.N.Y. February 7, 2011). NOTE: National Day Laborer Opinion was WITHDRAWN! The Discovery of ESI: eDiscovery in General Types of Metadata System Metadata: Substantive/Application Metadata: Embedded or User Metadata: Information that is automatically generated by a computer system. Reflects modifications and substantive changes to a document. Directly or indirectly inputted by a user not typically viewable in the output display. The Discovery of ESI: eDiscovery in General Why is it important? • EVERY active file contains metadata. • Helps you make sense of ESI. • Enhances our ability to review data (i.e. sorting, searching, reports). • Can be the key to the relevance of a piece of information. • Can be critical to supporting or challenging privilege claims. • Can help you establish a prima facie case. • See Elektra Entertainment Group v. Does 1-9 (S.D.N.Y Sept 7, 2004). Can support a motion to dismiss and sanctions. The Discovery of ESI: eDiscovery in General It is Important that you understand that: The standard is not perfection, the standard is reasonableness. “Courts cannot and do not expect that any party can meet a standard of perfection…” The Hon. Shira Scheindlin, United States District Court Judge for the Southern District of New York in Pension Committee of the Univ. of Montreal Pension Plan et al. v. Banc of America Securities, LLC, et al. The Discovery of ESI: eDiscovery in General The Light at the End of the Tunnel The Discovery of ESI: EDRM / IGRM The Discovery of ESI: EDRM / IGRM The Information Governance Reference Model (IGRM) Project is designed to: • Provide a framework to help organizations develop and implement effective information management programs. • Seeks to facilitate dialogue among stakeholders. • The IGRM is an entirely new reference model; a separate counterpart to EDRM. Go to http://www.edrm.net/projects/igrm The Discovery of ESI: eDiscovery Under the Federal Rules The 2006 eDiscovery Amendments • Electronic Discovery has changed the way lawyers interact with their clients, each other and the courts. • To address the emerging technical challenges that electronic discovery presents, amendments to the FRCP were created. These rules went into effect on 12/1/2006. • Designed to facilitate cooperation. • Do we need to amend the amendments? The Discovery of ESI: eDiscovery Under the Federal Rules The 2006 eDiscovery Amendments • The definition of what is discoverable: FRCP 26(a)(1), 33, and 34; • Dealing with ESI early: FRCP 16(b), 26(a), 26(f) and Form 35; • Designating the format of ESI: FRCP 34(b) and FRCP 45; • Discovery from sources that are not reasonably accessible: FRCP 26(b)(2); • Post-production claims of privilege: FRCP 26(b)(5); • Interrogatories and production requests: FRCP 33, 34(a), and (b). • “Safe Harbor” for inadvertent spoliation: FRCP 37(e); • Subpoenas FRCP 45. ALSO SEE: Federal Rule of Evidence 502(b): Limitations of AC/WP Privilege Waiver. The Discovery of ESI: eDiscovery in New York State eDiscovery in New York • Uniform Rules for the Trial Courts - Rule 202.12(c)(3) • The Commercial Division for the Supreme Court, Nassau County • Cost Shifting – CPLR 3111 SEE YOUR MATERIALS: Tener v. Cremer, 2011 N.Y. Slip op. 6543 (1st Dep’t 2011). NYSBA – Best Practices in E-Discovery in New York State and Federal Courts. The Discovery of ESI: Ethics Rules to Understand The Ethics of eDiscovery It is important to understand the ethical obligations of attorneys since often times paralegals are running the show: • MRPC 1.1 – A lawyer shall provide competent representation to a client The importance of Issues related to search and retrieval. - United States v. O’Keefe (2008). - William A. Gross Construction Assoc. v. American Manufactures Mutual Insurance Co. (2009). • MRPC 1.6 – Confidentiality of Information • MRPC 3.4 – Fairness to Opposing Party and Counsel • MRPC 4.4 - Respect for Rights of Third Persons • Duty to Cooperate under FRCP 26(f) and state equivalents. The Discovery of ESI: 2011 Year in Review The Year in Review: eDiscovery in 2011 • Parties increasingly sought sanctions but the number of court granting sanctions remained consistent with 2010. • The growing focus on proportionality • Parties increasingly sought the taxation of eDiscovery costs. • Cooperation • Development in the criminal context • The certification debate raged SEE YOUR MATERIALS: The ABA Journal – The Trouble with Terabytes (Cloud Computing Article). The Discovery of ESI: 2011 Year in Review The Year in Review: eDiscovery in 2011 • Assisted review became more prevalent. • Cross-Border eDiscovery • Social media is playing a large role in discovery. • Privacy • Reform of the Federal Rules SEE YOUR MATERIALS: Gibson, Dunn and Crutcher 2011 Mid-Year E-Discovery Update http://www.gibsondunn.com/publications/pages/2011Mid-YearE-DiscoveryUpdate.aspx . 2011 Year-End Update is a resource that should be available online shortly. The Discovery of ESI: Case Law Update Case Law Update – Important 2011 Opinions • Nat’l Day Laborer Org. Network (NDLON) v. United States Immigration and Customs Enforcement Agency (ICE) (S.D.N.Y. Feb. 7, 2011) (Rescinded) • Steuben Foods, Inc. v. Country Gourmet Foods, LLC (W.D.N.Y. Apr. 21, 2011) • Race Tires America v. Hoosier Racing Tire Corp., 2011 WL 1748620 (W.D. Pa. May 6, 2011). • Katiroll Co. Inc. v. Kati Roll & Platters, Inc. (D.N.J. Aug. 3, 2011) • Abu Dhabi Commercial Bank v. Morgan Stanley & Co. Inc. (S.D.N.Y. Aug. 18, 2011) • Victor Stanley, Inc. v. Creative Pipe, Inc., "Victor Stanley III", 2011 U.S. Dist. LEXIS 112846 (D. Md. Sept. 30, 2011). • Pippins v. KPMG LLP, No. 11 Civ. 0377 (CM) (JLC), 2011 WL 4701849, at *1 (S.D.N.Y. Oct. 11, 2011). The Discovery of ESI: Preservation The Duty to Preserve - Discovery Generally • Pre-trial discovery in the U.S. is VERY broad. • FRCP 26(b) extends far beyond relevance to include anything that “appears reasonably calculated to lead to the discovery of admissible evidence.” The Discovery of ESI: Preservation The Duty to Preserve ESI • Proper preservation ensures that electronically stored information is protected against destruction or alterations. • Key Questions: – What is the duty to preserve? – When does the duty arise? – What is the scope of the duty? – How do you satisfy the duty? The Discovery of ESI: Preservation The Preservation Obligation Q. What is the duty to preserve? A. The duty to preserve is essentially the duty to prevent “the destruction or significant alteration of evidence, or the failure to preserve property for another’s use as evidence in pending or reasonably foreseeable litigation.”2 Q. When does the duty to preserve arise? A. At the time when a company reasonably anticipates litigation.3 2. Zubulake v. UBS Warburg, 02 Civ. 1243 (SAS), slip op. at 5, 220 F.R.D. 280 (S.N.D.Y. Oct 22, 2003) (Zubulake IV) (quoting West v. Goodyear Tire & Rubber Co., 167 F. 3d 776, 779 (2nd Cir. 1999)). 