eDiscovery around the globe

advertisement
Financial institutions
Energy
Infrastructure, mining and commodities
Transport
Technology and innovation
Life sciences and healthcare
eDiscovery around the globe
Dear friends:
Welcome to Norton Rose Fulbright’s Global eDiscovery 2015 white paper. As a global legal practice
representing clients in disputes across the world, we recognize that it’s important for litigators to
understand how discovery impacts cases both at home and abroad.
The articles in this collection address four different aspects of discovery: mobile devices, the cloud,
cross-border discovery, and preservation.
•
The firstRose
article addresses
the growing trend toward using mobile devices in discovery procedures
Norton
Fulbright
and the unique challenges and burdens parties face when attempting to preserve and collect that
digital information.
Norton Rose Fulbright is a global legal practice. We provide the world’s preeminent
•
The second article addresses the preservation and collection of data in the cloud and how those
corporations and financial institutions with a full business law service. We have more than
practices
change
from
jurisdiction
tothan
jurisdiction.
3800
lawyers and
other legal
staff
based in more
50 cities across Europe, the United
States, Canada, Latin America, Asia, Australia, Africa, the Middle East and Central Asia.
• The third article examines the practical ways to address cross-border discovery from four different
Recognized
for our industry
focus,
are strong across
all the keyand
industry
sectors:solutions
financial for processing and
perspectives,
focusing
onweextrajudicial
discovery
practical
institutions;
energy;
infrastructure,
mining
and
commodities;
transport;
technology
and
transferring data to be used in litigation.
innovation; and life sciences and healthcare.
• The fourth article addresses the question of whether a party may rely on its employees as the
Wherever we are, we operate in accordance with our global business principles of quality,
primary tools to conduct preservation and when that may not be reasonable.
unity and integrity. We aim to provide the highest possible standard of legal service in each of
our offices and to maintain that level of quality at every point of contact.
We hope that considering these discovery issues from a global perspective will not only help you
solve
in your
individual
butLLP,
willNorton
give Rose
you valuable
information to help you manage
Nortonproblems
Rose Fulbright
US LLP,
Norton Rosecases
Fulbright
Fulbright Australia,
Nortonglobal
Rose Fulbright
Canada
LLP and Norton Rose Fulbright South Africa Inc are separate
your
litigation
portfolio.
legal entities and all of them are members of Norton Rose Fulbright Verein, a Swiss verein.
Norton
Rose Fulbright Verein helps coordinate the activities of the members but does not
Best
regards,
itself provide legal services to clients.
David J. Kessler
Chair, e-Discovery and Information Governance Practice Group
More than 50 locations, including Houston, New York, London,
Toronto, Hong Kong, Singapore, Sydney, Johannesburg and Dubai.
Attorney advertising
References to ‘Norton Rose Fulbright’, ‘the law firm’, and ‘legal practice’ are to one or more of the Norton Rose Fulbright members or to one of their
respective affiliates (together ‘Norton Rose Fulbright entity/entities’). The principal office of Norton Rose Fulbright US LLP in Texas is in Houston.
Save that exclusively for the purposes of compliance with US bar rules, where James W. Repass will be responsible for the content of this publication,
no individual who is a member, partner, shareholder, director, employee or consultant of, in or to any Norton Rose Fulbright entity (whether or not
eDiscovery around the globe
A Norton Rose Fulbright white paper
December 2015
Global contributors
If you would like further information, please contact
David Kessler, chair of the e-Discovery practice.
United States
Canada
David Kessler
Partner, New York
Tel +1 212 318 3382
david.kessler@nortonrosefulbright.com
Christine Carron
Senior Partner, Montreal
Tel +1 514 847 4404
christine.carron@nortonrosefulbright.com
Andrea D’Ambra
Senior Counsel, New York
Tel +1 212 318 3015
andrea.dambra@nortonrosefulbright.com
Kelly Moffet-Burima
Associate, Calgary
Tel +1 403 267 8215
kelly.moffet-burima@nortonrosefulbright.com
Alex Altman
Associate, New York
Tel +1 212 318 3230
alex.altman@nortonrosefulbright.com
Sojourner King
E-Discovery Counsel
Tel +1 416 216 2327
sojourner.king@nortonrosefulbright.com
Australia
Europe
Grant Bonner
Partner, Sydney
Tel +61 2 9330 8382
grant.bonner@nortonrosefulbright.com
Peter Scott
Partner, London
Tel +44 20 7444 3834
peter.scott@nortonrosefulbright.com
Abigail McGregor
Partner, Melbourne
Tel +61 3 8686 6632
abigail.mcgregor@nortonrosefulbright.com
Marta Giner
Partner, Paris
Tel +33 1 56 59 52 72
marta.ginerasins@nortonrosefulbright.com
Carolyn Wyatt
National Applied Legal Technology
Operations Manager
Tel +61 8 6212 3229
carolyn.wyatt@nortonrosefulbright.com
Michel Pflieger
Associate, Paris
Tel +33 1 56 59 52 74
michel.pflieger@nortonrosefulbright.com
Contents
Global key contact page
04
Chapter 1: Discovery and mobile devices
06
Chapter 2: Discovery in the cloud
14
Chapter 3: What are the intricacies of
cross-border discovery?
20
Chapter 4: Is it reasonable to rely on
employees to preserve documents?
25
Chapter 1
Discovery and mobile devices
With the explosion in mobile data usage, we expect to see a
growth in discovery from mobile devices in civil litigation.
01
Discovery and mobile devices
According to Cisco Systems, global mobile data traffic is expected to quadruple in
the next three years, from 2.6 to 10.8 exabytes per month.1 For most companies, it
is expected that some, most, or all work will be conducted over a mobile device that
may be owned by the company or an employee. With this explosion in mobile data
usage, we expect to see a growth in discovery from mobile devices in civil litigation.
Mobile devices, however, present unique challenges and increased burdens for parties
attempting to preserve and collect information.
What are “mobile devices”?
In short, a mobile device is any portable electronic device
capable of communicating data through a mobile network.
The most commonly thought of mobile devices are cell
phones, smartphones, e-readers, and tablets (e.g., iPads).
However, the oldest and most common mobile device is the
laptop. Furthermore, many companies have customized
mobile devices that have been developed for their businesses,
such as portable barcode scanners and pipe-testing
equipment. Moreover, a new generation of mobile devices (socalled “wearables”) is coming of age and will exponentially
increase the volume of mobile data traffic and potential data
stores. Wearables include Google Glass, the Apple Watch
and FitBit. Whatever the format, each of these devices is
capable of storing and transmitting data that may be
relevant to litigation. It is important, therefore, to
understand how current laws are equipped to manage
discovery for mobile devices.
The United States perspective
I. Are mobile devices even discoverable?
Yes. There is no special exclusion for data generated from
or stored on mobile devices under U.S. discovery law.
Even where the data on mobile devices may be considered
ephemeral that does not per se exclude the data from
discovery.2 That does not, however, mean that litigants must
preserve, collect, and produce all data on mobile devices used
by their employees. To determine the extent of its discovery
duties, a party needs to consider three sub-questions:
1
Cisco VNI Global Mobile Data Traffic Forecast, 2013 – 2018 (available at http://www.
cisco.com/c/en/us/ solutions/collateral/service-provider/visual-networking- index-vni/
white_paper_c11-520862.html). To illustrate the scope of this figure, an exabyte is equal to
1 billion gigabytes (GB) of data, or more than 75 trillion pages of text.
2
See, e.g., Columbia Pictures v. Bunell, 245 F.R.D. 443, 447 (C.D. Cal. 2007) (holding that
server logs stored on a computer’s RAM were properly discoverable because “Rule 34
requires no greater degree of permanency from a medium than that which makes obtaining
the data possible.”).
1. Is there unique, relevant information on the mobile device?
2. Is the mobile device (or the specific data at issue) in the
possession, custody and control of the party?
3. Would discovery of the mobile device data be reasonable
and proportionate?
Like any other data source, a mobile device only need enter
the fray of discovery if it contains relevant information. Thus,
before needlessly expending time and resources to preserve
and collect mobile device data, it is usually wise to conduct
a prompt investigation to determine whether information on
the device will actually matter. That being said, as mobile
devices become a dominant tool in business, it will become
harder and harder to avoid conducting discovery on them.
II. Whose iPad is this, really?
Whether a party must preserve or produce data from a mobile
device in a given litigation often will turn on Fed. R. Civ. P.
34(a)(1), which states that a party to litigation may request
discovery of information that is “in the responding party’s
possession, custody, or control.” There is little doubt that
a party may be compelled to produce data from a mobile
device, or even a device itself, when the party has actual
possession of the relevant device.3
The law is murkier, however, when a company does not have
physical possession of the mobile device. At present, there
are two standards for Rule 34 “control” in Federal Courts: (1)
the “Legal Right” test4; and (2) the increasingly prominent
“Practical Ability” test.5
3
See, e.g., Bailey v. Scoutware, LLC, No. 12–10281, 2014 WL 1118372 (E.D. Mich. Mar.
21, 2014) (holding that plaintiff could forensically inspect defendant’s cellphone after
defendant already undertook such an inspection).
4
See, e.g., DL v. District of Columbia, 251 F.R.D. 38, 46 (D.D.C. 2008) (“[I]t has been well
established that the test for control is not defined as mere possession, but as the legal right
to obtain such documents on demand”).
5
See, e.g., Bank of New York v. Meridien BIAO Bank Tanzania Ltd., 171 F.R.D. 135, 146
(S.D.N.Y. 1997) (“[D]ocuments are considered to be under a party’s control when that
party has the right, authority, or practical ability to obtain the documents from a
non-party to the action.”).
Norton Rose Fulbright – December 2015 07
eDiscovery around the globe
Under the “Legal Right” test, a company would be obligated
to preserve and produce data from a mobile device only to
the extent that it has the legal right to demand such data.
For example, an employee may agree to allow retrieval of
litigation-related data as a pre-condition of the company
placing its data on the employee’s personal device (a classic
reason for a bring-your-own-device, or “BYOD” policy). Under
the broader “Practical Ability” test, on the other hand, a court
may require a party to produce data from mobile devices
outside the possession of the party if the court believes that
the party simply has the means to request or obtain the
relevant data from the individual with direct possession.
Certain judges have commented that if employees have used
mobile devices for work, even without authorization and
against specific prohibition, an employer still has “possession,
custody, or control” over the data because the employer can
always fire the employee if he or she will not turn over the
mobile device.
III. Why can’t my opponent just go to the provider?
When considering the relative control that a responding party
and its mobile service providers have over data from a mobile
device, a company may wish to argue that a requesting party
should simply obtain certain forms of data (particularly text
messages) directly from the service provider through a Rule
45 subpoena. This approach is not likely to succeed. First, not
all relevant data will be in the control of the service provider.
Unique photos, voice recordings and other files may exist only
on the device itself. Second, even for data that may be stored
by a service provider – such as text messages and personal
email – most courts will not make an opposing party subpoena
a third party when a party to the dispute has possession or
control of the data. Third, even if a court required such a
subpoena, it would be doomed absent the consent of the
account owner, given the limitations imposed by the Stored
Communications Act (18 U.S.C. § 2701, et seq.) (“SCA”). The
SCA prohibits a service provider (e.g., a telecommunications
carrier) from disclosing to any person or entity the contents of
an electronically stored communication while in storage by
that service provider. However, because a service provider may
disclose the communications with authorization of the service
subscriber, courts have ordered litigants to grant authority to
mobile service providers to disclose their mobile data when
such data is relevant and not stored in the mobile device
any longer.6
6
See, e.g., Flagg v. City of Detroit, 252 F.R.D. 346, 355 (E.D. Mich. 2008) (holding that the SCA
did not alleviate defendant of the duty to produce text messages because it could “permit
the disclosure of [archived text messages] by granting its consent. This acknowledged power
readily qualifies as a ‘legal right to obtain’ the messages held by [the service provider], and
hence constitutes ‘control’ within the meaning of Rule 34(a)(1).”).