3. 2. Zubulake v. UBS Warburg LLC, 220 F.R.D. 212, 216-17 (S.D.N.Y. 2003); (see also Wiginton v. CB Richard Ellis, 2003 WL 22439685, *4 (N.D. Ill. Oct. 27, 2003) (Wiginton I) ("A party has a duty to preserve evidence over which it had control and 'reasonably knew or could reasonably foresee was material to a potential legal action.'") (citation omitted). The Discovery of ESI: Preservation The Preservation Obligation - Scope Q. What is the scope of the duty? A. A “party or anticipated party must retain all relevant documents (but not multiple identical copies) in existence at the time the duty to preserve attaches, and any relevant documents created thereafter.”4 NO DUTY TO RETAIN EVERYTHING! Balanced against reasonableness and proportionality 4. Zubulake v. UBS Warburg, LLC (Zubulake IV), 220 F.R.D. at 218 (S.D.N.Y. 2003). The Discovery of ESI: Preservation The Preservation Obligation Q. How do I make preservation decisions? 1. 2. 3. 4. 5. Decide what types of data are discoverable and relevant. Identify the sources that contain this data. Determine the accessibility of these sources. Investigate the availability of other sources with this data. Weigh the benefit of the data against the burden of preservation. PRACTICE TIP - If you are the requesting party request with particularity important data in a direct and timely manner. The Discovery of ESI: Preservation Preservation Obligation - Inaccessible Data • A party need not provide ESI that is not reasonably accessible because of undue burden or cost. • Burden on producing party to show inaccessibility. • How do you “identify” these sources? • If burden met, court may still order discovery subject to limitations of 26(b)(2)(C). • Court balances the costs/burdens based on the circumstances of the case.5 PRACTICE TIP - Assert claims on inaccessibility early prior to production to preserve cost-shifting arguments. 5. 2006 Advisory Committee Note to Fed. Rule Civ. P. 26(b)(2). The Discovery of ESI: Preservation The Preservation Obligation - Compliance Q. How do you satisfy the duty to preserve? A. Lots of debate, but the most widely endorsed mechanism is the legal hold: 1. Formalized suspension of routine retention/destruction policies, 2. Designed to ensure that key parties know about preservation efforts, 3. Prevents spoliation! The Discovery of ESI: Preservation Litigation Holds Strictly a creature of case law: • Does not appear in any federal or state statute, nor is it in the Federal Rules of Civil Procedure. • No national electronic discovery or data retention standard though industry-specific regulations often require maintenance of certain records for specified periods of time, unrelated to litigation.6 6. 29 C.F.R. § 1602.14 (“Preservation of Records Made or Kept”); 18 C.F.R. § 125.2(l) (“[I]f a public utility or licensee is involved in pending litigation, complaint procedures, proceedings remanded by the court, or governmental proceedings, it must retain all relevant records.”); 18 U.S.C. § 1519 (Sarbanes-Oxley Act § 802) (“Whoever knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States or any case filed under title 11, or in relation to or contemplation of any such matter or case, shall be fined under this title, imprisoned not more than twenty years, or both.”). Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936 (1996). The Discovery of ESI: Preservation The Preservation Obligation: Litigation Hold Life Span MAINTENANCE 1. 2. 3. 4. Re-issue as needed Remind of ongoing obligations Continue to collect active data Identify and store backup data IMPLEMENTATION 1. 2. 3. 4. 5. TERMINATION Identify & preserve information Draft a written hold Communicate with “key players” Collective active data Identify and store backup data 1. Custodian and data cross check 2. Termination notice 3. Audits to ensure data is not unnecessarily retained MONITORING 1. 2. 3. 4. Ongoing certifications from custodians Penalties for non-compliance Auditing and sampling procedures Designating a hold monitor The Discovery of ESI: Preservation The Preservation Obligation Q. When do I discuss preservation with opposing counsel? A. As soon as possible prior to a 16(b) order. 1. Help prevent waiver of subsequent spoliation claims. 2. Addresses potentially hazardous issues, e.g. production format. 3. Can help you maintain “business as usual.” The Discovery of ESI: Preservation The Preservation Obligation Q. What are some other practices to follow? 1. Be careful when you move potentially discoverable information subject to a preservation duty from accessible to less accessible data stores. 2. You can take steps to minimize the accumulation of inaccessible data, but keep your preservation duty in mind. 3. Encourage communication among your client’s business units. The Discovery of ESI: Preservation The Preservation Obligation: The Debate • Pension Committee v. Banc of America – specific conduct can support a per se finding of gross negligence. • Rimkus Consulting Group Inc. v. Nickie G. Cammarata - judging conduct turns on what is reasonable under the circumstances and must be weighed in proportion to the facts of the case. • Orbit One Communs., Inc. v. Numerex Corp. – expressly rejected both opinions - Until a more precise definition is created by rule, a party is welladvised to “retain all relevant documents (but not multiple identical copies) in existence at the time the duty to preserve attaches.” The Discovery of ESI: The Rule 37 Safe Harbor The “Safe Harbor” Provision – 37(e) • No sanctions for data lost as a result of the “routine, good-faith operation of an electronic information system”.7 • A “routine operation” is an automatic operation, without direct user interaction.8 • You cannot “exploit” these systems to thwart discovery.9 • The Sedona Conference “good-faith” factors.10 7. 