08 Norton Rose Fulbright – December 2015
IV. How easy is it to produce data from a mobile device?
Despite the ease of use and ubiquity of mobile devices,
preserving and collecting data from such devices can be a
complicated affair. One commentator has observed that “in
the text message environment, the ability to save messages,
and how many can be saved, is largely device- and carrierdependent; there is no one answer” to preservation and
production.7 Mobile devices are decentralized, disconnected
and can be widely distributed, making preservation and
collection labor-intensive and, therefore, expensive. Moreover,
most companies are not equipped to preserve or produce
data from their mobile devices, thus necessitating the use
of vendors with specialized expertise. For the most fulsome
preservation and collection, mobile forensic technology is
typically two generations behind current smartphones. This
means that, for example, while a company may issue an
iPhone 6 to an employee, many vendors can only create full
forensic copies with an iPhone 4. Sometimes a party will have
to collect and preserve a device and purchase new devices for
employees because forensic technology has not yet caught
up with newer devices, and user data from such devices
would need to be examined forensically at some point in the
future depending on the nature of the litigation. Conversely,
some forensic examination software does not support older
smartphone models and alternative collection methods would
require consultation with experts. The costs for collection
and preservation of data from mobile devices can vary widely
depending on the device and the level of preservation required.
V. Do I always have to produce data from mobile devices?
Even in cases where data from a mobile device may be relevant
to a litigation, a company may not need to preserve and
produce it because of the burden of doing so. Currently, Fed.
R. Civ. P. 26(b)(2)(C)(iii) requires the court to limit discovery
where it finds that “the burden or expense of the proposed
discovery outweighs its likely benefit, considering the needs
of the case, the amount in controversy, the parties’ resources,
the importance of the issues at stake in the action, and the
importance of the discovery in resolving the issues.” Notably,
this Rule is in the process of being incorporated almost entirely
within the scope of discovery under Rule 26(b)(1) to make it
even more prominent. To illustrate, when a party pushes email
out to mobile devices but also replicates the email on a server,
it is generally easier and more cost-effective to collect the data
from the server unless a party knew unique emails had only
7
Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander, Understanding and
Contextualizing Precedents in E-Discovery: The Illusion of Stare Decisis and Best Practices to
Avoid Reliance on Outdated Guidance, 20 Rich. J.L. & Tech. 8, para. 38 (2014).
Discovery and mobile devices
been saved on the mobile device.8 Of particular relevance to
data stored on employee-owned mobile devices is Principle
2: “Discovery should generally be obtained from the most
convenient, least burdensome and least expensive sources.”9
Although a litigant may be able to avail himself of
proportionality arguments, it can be dangerous for
a litigant to unilaterally fail to preserve evidence based
on proportionality because an opponent or the court can
disagree with how a litigant weighs the costs and benefits
of the information at issue.
Summarizing this tension, Magistrate Judge James Francis
has observed:
Reasonableness and proportionality are surely good
guiding principles for a court that is considering imposing
a preservation order or evaluating the sufficiency of a
party’s efforts at preservation after the fact. Because
these concepts are highly elastic, however, they cannot
be assumed to create a safe harbor for a party that is
obligated to preserve evidence but is not operating under
a court-imposed preservation order. Proportionality is
particularly tricky in the context of preservation. It seems
unlikely, for example, that a court would excuse the
destruction of evidence merely because the monetary
value of anticipated litigation was low.10
Therefore, unilateral decisions to not preserve relevant
information from mobile devices should be made
conservatively and cautiously.
scope of discovery. In Federal Court litigation12 and in Victoria,
a document is deemed discoverable if the party intends to
rely on it or the document adversely affects the party’s own
case, supports another party’s case or adversely affects
another party’s case. Furthermore, in these jurisdictions,
a party is required to undertake a reasonable search only
for discoverable documents, which requires an assessment
of the ease and cost of retrieving a document.13 In Queensland,
the document must be directly relevant to an allegation in
issue in the pleadings.
The test for relevance is different in other Australian
jurisdictions. In New South Wales, the document must be
relevant to a fact in issue – that is, it could rationally affect
the assessment of the probability of the existence of that fact
(other than relating to the credibility of a witness), regardless
of whether the document would be admissible in evidence.
In the ACT, the document must relate directly or indirectly
to a matter in issue in the proceeding. In Western Australia,
a party is required to discover all documents relating to any
matter in question.
The majority of Australian courts have implemented practice
guidelines in relation to discovery of documents stored
electronically. In the Federal Court, parties are expected to
have agreed upon a practical and cost-effective discovery plan,
taking into consideration the issues in dispute and the likely
number, nature and significance of the electronic documents
that might be discoverable. Discovery of mobile devices must
be considered when complying with the practice guidelines
and formulating discovery plans.
The Australian perspective
As noted above, a party is obliged to discover documents that
are in the party’s control. The test for control varies slightly
in each jurisdiction. Generally speaking, in most Australian
jurisdictions, a party to litigation is obliged to discover relevant
documents that are in the party’s possession, custody or
power.14 A party is said to be in possession of a document
The jurisdictional tests for relevance vary. In some
jurisdictions, the direct relevance test applies to narrow the
12 This applies where the Court has ordered “standard discovery” as opposed to
“non-standard discovery.”
A mobile device – and any data stored on a mobile device – is
a “document” for the purposes of discovery in each Australian
jurisdiction.11 Generally, the extent of a party’s discovery
obligations is determined by a relevance test and whether the
document (the mobile device or the specific data at issue) is in
the party’s control.
8
See The Sedona Conference, Commentary on Proportionality in Electronic Discovery, p. 2 (2013).
9
Id.
10 Orbit One Communications v. Numerex Corp., 2010 WL 4615547, *6 n. 10 (S.D.N.Y. Oct. 26,
2010).
11 In Palavi v Radio 2UE Sydney Pty Ltd [2011] NSWCA 264, Allsop P found that mobile phones
and iPhones were “documents” within the Interpretation Act 1987 (NSW) and the Evidence
Act 1995 (NSW). Other Australian jurisdictions have similar definitions.
13 In deciding what is a reasonable search, a party must take into account the nature and
complexity of the proceedings, the number of documents involved, the ease and cost of
retrieving a document, the significance of any document likely to be found, and any
relevant matter.
14 The obligation to discover documents in the Federal Court applies to documents in a party’s
“control,” which is defined as “possession, custody or power.” In Victoria, NSW and Western
Australia, the obligation similarly applies to documents within the disclosing party’s
possession, custody or power. In the ACT it is slightly different – possession is defined to
include custody and power. In Queensland, the obligation is to discover documents in the
possession or under the control of the disclosing party. The limited authority on this point in
Queensland suggests that control may be a more stringent requirement than power, meaning
an ability to direct or command the production of the document.
Norton Rose Fulbright – December 2015 09
eDiscovery around the globe
where it owns and holds the document, whereas custody refers
to physical holding of the document, irrespective of ownership.