2006 Advisory Committee Note to Fed. Rule Civ. P. 37(f). 8. Id. 9. Id. 10. The Sedona Principles: Second Edition: Best Practices Recommendations & Principles for Addressing Electronic Data Production (June 2007 www.thesedonaconference.org), Cmt. 14.d. The Discovery of ESI: Collections – Domestic and Abroad Collection Taking possession of preserved ESI identified as potentially relevant to a particular matter = The Discovery of ESI: Collections – Domestic and Abroad Data Collection Objectives 1. To develop a clear and defensible Data Collection strategy. 2. To securely and accurately collect user created data. 3. Minimize business disruption. 4. Move this collected data to a reviewable form. SEE YOUR MATERIALS: Computer Systems Checklist (Administrator). Don’t forget to do a checklist for individual custodians as well. The Discovery of ESI: Collections – Domestic and Abroad Data Collection Considerations Q. Is the collection for the purposes of litigation or an investigation? A. A forensic collection is recommended. Q. Is this collection for retention purposes? A. A non-forensic image may suffice. Q. Is this collection for business purposes? A. Just making a simply copy may do the trick Q. What type of data are you going to be collecting (i.e. active, archival, backup tapes, metadata, legacy, paper, etc.)? A. Depends – this will impact your methods The Discovery of ESI: Collections – Domestic and Abroad Collection – Complicating Factors • • • • • • Foreign Languages Foreign Sources Compressed Files Encryption Embedded Objects Disparate systems / platforms / file formats • Paper (with hand-written, poorquality, or difficult-to-index information) • Disparate time zones • Your client! BEST PRACTICE TIP: If a client needs to use their device and discovery is limited to a prior time frame, go ahead an get a forensic image of that device immediately. Then you have a pristine copy to help prevent/respond to spoliation claims. The Discovery of ESI: Collections – Domestic and Abroad Looking at the Big Picture • Focus on potentially relevant data NOT the needle in the haystack • Minimizing risk, cost, and impact to “business as usual.” • Forensic specialists are not required but recommended. • What type of collection will you perform? • Keep in mind that preservation efforts may be even broader than collection. NARROWING SCOPE IS KEY!! The Discovery of ESI: Collections – Domestic and Abroad What Type of Collection Will You Perform? • Forensic vs. Non-Forensic • Targeted collections & Remote Collections – Benefits and burdens • Active Files Only • Self-collection – Often performed but not recommended. • Use tools that preserve metadata • Copy Tools (i.e. Robocopy, Upcopy) • Administrative Tools (i.e. Exmerge) The Discovery of ESI: Collections – Domestic and Abroad Non-Forensic Collection - What You Do Get? • You DO capture “system” files. • You DO capture “user-created” files. • You DO get what Windows “sees.” • You DO get A SLOW PROCESS! This may be enough, but… • You DO NOT get slack, unallocated, deleted, or swap space. • You DO NOT necessarily maintain file metadata. Pre-Robcopy (this is the date/time metadata for the original) Post-Robcopy (this is the date/time metadata for the copy) The Discovery of ESI: Collections – Domestic and Abroad Forensic Collection - Imaging • Bit stream imaging - sector-by-sector copy (includes systems files, slack space, unallocated space, etc.) • This process creates an exact copy of the drive • May be physical or logical • Captures active, deleted, altered, and even damaged files • Most useful on workstations/laptops • Requires proper hardware • Requires trained forensic specialist • Creates a “snapshot” of the contents of drive on that particular day • Needed to recover hidden and deleted files ALWAYS RECOMMENDED IN THE LEGAL CONTEXT! The Discovery of ESI: Collections – Domestic and Abroad Remote Collection – Issues • Chain of Custody/Validation • Applets/Network Issues – No clear way to link collected data to a specific piece of media. – Basically a “hacker” technique – Could act like a virus - someone could even use this avenue to inject "evil" code into a user’s device • Ever Changing Evidence – Files may not be able to be “copied” while in use. – Files in use may be changing as the collection is occurring. • Long File Paths – What do you do if the path is > 255 characters? – This is how EnCase Enterprise and EnCase eDiscovery work…some IT admins may not trust this. • Complete Acquisition – You can't confirm that you actually got everything. The Discovery of ESI: Collections – Domestic and Abroad Various Forensics Tools • Forensic Tool Kit (FTK) – Access Data • EnCase – Guidance Software • Paraben Suite of tools • Blacklight 2011 R5 – Black Bag Technologies (Mac) • Oxygen Forensic Suite 2012 (mobile devices) • Password Recovery Tool Kit – Access Data • Active Ports – SmartLine (Network Investigations) MAKE SURE TO ANALYZE YOUR ANALYSIS TECH! The Discovery of ESI: Collections – Domestic and Abroad “Informal” Collection • FRCP 26(b)(1) – Broad scope of discovery • Certain standards that you NEED to consider: 1. Record all hash values of original files/folders at acquisition. 2. Match these values against copied versions. 3. Maintain a detailed log. 4. Engage a third party to maintain a credible source of testimony. YOU ARE SETTING A FOUNDATION FOR ADMISSIBILITY! The Discovery of ESI: Collections – Domestic and Abroad Collection of New Media – Considerations • Make sure to ask about cell phones, iPODs, PDAs, Digital Cameras, GPS devices, websites, etc. • Consider physical and technical characteristics as well as expansion components (i.e. memory cards, external hardware). • Voicemail is not something you can recover from a phone. • Get it ASAP – this type of data is “easily lost” • Social media collections are still in their infancy. You can use printouts – just remember that you are aiming for admissibility. • Remember to account for a custodians web based email accounts. The Discovery of ESI: Collections – Domestic and Abroad Forensic Collection – Analysis and Extraction • • • • • • • • • • • . These steps occur after you have imaged a device. Sort files into more manageable categories View and extract deleted files Streamline information – narrow focus Pinpoint Critical – “Smoking gun” documents Acquire and analyze Cell Phones, PDA’s BlackBerry devices and iPods Recover lost password for many common applications Targeted “keyword” searches Email Specific culling and searching Registry analysis “More of an art than a science” Chain of Custody A chain of custody is the process of validating how a piece of evidence has been gathered, tracked, and protected on its way to a court of law. An unbroken chain of custody shows: • Where data has traveled • Who touched it • What was done to it Chain of Custody WHAT TO EXPECT •DO expect that chain-ofcustody evidence will end up in court. •DO expect the other side will challenge your evidence, its handling and the chain of custody. The Discovery of ESI: Collections – Domestic and Abroad Eight Steps for Helping Establish an Unbroken Chain of Custody 1. 2. 3. 4. 5. 6. 7. 8. 9. Forensic examiners take possession of media. Identifying information is recorded. Forensic image is generated. Hash value taken of the forensic copy. Evidentiary copy is preserved to maintain authenticity. Working copy is made. Evidentiary copy stored in a secure environment. Working copy used for all access. All transfers (even in-house) are documented. The Discovery of ESI: Collections – Domestic and Abroad Admitting & Objecting to ESI • Request Chain of Custody Logs • Argue changes in metadata • Document your process • Find breaks in the chain • Ensure discovery of metadata • Ask about how data is stored. • Request registry files • Could data have been manipulated, altered, replaced or changed? • Vet your experts and vendors The Discovery of ESI: Admissibility in Brief A Quick Note on Admissibility The rules of evidence are not suspended because the matter sought to be admitted is in electronic format, rather than paper. Is the ESI: (1) Relevant, (2) Authentic, (3) Reliable, (4) Non-Hearsay or an exception, (5) acceptable under the Original Evidence Rule, and (6) more probative than prejudicial. A “MUST READ” CASE: Lorraine v. Markel American Insurance Co., 2007 241 F.R.D. 534, U.S. Dist. LEXIS 33020 (D. Md. May 4, 2007). The Discovery of ESI: Collections – Domestic and Abroad How to Chain of Custody Issues You will typically face a 2-pronged attack with regards to chain of custody issues: 1. What is your process? 2. Did you follow your process? The Discovery of ESI: Collections – Domestic and Abroad What is Your Process? When this prong the process comes under attack what do you need to answer? 1. 2. 3. 4. 5. 6. 7. What do you do? How do you do it? Who keeps custody the evidence? Where and how is it kept? Is it stored in a locked container? Can the data be altered? Can you prove the data has not been altered in your custody? What changes are made to your data during your process? The Discovery of ESI: Collections – Domestic and Abroad How to Defend Against Prong 1 of the Attack? • Establish a standard operating procedure. • Do the exact same thing each time you affect a collection. • Establish a clearly delineated workflow. – Who does What. • Assign evidence handling responsibilities only to certain limited evidence custodians. • Use court challenged industry standard tools and procedures. The Discovery of ESI: Collections – Domestic and Abroad Did You Follow Your Process? Use a Chain of Custody Form • Confirms that evidence was not altered • Follows the evidence during the entire data gathering lifecycle • Describes who handled the evidence and why • Must be kept and available for review Have Documented Procedures (i.e. escalation, retention, disaster recovery, etc.) The Discovery of ESI: Collections – Domestic and Abroad How to Defend Against Prong 2 of the Attack? • Repeat your successes, do the same thing, each and every time. • Maintain your chain of custody throughout the lifecycle of the case or litigation. • Keep the evidence stored securely with very limited access. AND IF YOU DON’T FOLLOW THESE STEPS… The Discovery of ESI: Collections – Domestic and Abroad Keep detailed documentation throughout the collections process: • • • • Computer Systems Checklist (Administrator) Computer Systems Checklist (Employee) Chain of Custody Forms Media Intake Reports and Tracking The Discovery of ESI: Collections – Domestic and Abroad DISCOVERY OF CLOUD DATA ORIGINATING OUTSIDE U.S Privacy Laws, Data Protection Laws and Blocking Statues may impede discovery – Server locations may be an issue. See, Columbia Pictures v. Bunnell (data with company in Netherlands but servers in U.S.) • Germany: DPA of Schleswig-Holstein announced sending data to Cloud violates German Data Privacy Act, unless servers are within borders of Germany The Discovery of ESI: Collections – Domestic and Abroad DISCOVERY OF CLOUD DATA ORIGINATING OUTSIDE U.S How to collect data from the Provider? • Does the SLA provide for collection methods and timing? Examples: format (Native vs. TIFF), metadata preservation • Identification of data and search modalities • Where will the review be conducted? Restrictions apply to unfiltered personal data in the European Union and elsewhere. • Evidentiary Issues: Foundation for ESI The Discovery of ESI: Collections – Domestic and Abroad ADDITIONAL CONCERNS • Complex pre-trial discovery slows down the case • Judges frequently have outdated equipment, reduced staff and little real-world experience with ESI • “The technology of the digital revolution is forbidding to most lawyers, who after all went to law school because they could not do math or science.” Goode, Steven, The Admissibility of Electronic Evidence, 29 Rev. Litig. 1 (2009) • Most lawyers as a result, DO NOT ADEQUATELY EDUCATE THE COURT; they do not give the court the basis for favorable rulings. The Discovery of ESI: Collections – Domestic and Abroad NOW WHAT? PRACTICAL ACTION LIST Plan Prior to Collection: 1. 2. 3. 4. 5. 6. 7. 8. 