“Power” refers to an enforceable legal right to inspect the
document, or obtain possession or control of the document,
without the need to obtain the consent of anyone else.15
Provided that the right to inspect or obtain the documents is
presently enforceable, the fact that for physical reasons it may
not be possible for the party to obtain immediate inspection
does not prevent the document from being within the party’s
power.16
Where the mobile device is owned by the employer, the device
will be in the employer’s power, even if it is not physically held
by the employer. Where discovery is required, a direction from
the employer to an employee to return the device would be a
reasonable and lawful one. The employee would be required
to comply with any such direction and the employer could
consider potential disciplinary action against an employee who
did not comply with the direction and return the device. The
employer would also be said to be in control of any of its data
stored on the employer-owned device, and anything created by
the employee using that data. Depending on the terms of the
employer’s workplace policies, the employer is also likely to
have control over the employee’s personal information17 stored
on the employer’s device.
Where the employee owns the device, the question of control
over data on the device may depend on where the data
originated from (e.g., is it the employer’s information or
intellectual property), the basis on which any employer data
was provided to the employee, and the scope of the employer’s
workplace policies regulating use of the device for work
purposes and return of the employer’s data.
The Canadian perspective
The explosion in the use of mobile devices over the past several
years presents unique challenges and increased production
obligations for parties attempting to preserve and produce
information from mobile devices in Canada. As electronic
discovery is a relatively new concept in Canada, there is
limited jurisprudence available on the subject.
The traditional rules for document production codified by
each province’s rules of civil procedure apply to electronic
discovery, including all information found on mobile
devices. Additionally, the Sedona Canada Principles18
and Ontario’s Guidelines for the Discovery of Electronic
Documents19 were created to assist lawyers and clients with
the production of electronic documents. In the absence
of Canadian jurisprudence, these two sources, as well as
American jurisprudence and provincial practice directives, are
relied upon frequently in determining best practices for the
preservation and production of electronic information from
mobile devices in Canada. The current best practices are set
out below.
I. Discoverability and preservation
The rules of civil procedure in most Canadian provinces
require the production of all relevant documents in the power,
possession and control of litigating parties. Electronic data that
has been generated from, or stored on, mobile devices is now
included in the broad definition of “document” and, as such,
an obligation to preserve and produce electronic documents
from mobile devices arises.20
Generally speaking, a prudent company should have document
retention policies requiring the retention of electronic files for
a reasonable period of time beyond the applicable limitation
period.21 If a company knowingly allows employees to create
business documents on their own devices, it follows that these
same retention policies should cover those devices and include
consent to monitor, access and retrieve documents from the
device, including access to passwords and remote access for
these purposes, subject to appropriate limitations to ensure
privacy of personal information.
Document retention policies must strike the right balance and
include criteria that establish what information and documents
can be destroyed and what must be kept for later reference
based on potential relevance. Such policies, however, do not
require corporations to take every conceivable step to preserve
all electronically stored information that may be of potential
relevance as such action would paralyze the corporation’s
ability to conduct ongoing business. Accordingly, the general
obligation to preserve evidence must be balanced against the
18 The Sedona Canada Principles Addressing Electronic Discovery, January 2008 (“Sedona
Canada Principles”).
15 Lonrho Ltd v Shell Petroleum Co Ltd [1980] 1 WLR 627, 635 per Lord Diplock.
19 Guidelines for the Discovery of Electronic Documents in Ontario, November 2005.
16 Id.
20 Baldwin Janzen Insurance Services (2004) Ltd. v Janzen, 2006 BCSC 554 at para 28; An Act to
Establish A Legal Framework for Information Technology, CQLR, c.C-1.1.
17 Subject to complying with any relevant limitations on the handling of personal information
imposed by the Privacy Act 1988 (Cth).
10 Norton Rose Fulbright – December 2015
21 Alvi v YM Inc. Sales 2003 CarswellOnt 3386 at para 48.
Discovery and mobile devices
party’s right to continue to manage its electronic information
in an economically-reasonable manner, including overwriting
electronic information stored on mobile devices in accordance
with general business practices in appropriate cases.22
II. Production
Once litigation is contemplated, a proportionality exercise
must be undertaken in order to determine whether potentially
relevant information must be collected and produced from
mobile devices. A “practical and efficient approach” should
be taken, and the burden of production on the parties should
remain “proportionate to the issues, interests and money at
stake.”23 There must be a balance of considerations, including
the value of the evidence, and the time and expense involved
in preserving the documents, prior to production. The costs
of producing electronic information should never outweigh
the likely probative value of the information since, if such a
proportionate approach is not taken, the overwhelming costs
associated with electronic discovery may prevent the fair
resolution of litigation disputes.
As relevant information from mobile devices might be
contained in the metadata associated with the producible
documents, electronic information obtained from mobile
devices should be produced in an electronic format.24 Despite
the added requirement to produce electronic documents
in an electronic format, however, parties are expected to
disclose only information that is reasonably accessible. 25
This typically means that parties are not required to produce
deleted or residual information not accessible except through
the help of forensic means, barring exceptional circumstances
such as fraud. These principles ensure that only what is
reasonably expected to be produced is, in fact, produced as
part of the “practical and efficient approach” to electronic
discovery currently in place in Canada.
The European Union Perspective
In the frame of its Digital Agenda For Europe which aims to
help Europe’s citizens and businesses to get the most out of
digital technologies, the European Commission also recalled
Cisco Forecast for 2013–2018 according to which the mobile
data traffic in Western Europe amounted to 253,679 terabytes
per month in 2013 and is projected to reach almost 2,000,000
terabytes per month in 2018. To a broader and more expressive
extent, according to this forecast, the number of mobileconnected devices exceeded the number of people on earth
by the end of 2014.
The exponential use of mobile devices, especially for
professional purpose, raises new ways of working and
sometimes changes users’ behaviors. For example, the BYOD
policy has become commonplace in many companies, where
workers are allowed to use their personal smartphones and
tablets on the company network.26 This explains why – on the
one hand – companies are becoming increasingly concerned
about security issues related to mobile devices, and – on the
other hand – regulators throughout Europe, starting with the
European Commission, are becoming increasingly interested in
information processed by and contained in mobile devices.