9. What is needed? Where is it (Cloud? Servers? Laptops?) Is it Protected? Are there Data Protection Agreements? What are the language issues? Permissions/notifications needed? Is it here already and if so, is onward transfer permitted? Where should the review be established? What are the protocols needed for on-site initial review? The Discovery of ESI: Collections – Domestic and Abroad ASSEMBLE THE COLLECTION TEAM • Client representatives in U.S. and host country; local counsel; experienced cross-border discovery U.S. outside counsel; third-party consultant • Make the process defensible here and in the host country: – Local counsel should advise whether local data protection authority requires permission, notice, or neither – There will usually be some risk but, with adequate protocols and documentation of process, it can be reduced to an acceptable level The Discovery of ESI: A Quick Peek at the Costs Riskiest Area Costliest Area 15% of Cost Processing 25% of Cost Preservation Information Managemen t Review Identification Production Presentation Collection Analysis Planning Electronic Discovery Reference Model / © 2009 / edrm.net 60% of Cost Execution The Discovery of ESI: Best Practices & Cost Cutting Throughout the Process Culling Data Prior to Review Set boundaries to narrow scope: • Have limits been agreed to by the parties? • Can you start with a sample? • Can you test a handful of custodians to gain a better understanding of the volume and data types you can expect? • Can you eliminate certain file types? • Can you eliminate certain groups of employees? • Can you identify a defensible date range? NOTE: These boundaries can help narrow collection as well as review BUT keep in mind that preservation still applies. The Discovery of ESI: Processing The Processing Stage The Steps of Processing 1. Document extraction 2. Dealing with metadata 3. Deduplication a. Types i. Global ii. Custodian b. Near Deduplication 4. Data Culling The Discovery of ESI: Processing The Processing Stage Best Practices for Dealing with Backup Tapes • Gain a firm understanding of your client’s data retention policy. • Find the data elsewhere. • Sampling: Searching a small collection of sources for relevant information before the resources are expended to collect, review and produce. The Discovery of ESI: Processing The Processing Stage How to Keep Tabs on Data Processing? REPORTS!! 1. 2. 3. 4. 5. 6. Media Reports Custodian Reports Chain of Custody Documentation Data Culling Reports Error/Exceptions Reports Status Reports The Discovery of ESI: Processing The Processing Stage Native Review vs. TIFF Review Cut unnecessary TIFFing costs View hidden data Review faster Redact and endorse Preferred by regulatory bodies Create static images The Discovery of ESI: Processing Processing – Collection to Production 1. DeNISTing - Removal of systems files and other unusable file types 2. Pre-Processing - Deduplication, date filtering, key terms 3. Native Processing for Review - Process resultant set for native review 4. Production Processing - Only TIFF, redact, and endorse responsive set. The Discovery of ESI: Processing Example of Cumulative Effect of Successive Reductions in Volume Process Original Volume % Savings GB Savings Volume Left to Examine (GB) 500 -- -- De-NISTing (removing system files) Duplicate Consolidation Email Threading 20% 100 400 40% 160 240 30% 72 168 Domain Name Analysis Predictive Coding 60% 101 67 50% 38 39 92.2% 453 39 (just 7.8% of original) Overall Reduction The Discovery of ESI: Review & Analysis State of Search and Retrieval Today • Where were once were – the Papyrus Age. • Legal professionals are used to many search and retrieval technologies (this is good & bad): – Google, Yahoo, and other search engines – LexisNexis and Westlaw – PACER – De-duplication (LAW, Extractiva, Trident, Equivio) • Keyword searching is the most common search technique for analysis, ECA, and culling. The Discovery of ESI: Review & Analysis Trends in Advanced Search Methodology – Artificial Intelligence & Machine Learning – Automated Review: • Predictive Coding – Concept Searching – Categorization: • Taxonomies/Ontologies – Probabilistic Models – Mathematical Methods: • Latent Semantic Indexing (LSI) – Relationship Forensics – Email Analytics The Discovery of ESI: The First Step in Search and Retrieval: Indexing • An index gives you the ability to search a particular set of data or documents. • An index is built from extracted text and/or OCR. – Extracted text – native files. • NOTE: Non-searchable PDFs require OCR. – Optical Character Recognition (OCR) – image based files. • 80%-85% accuracy depending on file quality. • Your ability to search is only as good as your index. Garbage In = Garbage Out. – Files may be processed but not indexed. • Different technologies index in different ways. The Discovery of ESI: Optimizing an Index for Searching • Know your technology. – Searching functionality, and – Internal network limitations. • • • Know your data. OCR / Extracted Text = .txt files. To QC your index for exceptions: – Compare .txt files against total documents for document level extraction, or – Compare .txt files against page count for page level extraction. • • • Run a search on empty text fields. Different indexes are required for different functionality e.g. keyword index, DT index, concept index. When indexing a concept index, filter the data to remove any “noise” (e.g. remove email headers, poor OCR, standard language, and footer information, etc.). The Discovery of ESI: Keyword Searching • Keyword searching is set-based searching using simple words and word combinations, with or without Boolean and related operators. • Traditional approach accepted by and often ordered by the courts. The Discovery of ESI: Keyword Searching • Boolean Searching Basics: – Attempts to mimic how humans use language. – Results match terms and parameters exactly. – Common Operators: • • • • • • • OR – expands the resultant set. AND – restricts the resultant set. NOT (BUT NOT, AND NOT) – eliminates ambiguity. ( ) – forces order and creates flexibility. W/ - increases the accuracy of results. “ ” – phrase searching. Wildcards, e.g. ?, ! or * - widens or restricts a search through “stemming.” • “Fuzzy” Searching – Reduces words to their root and then matches up word forms. – Similar to “stemming” in Boolean Searching. The Discovery of ESI: The Benefits of Keywords • Works very well when you know exactly what language you want to find (e.g. individual names, dates, complex IP cases, deal names). • Helps you cut costs and support cost-shifting arguments. • Readily accepted by the courts and conducive to agreement by opposing counsel. “It is universally acknowledged that keyword searches are useful tools for search and retrieval of ESI…” • The Hon. Paul W. Grimm, Magistrate Judge for the United States District Court for the District of Maryland in Victor Stanley, Inc. v. Creative Pipe, Inc (2008). The Discovery of ESI: The Problems with Keywords • Depends on lawyers having to think of all the ways language was used. – THE KEYWORD GAME – Raises issues with: • • • • Culture Geography Lexicon Knowledge-base • Words are easily mizspelled. The Discovery of ESI: The Problems with Keywords Let’s review the following forms of ambiguity: • Lexical Ambiguity – Lie, Note, Fish • Structural Ambiguity – Kids make nutritious snacks. – Put the box on the table by the window in the kitchen. • Polysemy – Bake vs. Bake • Denotation, Connotation, Implication • Tropes – Metaphor, Allegory, Homonym, Paradox, Irony The Discovery of ESI: The Problems with Keywords • Language is ambiguous. “Simple keyword searches end up being both over and under-inclusive in light of the inherent malleability and ambiguity of spoken and written English.” • The Hon. Paul W. Grimm, Magistrate Judge for the United States District Court for the District of Columbia in Victor Stanley, Inc. v. Creative Pipe, Inc. (2008) (citing the Sedona Conference Best Practices Commentary on the Use of Search and Retrieval Methods in E-Discovery (2007)). – Keyword searches do not account for context. • OVER-INCLUSIVE results – Keyword searches do not account for multiple words defining a particular concept. • UNDER-INCLUSIVE results The Discovery of ESI: Keywords – What Jurists Think “For lawyers and judges to dare opine that a certain search term or terms would be more likely to produce information than the terms that were used is truly to go where angles fear to tread.” “This topic is clearly beyond the ken of a layman and requires that any such conclusion be based on evidence that, for example, meets the criteria of Rule 702.” • The Hon. John M. Facciola, Magistrate Judge for the United States District Court for the District of Columbia in United States v. O’Keefe (2008). Contrast: U.S. District Judge Ann Montgomery’s approach in In re: Zurn Pex Plumbing Products (June 2009). Keywords – What Jurists Think “…all keyword searches are not created equal.” “…there are well know limitations and risks associated with [keywords], and proper selection and implementation involves technical, if not scientific knowledge.” “Selection of the appropriate search and information retrieval technique requires careful advance planning by persons qualified to design effective search methodology.” “…the methodology should be tested for quality assurance.” “…the party selecting the methodology must be prepared to explain the rationale for the method chosen to the court, demonstrate that it is appropriate for the task, and show that it was properly implemented.” • Magistrate Judge Paul W. Grimm in Victor Stanley (2008). Keywords – What Jurists Think “This Opinion should serve as a wake-up call to the Bar…about the need for careful thought, quality control, testing and cooperation with opposing counsel in designing search terms or “keywords” to be used to produce emails or other electronically stored information...” • The Hon. Andrew J. Peck, Magistrate Judge for the United States District Court for the Southern District of New York in William A. Gross Construction Assoc. v. American Manufactures Mutual Insurance Co. (2009). The Discovery of ESI: 10 steps to UNDERSTANDing How to Craft Effective & Defensible Keyword Searches 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Understand the capabilities/limitations of tech. Narrow the scope through filtering/de-duplication. Design around ambiguity. Engage key players. Review methods and terms with opposing counsel. Study the request for production. Test your results. Analyze hits. Non-hits should be sampled. Define new queries and test again. The Discovery of ESI: Trends in Search Methodology • The move towards alternative methods. • Generally, courts are looking into the mechanics of eDiscovery. • Courts are refusing to compel productions where requesting party cannot justify search terms. – Seger v. Ernest Spencer, Inc. (D. Neb. Jan. 26, 2010). – Bellinger v. Astrue (E.D.N.Y. Apr. 1, 2010). – Sanctions issued in Edelen v. Campbell Soup Co. (N.D. Ga. 2010) for party’s failure to “reasonably narrow” request through search terms. • Specifically, courts are steering clear of getting involved in search methodology. – Eurand, Inc. v. Mylan Pharms., Inc. (D. Del. Apr. 13, 2010). The Discovery of ESI: How Would You Respond? Imagine your are a librarian. I come into the library with a big smile and a readiness to dive into the stacks. As I approach your desk you ask, “how may I help you today sir?” I reply: “BOOK” The Discovery of ESI: How Would You Respond? A more defined response: “I am looking for a non-fiction book that addresses the various factors that John F. Kennedy and EXCOMM considered during the Cuban Missile Crisis in 1962.” The Discovery of ESI: Concept Searching • Concept Searching uses various technologies to understand the meanings and relationships of words in a dataset and classify data according to a “concept” or retrieve information that is conceptually similar to text submitted in a query. The Discovery of ESI: 12 Benefits of Concept Searching 1. Results are based on relevancy instead of specific keywords or metadata. 2. Increases review speed by breaking from the linear tradition. 3. Allows users to find information without knowing exactly how to phrase a query. 4. Increases ability to quickly learn about a case. 5. Finds documents with terms that may not have been selected as keywords. 6. Equalizes the keyword “game.” 7. Reduces the risk of overlooking documents not found by traditional methods. 8. Identifies “code” words or other novel or non-traditional uses of language. 9. Pin-points similar documents once you find a particularly “hot” document. 