Even if there is generally no special treatment for data
produced by mobile devices under Europe law, there are
specific challenges linked to the use of such devices. These
challenges are particularly vexing in the area of discovery, even
if the legal systems of most EU Member States, as well as law
at the EU level, are not discovery-based – the main exception
being the UK:
• Even in non-discovery countries, issues relating to data
availability and retention policies may also be key within
the frame of litigation;
• Law enforcement agencies, and in particular the
Commission, have extensive investigative powers, which
may result in a de facto discovery, in which procedural rules
are less clearly defined than in a discovery-based country.
In both situations, the main difficulty, from a practical point of
view, will be to ascertain whether the mobile devices contain
information that does not exist in other places. For example,
a mobile device may allow accessing the email account of
an employee. However, such access will, in most cases, also
be possible through, for example, a laptop or access to a
company’s network. Similarly, information stored on the cloud
via the mobile device will also be accessible through other
22 Sedona Canada Principles, Comment 3.e.
23 Sedona Canada Principles, Principle 2; Quebec Code of Civil Procedure, Section 4.2.
24 Information printed as a hard copy does not contain potentially relevant metadata.
26 “Companies increasingly concerned on staff using personal devices”, Financial Times of
October 6, 2013 http://www.ft.com/intl/cms/s/0/0ff3241c-2cfb-11e3-a0ac-00144feab7de.
html#axzz3Q11VkLlL.
25 Sedona Canada Principles, Principles 5 and 6.
Norton Rose Fulbright – December 2015 11
eDiscovery around the globe
means. There may be cases, however, where certain files have
been stored exclusively on the device itself; or, for example,
there may be relevant information in certain applications
mainly used on mobile devices (such as chat applications like
Google Hangouts or WhatsApp, or social networks). In this
respect, conversations through social media may constitute
electronic evidence which a company would have to produce
or on which regulators would be able to base proceedings.
Litigation and mobile devices
The main issue in the context of litigation will therefore consist
of assessing the opportunity of requesting the disclosure of
information generated or stored on mobile devices.
UK: Discovery obligations
Like US Law, UK discovery law provides for no special
exclusion for such data. In addition, there is no UK courtapproved guidance on handling and conducting discovery
on mobile devices. In civil proceedings, Civil Procedure Rule
(CPR31.8(1)) provides that a party is required to disclose
documents which are or have been in its “control”. This
is the case if :
• the document is or was in the party’s physical possession,
• the party has or has had a right to possession of it, or
• the party has or has had a right to inspect or take copies
of it.
In addition, Practice Direction 31B of the CPR, which
governs electronic disclosure in civil proceedings, expressly
pertains to mobile devices. One of its key considerations is
the reasonableness of any search from which any disclosure
is made. The best approach would have to be determined in
12 Norton Rose Fulbright – December 2015
each case, depending on the company’s rules and the users’
habits. In some cases, however, it may be reasonable to
attempt to obtain all electronic data (or at least all data for the
relevant period). Subsequent review prior to disclosure can be
negotiated by the parties to ensure cost and time efficiencies,
as required by the Practice Direction.
Non-discovery countries
In other Member States, parties have, in principle no legal
obligation to identify and disclose documents within litigation
procedures. In most Member states, however, judges have
the power to request the disclosure of documents, including
electronic data. Although the extent of this disclosure
obligation may be less important than in a discovery system, it
is likely that a refusal to disclose documents based on technical
reasons linked to the storage of information on mobile devices
would not be acceptable to a judge.
The question arises as to whether a judge could order an
entity to produce data stored on employees’ mobile devices,
particularly in companies implementing a BYOD policy.
This should be ascertained on the basis of employment
laws applicable in each country. In France, for example, the
possibility to retrieve data from the mobile device would, to
a large extent, depend on the BYOD rules as defined in the
company’s internal regulations and labor contracts.
Chapter 2
Discovery in the cloud
The rise of cloud computing has created numerous
challenges for lawyers who wish to counsel corporations
on best practices especially in discovery, where
document preservation and collection can run up
against significant hurdles.
02
eDiscovery around the globe
The United States perspective
The rise of cloud computing has created numerous
challenges for lawyers who wish to counsel corporations
on best practices. Nowhere is this more evident
than in the area of discovery, where a litigant’s
efforts to preserve and collect relevant data from
the cloud may run into substantial turbulence.
I. Solidifying the Cloud
The bench and bar often struggle with understanding emerging
technologies. It behooves anyone delving into the legal
implications of cloud computing to learn what it actually is,
how it works and why organizations are adopting it.
The National Institute of Standards and Technology, a division
of the US Department of Commerce, defines cloud computing
as “a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal
management effort or service provider interaction.” Peter Mell
and Timothy Grance, The NIST Definition of Cloud Computing,
NIST Special Publication 800-145, p. 2 (September 2011). To
put it in simpler terms, cloud computing provides access to
electronic resources (e.g., data. data storage or even software)
via the Internet. This means an individual can use increasingly
smaller mobile platforms to access and utilize increasingly
larger pools of data and more sophisticated software
applications. Although the term “cloud computing” has only
come into fashion in the past few years, the technology has
been present since the early days of the internet. For example,
Hotmail, a web-based email application was introduced
in 1995.
As it exists, cloud computing consists of three broad types or
“flavors”: public, private and hybrid. Public clouds are services
that are open for use by virtually anyone. Examples include
Dropbox, Google Drive and Hotmail (recently rebranded
“Outlook” by Microsoft). Private clouds are established by
and for the sole use of private individuals or organizations.
For less than $100 total, an individual consumer can plug
a small server into his home internet connection, creating
a private cloud which allows them to access to data from
virtually anywhere. Large corporations, of course, deploy
private clouds on a much broader scale. Some organizations
use hybrid clouds use both public and private clouds in
combination, to enable them to meet their storage and delivery
needs. For example, a pharmaceutical company might store
14 Norton Rose Fulbright – December 2015
HIPAA-compliant clinical study data in a public cloud while
processing and developing study reports using a private cloud.
For a large organization, cloud computing offers a number
of advantages. Public clouds allow a company to effectively
outsource much of its IT operations. The cloud supplier
maintains and upgrades the infrastructure, thereby reducing
the investment the company must make to keep up with
current technology. Scalability and flexibility in pricing is
another advantage; a company need only pay “per seat” or for
the storage it actually uses. In a private cloud or traditional
storage model, the company must constantly maintain a
reserve level of storage that often goes unused. Of course,
private and hybrid clouds allow a company to benefit from
“access-anywhere” data storage while retaining a greater level
of control and security.
II. Harnessing the Cloud: Discovery
obligations for cloud subscribers.
Some companies may assume that placing data in the cloud
would somehow alter their duty to preserve, collect and
produce relevant information from that data. In the United
States, however, that is not the case. Under Rule 34 of the
Federal Rules of Civil Procedure, a party may be asked to
produce data that is under its “possession, custody, or
control.” As one court succinctly summarized “‘[c]ontrol’
has been construed broadly by the courts as the legal right,
authority, or practical ability to obtain the materials sought
on demand.” Steele Software Systems, Corp. v. DataQuick
Information Systems, Inc., 237 F.R.D. 561,564 (D. Md. 2006).
Because a company has a legal right to obtain its own data
from a third-party cloud service provider, it is effectively in
“control” of the data and may be compelled to collect and
produce it. Furthermore, the Stored Communications Act (18
U.S.C. § 2701, et seq.) (“SCA”) prohibits a service provider
(e.g. telecommunications company, cloud service provider,
etc.) from disclosing to any person or entity the contents of
an electronically stored communication while in storage by
that service provider. The service provider may, however,
disclose the communications with authorization of the service
subscriber. See, e.g., Mintz v. Mark Bartelstein & Assocs., 885
F. Supp. 2d 987,994 (C.D. Cal. 2004) (holding that under
the limitations of the SCA the proper means for a requesting
party to obtain text messages held by a service provider was
to “serv[e] a request for production of documents . . . pursuant
to Rule 34.”). Therefore, it is generally incumbent on the
party, not its service provider, to preserve, collect and produce
information.
Discovery in the cloud
III. Stabilizing the Cloud: Preservation
Of course, there are some challenges that accompany cloud
computing. First, complying with preservation obligations
for data stored in the cloud can raise concerns because many
corporations do not have the same level of visibility into or
control of cloud data as they do with data behind their firewall.
The same methods that a company might use to preserve
data stored completely internally on the laptops, internal
mail severs and shared network drives might not work when
this data moved to the cloud, particularly if the company
employs public or hybrid cloud models. In typical litigation for
a typical company with a mature approach to e-discovery, a
company will often issue a litigation hold notice to employees
who create or manage relevant data, instructing them to
refrain from deleting or altering potentially relevant data. The
company may also leverage internal IT resources to ensure
that potentially relevant data (often email subject to autodeletion) is not inadvertently destroyed. Once that company
moves its data to the cloud, however, preservation may become
more complicated, and a company will have to answer certain
questions to ensure that it meets its duty to preserve. Does the
company have administrative rights to the cloud? Where is the
company’s data stored geographically? Does the cloud provider
(or private cloud server) keep or alter metadata? How does the
cloud provider manage disaster recovery systems and are these
under the control of the corporate subscriber? Does the cloud
provider employ any auto-purge functionality? Can the data
be “locked down” so that it remains unchanged throughout
preservation and collection? Ideally, an organization will ask
these questions before settling on a cloud storage method
or choosing a cloud provider and will ensure that any cloud
service agreement addresses these concerns. In fact, one of
the first issues a corporation that has entered the cloud may
unexpectedly face is that their cloud provider might start
charging them for preservation tasks that, in the past, had
been “free” because they were handled by internal IT. If this
issue is not addressed in the cloud contract, preservation costs
could skyrocket and the move to the cloud may not be as costeffective as originally expected.
and “off the grid”, the legal and IT departments are then
deprived of knowledge of an important data store that may
contain information that should be preserved. A litigator who
finds
out about such a trove of data in a custodian interview will
have to take swift measures to ensure that any relevant
data is preserved.
An advantage of public cloud computing is the ease with
which anyone can procure storage and bandwidth. One
problem that may beset a large organization as a result of this
ease, regardless of its official cloud policy, is “credit card IT.”
One need only go to Dropbox.com and enter a company-issued
credit card number to gain access to a terabyte of storage for
under $20 a month, all without going through the company’s
standard provisioning mechanisms and the safeguards that
those mechanisms employ. Once that data goes into the cloud
Generally speaking, in most Australian jurisdictions, a party to
litigation is obliged to discover relevant1 documents that are in
the party’s possession, custody or power.2
IV. Bringing the Cloud down to Earth: Collection
Cloud computing may also confound collection efforts in
litigation. Because the cloud subscriber has reduced its
control of the data, it may not have all the same tools and
access points to pull and secure the data it has stored in the
cloud. For example, when a company owns and operates its
data storage internally, its collection efforts are subject only
to its own resources and technical limitations. If the same
data is stored in a public cloud, however, that company’s
collection efforts may be hindered by bandwidth limitations,
resource constraints, and the possibility that the company’s
data is being stored on the same hardware as other clients
of the cloud service provider. This last point implies another
challenge: ensuring the integrity of the collected data. Will
the company be able to perform integrity checks between
the collected data and the original data remaining in the
cloud? Unless a company can confirm to some degree that the
collected information is accurate, it may be unprepared for an
opponent’s challenges down the road. Similarly, encryption
methods used by the cloud service provider may hinder
efficient collection. With respect to bandwidth, a company may
need to rely on its cloud provider (using its people and its tools)
to collect the data. The cloud provider may not have the same
priorities or schedule as the subscriber and this can cause
unexpected delays. Collection can also lead to unexpected
costs, if prices have not been outlined in the contract.
The Australian perspective
The practical considerations surrounding discovery in
the cloud in the U.S. are similar to those that apply
in Australia.
1
As discussed in chapter 1, the tests for relevance vary slightly across Australia.
2
The obligation to discover documents in the Federal Court applies to documents in a party’s
“control,” which is defined as “possession, custody or power”. In Victoria, NSW and Western
Australia, the obligation similarly applies to documents within the disclosing party’s
possession, custody or power. In the ACT it is slightly different – possession is defined to
include custody and power. In Qld the obligation is to discover documents in the possession
or under the control of the disclosing party. There is some authority in Queensland that control
may be a more stringent requirement than power.
Norton Rose Fulbright – December 2015 15
eDiscovery around the globe
A party is said to be in possession or custody of a document
where the party physically holds the document, which would
not be the case with documents stored in a cloud server.