10. Excludes “noise” effectively. 11. “Dumbs-down” the complexity of a particular lexicon. 12. Allows you to prioritize documents and optimize the skills of litigators. The Discovery of ESI: Concept Searching – Concerns • Newness = Uncertainty • I’m a legal professional not a mathematician! • Will judges accept it? – Prove your methods/offer up your processes. – Show that it is reasonable. – Judges like efficiency – so make it efficient. • NOTE: Judge Grimm endorsed the Sedona Conference Cooperation Proclamation in Mancia v. Mayflower Textile Services Co. (Oct. 15, 2008). • We aren’t going to see all the documents. The Discovery of ESI: Alternate Methods of Search and Retrieval: “Concept” Search • Clustering – Retrieves documents based on the statistical relationships between the words they contain and forms concept clusters. • Thesauri, Taxonomies & Ontologies – Relies on commercially available data or specifically compiled information. • Bayesian Classifiers – Uses probability theory to categorize documents according to word “value.” • Machine-Learning Approaches – Uses various models to determine the correlations between words. Techniques include Latent Semantic Indexing. The Discovery of ESI: Latent Semantic Indexing (LSI) • A method of information retrieval that relies on sophisticated mathematics as opposed to ancillary linguistic references. • Overcomes issues with synonymy and polysemy. • LSI allows a tool to “learn” both the language and the conceptual nature of a document by first processing a “training set.” • The “training set” creates the concept space in which all other documents are mapped. The Discovery of ESI: Latent Semantic Indexing (LSI) • The concept space can represent hundreds of dimensions. • All other documents are mapped into this space. • Documents that are closer together in the space are more conceptually similar. The Discovery of ESI: Search Index vs. Categorization Index • Search Index – Machine Defined – – – – Maps each document permanently into the concept space. Larger disk and RAM footprint. Takes longer to build. Can be done with little to no knowledge of the case. The Discovery of ESI: Search Index vs. Categorization Index • Categorization Index – User Defined – Only exemplars are mapped permanently into the concept space. – When a data set is Categorized, each document is temporarily mapped with the closest exemplar creating the categorical designator. – Requires knowledge of the case because you must choose the exemplars. – Requires a much smaller RAM footprint and less RAM to be loaded into memory. – Can be run on very large data volumes quickly. The Discovery of ESI: Using Concept Search to Categorize • Clustering – No user input is required to determine the organizational structure or define categories. – Beneficial if you know little about your dataset. – The technology inspects the spatial relationships of all documents within the index. – Algorithms are used to identify sensible groupings. – The groupings are labeled to facilitate understanding of each category. – All documents are clustered once. The Discovery of ESI: Using Concept Search to Categorize • Categorization – Requires upfront user input to achieve a much more focused result. This user input may consist of: • A specifically created taxonomy. • Selecting exemplar documents to define categories. – Categorization is a break from the linear review model. – Proven to increase the efficiency of a review. – Documents can be placed into multiple categories as opposed to Clustering. – Beneficial if you: • • • • know the categories of interest, know what you want to title the categories, have definitive exemplars, and have large amounts of data to auto-categorize once you define the categories. The Discovery of ESI: 12 Tips for Choosing a Conceptual Searching Technology 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Result items should be relevant to the information expressed by the concepts contained in the query not on the specific terminology used. Results are sorted and ranked by relevance. Relevant result items should be quickly located and displayed regardless of complexity. Query length is key. A sentence, a paragraph or even an entire document can be submitted as a query. A concept query should be generated using natural language and not require any special or complex syntax. Combining queries using concepts, keywords and other filters should be allowed. Relevant portions of result items should be usable as query text simply by selecting that text. Query-ready indexes should be created quickly. The search engine should be capable of performing concept queries across data sources, the results of which are then merged, sorted and displayed (i.e. federated search). Misspelled words, typographical errors or OCR scanning errors in either the query text or in the text of the searchable dataset should not impact the concept query. Know your vendor. Demo the technology on your own data. The Discovery of ESI: How Concept Searching Can Cut Costs • Spend money upfront to save it downstream. – Remember the difference in cost of storage/cost of review. • Use it as a preliminary assessment tool. • Prioritize hourly rates. • Limit your search to narrow the scope of discovery: – Key custodians – Key dates – Key issues • Uncover custodian relationships which can help eliminate unnecessary review, evaluate preservation obligations and eliminate unnecessarily burdensome litigation holds. The Discovery of ESI: Concept Search – What Jurists Think “…concept searching, as opposed to keyword searching, is more efficient and more likely to produce the most comprehensive results.” • The Hon. John M. Facciola, Magistrate Judge for the United States District Court for the District of Columbia in Disability Rights Council of Greater Wash. v. Wash. Metro. Area Transit Auth. (2007). The Discovery of ESI: Concept Search – Other Thoughts “A party that uses advanced analytical software applications and linguistics tools in screening for privilege and work product may be found to have taken “reasonable steps” to prevent inadvertent disclosure.” Explanatory Note to FRE 502 The Discovery of ESI: Keywords are Not Obsolete: Leveraging Multiple Methodologies • Concepts are essentially groups of keywords. • Look for a tool that allows you to leverage multiple search methods. • Employing multiple search methodologies is proven to be the most effective approach. Source: http://ralphlosey.files.wordpress.com/2009/03/jasonbaronpptlegaltrec.jpg The Discovery of ESI: Building a Process is Key • Think of process as another “tool.” • Building a process around your search methodology promotes: – – – – Consistency, Reliability, Predictability, and ultimately, DEFENSIBILITY. • Make sure everything is documented. Remember Qualcomm! • Case after case shows parties in trouble for failure to craft a viable search strategy (e.g. Victor Stanley, Rhoads Indus., Inc., etc.). – Ex. Basic Concept Search Process: Analyze Case Index Data Build Categories Select Exemplars Review Results Test Results Revise Exemplars The Discovery of ESI: Production Production Formats - 34(b) • Rule 34(b) provides for a party to request the “form or forms” in which electronically stored information is to be produced. • Procedure: A party requests a particular format. Producing party complies or has 30 days to object. If producing party objects, it states the form(s) in which it intends to produce. If requesting party objects, the parties must meet and confer prior to filing a motion to compel. If no form is requested then a producing party must “produce the information in form or forms in which it is ordinarily maintained or in a form or forms that are reasonably usable.” The Discovery of ESI: Production Production Formats - 34(b) – Key Points 1. Knowing your client’s “information ecosystem” gives you the advantage. 2. The production of metadata is NOT mandated. 3. Be prepared to produce in the format you request. 4. Only agree to a native production when there is a clear rationale. 5. Be as specific as possible and request information to prove compliance with Rule 34(b)(2)(E). The Discovery of ESI: Production Production Formats: “Reasonably Usable” or “Ordinarily Maintained” • You can convert to various formats. • Producing ESI in an electronic format is not mandated. - Is it “reasonably usable” – The Scotts Co. v. Liberty Mutual Ins. Co. (S.D. Ohio June 12, 2007). • However, you cannot convert to a format that impairs a party’s ability to use the ESI. • Metadata stripping for purposes of litigation can be problematic under Rule 34(b). - In Re Payment Card Interchange Fee and Merchant Discount Antitrust Litig., 2007 WL 121426 (E.D.N.Y. Jan. 12, 2007). The Discovery of ESI: Production Producing Metadata - Generally KEY POINTS: 1. Courts usually order production when metadata is requested in initial requests and no production has occurred in any form. 2. Later requests are often denied if productions have been made and a request is not timely. Metadata cases are very fact specific and courts often reject overly broad requests for more tailored approaches: In re Seroqual Prod. Liab. Litig., Slip Copy, 2007 WL 219989 (M.D. Fla. Jan. 26, 2007). Dahl v. Bain Capital Partners, LLC, 2009 U.S. Dist. LEXIS 52551 (D. Mass. Jun. 22, 2009. NOTE: The trend is to produce spreadsheets natively. The Discovery of ESI: Production The Standards for Producing Metadata The Discovery of ESI: Privileged Data & Work Product Handling Privileged Data / Work Product • Large amount of risk when dealing with ESI – increased costs. • Inadvertent Production – The FRCP 26(b)(5) “claw back” procedure. • Incorporate agreements into a 16(b) scheduling order. • FRE 502. • Metadata can contain privileged material. PRACTICE TIP – Provide notice of a claim of privilege in writing and as promptly as possible. The Discovery of ESI: Deal with it Early! Dealing with ESI Early • Rule 16(b) – Scheduling Conference • Allows the courts to set rules around disclosure, privilege and other eDiscovery issues prior to discovery. • The intent is to streamline the process, but in in essence it puts the burden on counsel. • Rule 26(f) – Pretrial Conference • Think of this as a PROCESS The Discovery of ESI: The Meet & Confer Process “Meet & Confer” - 26(f) Q. When does the “Meet & Confer” take place? A. ASAP! Or at least 21 days before FRCP 16(b) conference/order. Q. What is discussed at the “Meet & Confer”? A. The following should be discussed at the “Meet & Confer”: • • • • • • ANY issues related to ESI – 26(f)(3); Preservation issues; Production formats – 26(f)(3); “Claw back” procedures; Best Practices in general; Cost allocation The Discovery of ESI: The Meet & Confer Process Duty to Preserve Zubulake Complaint Served 26(f) Ticking Day 1 Assess information ecosystem Begin preservation efforts Determine the scope of the matter Devise a budget Determine case plan/workflow Meet and Confer 21 Days Prior to 16(b) Scheduling Conference Within 120 Days of Complaint Day 120 Conduct all discovery tasks Collection Processing Review & Analysis Production FRCP 16, 26(b)(2)(B), 26(b)(5)(B), 26(f), 33, 34, 37, 45 & Form 35 NY Uniform Rules 202.12(c)(3), 202.10(b), 202.70(g) The Discovery of ESI: The Meet & Confer Process “Meet & Confer” - 26(f) DON’T BE AFRAID OF THE CHECKLIST SEE YOUR MATERIALS: CDS Meet and Confer Checklist The Discovery of ESI: Best Practices & Cost Cutting Throughout the Process Riskiest Area Costliest Area 15% of Cost Processing 25% of Cost Preservation Information Managemen t Review Identification Production Presentation Collection Analysis Planning Electronic Discovery Reference Model / © 2009 / edrm.net 60% of Cost Execution The Discovery of ESI: Best Practices & Cost Cutting Throughout the Process eDiscovery Costs Again: 10 Tips to Control Costs - $$$ 1. Take control early. 2. Reduce the scope. 3. Try a phased approach 4. Set clear budgets and objectives. 5. Use standardized protocols 6. Review natively whenever possible. 7. Optimize your review using technology. 8. Use metrics. 9. Identify hidden costs. 10.MEET-and-CONFER The Discovery of ESI: Predictions What to Expect in 2012 THANK YOU!! FOR ANY FOLLOW-UP QUESTIONS PLEASE CONTACT: Matthew F. Knouff / General Counsel / eDiscovery Attorney Complete Discovery Source, Inc. / Electronic Discovery Solutions (212) 813-7006 – Direct / (646) 660-4313 - Mobile 345 Park Avenue / New York, NY 10154 mknouff@cdslegal.com / mywork3@cdslegal.com