By contrast, “power” refers to an enforceable legal right to
inspect the document, or obtain possession or control of
the document, without the need to obtain the consent of
anyone else.3 Provided that the right to inspect or obtain the
documents is presently enforceable, the fact that for physical
reasons it may not be possible for the person to obtain
immediate inspection does not prevent the document from
being within the party’s power.4 This concept of power appears
similar to the concept of “control” discussed in Steele Software
Systems, Corp. v. DataQuick Information Systems, Inc., 237
F.R.D. 561, 564 (D. Md. 2006).
This issue has not yet been tested in an Australian court.
However, if the agreement with the cloud service provider
gives the party the right to retrieve its data without the need to
obtain the service provider’s consent, a court would most likely
consider the documents to be in the party’s power and would
require them to be discovered.
Where the cloud is located outside Australia, there
may be additional matters that require consideration
during the discovery process, such as whether the data
can be removed from that jurisdiction without breaching
local data privacy laws.
The Canadian perspective
The same practical considerations apply to cloud discovery in
Canada as in Australia.
In both Australia and Canada, there is a paucity of
jurisprudence considering whether a litigant is in “possession
or control” of information stored in the cloud. The case law
that does exist proceeds on the assumption that a litigant who
has stored its data in the cloud is in possession or control of
that data and focuses on other issues and, in particular, the
proportionality of the discovery request.
For example in Velsoft Training Materials Inc. v. Global
Courseware Inc.5, the court issued an Anton Piller award
to seize and make mirror images of all electronic devices
and servers, including cloud servers. While the order was
ultimately set aside because the plaintiff could not meet
the criteria otherwise applicable to those types of orders, the
right to search data in the cloud was not seriously questioned.
The reason for the lack of jurisprudence on the issue might
well be that courts will not entertain arguments which would
allow litigants to escape their discovery obligations by storing
data in a cloud pursuant to contracts that do not ensure the
same degree of retrievability as when they are stored on
servers owned and run by the company. This is particularly
true in Quebec where the law provides that a “technological”
document is equivalent to a paper version, provided it
can be readily retrieved and reconstructed in a reliable manner
that ensures the document’s integrity.6
Indeed, courts in Canada seem to be more preoccupied with
ensuring that e- discovery is proportional. In Siemens Canada
Limited v. Sapient Canada Inc.7, for example, the Master was
demonstrably determined to reverse the “default rule” for
e-discovery, namely that everything “relating to” the litigation
is discoverable and to replace it with a “proportionality rule”
where only documents “relevant” to the facts pleaded are to be
the object of e-discovery. The Master emphasized the need for a
cost-benefit analysis to be performed when determining which
custodians and key words to target for e- discovery. Similarly,
he underscored the need to take into account the effect that an
overly broad reach may have on the privacy of individuals.
While information stored in the cloud outside Canada raises
issues relating to the export of data, as is the case in Australia,
the privacy considerations around the legality of the storing
and inter-jurisdictional exchange of such data should, in
theory, have been considered in the light of privacy legislation
at the time the decision was made to store the data in the
cloud. Where these issues have not been so considered, they
must be so at the time of discovery.
The European perspective
Cloud computing is developing exponentially in the European
Union, and the European Commission has identified the key
importance for the European economy of implementing a
cloud computing EU strategy (Unleashing the Potential of Cloud
Computing in Europe, September 2012, MEMO/12/7/13).
Cloud storage is indeed essential for companies struggling with
the management of “big data” as a result of the exponential
development of email and electronic documents.
3
Lonrho Ltd v Shell Petroleum Co Ltd [1980] 1 WLR 627, 635 per Lord Diplock.
4
ibid.
6
An Act to Establish A Legal Framework for Information Technology, CQLR, c.C-1.1.
5
2011 NSSC 274 (CanLII).
7
2014 ONSC 2314 (CanLII).
16 Norton Rose Fulbright – December 2015
Discovery in the cloud
Yet the use of the cloud may amplify certain aspects of this
struggle, and create new and unforeseen pitfalls to avoid.
The Commission itself recognizes the challenges arising from
cloud development, especially the fact that “the patchwork
of different rules at Member State level increases companies’
uncertainty about their legal obligations, thus delaying the
adoption of cloud computing.”
These challenges may be particularly important in the area of
discovery, even if the legal systems of most EU Member States,
as well as law at the EU level, are not discovery- based – the
main exception being the UK:
• Even in non-discovery countries, issues relating to data
availability and retention policies may also be key within
the frame of private litigation;
• Law enforcement agencies, and, in particular, the
Commission, have extensive investigative powers, which
may result in a de facto discovery, in which procedural rules
are less clearly defined than in a discovery-based country.
I. Private litigation and the cloud
The difficulties arising from companies storing data in the
cloud essentially result from the fact that data is stored away
from the company’s premises, most of the times in different
and unknown locations. However, in most cases, this will
not change – and clearly not alleviate – disclosure or
retention obligations or needs, both in discovery and
non-discovery countries.
UK: Discovery Obligations Remain in the Cloud
The lack of proximity makes it less easy to know whether the
conditions for a discovery obligation are fulfilled. In the UK,
the applicable Civil Procedure Rule (CPR 31.8(1)) provides that
a party is required to disclose documents which are or have
been in its “control”. This is the case if:
• the document is or was in the party’s physical possession
• the party has or has had a right to possession of it or
• the party has or has had a right to inspect or take copies
of it.
The Electronic Disclosure Questionnaire provides guidance
on how these rules should be interpreted; however, instead of
expressly referring to the cloud, it references “off-site storage”
in general.
Whether the courts will consider that documents stored in the
cloud fulfill these conditions, remains to be seen, considering
that the concerned company no longer has physical
possession. However, in most cases, a right to possession
should result from the contractual documents with the cloud
services provider, which is usually held by an availability
obligation. This means that the documents are in the party’s
control and that there is a disclosure obligation.
Having document retention obligations in place as soon as
litigation is possible may also raise issues, since imposing a
hold policy may be made more difficult from a practical point
of view. Nevertheless, a party trying to justify the breach of this
obligation by the fact that data is stored on the cloud
would be likely to find little success in front of a judge.
Non-discovery countries
In other Member states, parties have, in principle, no legal
obligation to identify and disclose documents within litigation
procedures. However, in most Member States judges have
the power to request the disclosure of documents, including
electronic data. Although the extent of this disclosure
obligation may be less important than in a discovery
system, it is likely that a refusal to disclose documents based
on technical reasons related to the cloud would not be
acceptable by the judge.
In addition, parties must be able to access the data they plan to
use to support their claims.
II. Governance measures
Most of the pitfalls identified in this white paper may be
avoided through a careful review and negotiation of the
cloud service agreement. The European Commission and
most Member States data protection agencies have published
practical guidelines concerning service level agreements
in cloud services contracts, which may prove useful when
negotiating these contracts. Companies should be particularly
attentive to the provisions relating to the availability of data,
the time periods provided for the data to be made available,
and the obligation of the service provider to inform the
company of any access request received from a court or a
governmental body.
Norton Rose Fulbright – December 2015 17
Chapter 3
What are the intricacies of
cross-border discovery?
In order to conduct discovery effectively, parties in litigation
may be challenged to consider relevant data protection,
disclosures, and other regulations across jurisdictions.
These sometimes competing regulations may add an
additional layer of complexity which should be addressed
early in the discovery process.
03
What are the intricacies of cross-border discovery?
Companies may face potential legal hurdles when the discovery process crosses
borders. In order to conduct discovery effectively, parties in litigation may be
challenged to consider relevant data protection, disclosure and other regulations
across jurisdictions. These sometimes competing regulations may add an additional
layer of complexity which should be addressed early in the discovery process.
The United States perspective
Understanding IT systems and how and where they store
potentially relevant information is an important and necessary
step in conducting discovery effectively and efficiently. This
is even more important when discovery crosses borders
and we need to preserve, collect and produce information
and documents from other countries. This process may add
a level of technical complexity as well as potential legal
hurdles, as data protection, state secret, surveillance and
telecommunications laws can restrict the client’s ability to
process and transfer data.
Determine, as early as possible, whether documents that
are potentially relevant to the litigation exist in foreign
jurisdictions. Norton Rose Fulbright is fortunate to have
a considerable breadth of subject matter experts on data
protection and other relevant regulations in many jurisdictions
where documents may need to be obtained. Two useful
resources are Norton Rose Fulbright’s Global Data Privacy
Directory and the Sedona Conference’s International Principles
on Discovery, Disclosure and Data Protection.
In order to plan and implement cross-border discovery
effectively and efficiently, the following issues should be
considered:
1. Where is the data physically located? In what countries
and jurisdictions is the data located? Certain laws may
restrict the ability to collect, process and transfer the data.
2. Where are the employees (whose data is at issue)
physically located and where are their employers
legally established? Both will be relevant to determining
applicable law for data-related restrictions.
3. What is the data that is relevant and does it contain
personal information or other sensitive information?
Over-preservation and over-collection can be more
significant issues outside the US because they not only
increase costs, but can also lead to liability.
Focus on the data that is important and determine
whether it contains personal information, state secrets or
other sensitive information.
4. W
hat is the company’s organizational structure and
what is the relationship between the US entity and the
foreign affiliates? These facts can have several significant
effects on discovery. Does the US entity have possession,
custody and control of the foreign data? Is the US entity
the data controller or responsible for the data overseas or
is it an affiliate?
5. Who is running the litigation and what claims have
been made against which entities? If another member of
the organizational family or retained counsel is running
the litigation, this can complicate the ability to search and
review the documents.
6. Does the company have data protection/privacy
policies and/or a data protection/privacy officer? It is
crucial to know what the company has in place to protect
the privacy and confidentiality of personal and proprietary
information. In certain jurisdictions, the company may
have made filings with local regulators and/or may need
to make additional filings. By implementing policies and
providing notice to employees, the company may have
given itself latitude to do certain discovery, but it may have
also tied its hands.
7. Does the company have Binding Corporate Rules
(BCRs), intra-company data transfer agreements or is
it “Safe Harbored” and do these arrangements include
the transfer of information required in litigation?
Likewise, to the extent that the company intends to
transfer and review data across the organizational family,
it is important to understand what agreements are
in place that allow for compliant intra-company
transfer and disclosure.
Norton Rose Fulbright – December 2015 19
eDiscovery around the globe
8. Does the company have Workers Councils (or
unions) and, if so, do any agreements address the
information and do local employment laws impose any
further consultation prerequisites or prior approval
rights (even without collective or workers council
agreements)? To the extent that employees are members
of or protected by Workers Councils or unions, the
agreements between the company and these organizations
and local employment law can further limit a company’s
ability to preserve, search and disclose employee
documents.
9. Does the company believe any relevant data exists on
BYOD personal devices or personal e-mail? In the US,
courts are taking an expansive view of a corporations
obligation to obtain data from personal devices and
e-mail. Many privacy-focused jurisdictions, like the
member states of the European Union, take an even
harsher view of this intrusion.
10. Where does the data need to be produced? Determining
to whom and where the data needs to eventually go
(including intermediate review stages by the company and
other foreign attorneys) is critical because a plan needs to
be developed that will allow the appropriate transfers and
minimize the risk to the company.
The Canadian perspective
Global organizations and their counsel are often confronted
with collecting, processing, reviewing and producing
documents that reside outside of their respective jurisdictions,
often in the case of separate, but affiliated entities. This adds
an additional layer of complexity to an already complicated
process.
When attempting to obtain documents that exist beyond the
Canadian border, it is important to plan ahead. It is necessary
to consider (a) whether local laws in the home state allow for
the collection and processing of data; (b) whether technology
can assist with cross-border discovery and (c) which laws –
data, privacy or other – are implicated if data is moved from
the foreign jurisdiction to Canada.
If the request to export data to Canada is with a member
country of the European Union (“EU”), there is a presumption
that Canadian domestic law provides “adequate protections”
for the export of personal information, except in the case
of employees who are not federally regulated or personal
20 Norton Rose Fulbright – December 2015
information exported to a non-commercial entity.1
To determine whether a court or entity in a foreign jurisdiction
is entitled to obtain documents in the course of discovery
from a Canadian entity, existing privacy policies should be
considered. Some global entities will have privacy policies that
have been properly communicated and designed to obtain
valid employee consent to the sharing of information across
borders and affiliates. In such a case, a foreign affiliate may
already have legal access to personal information of Canadian
employees in which case nothing further is required. Absent
such a policy, the foreign jurisdiction will likely have to submit
a Letter of Request and Application to a Canadian court. This
Letter of Request must outline why the evidence is (a) relevant
(b) necessary for trial (c) not otherwise obtainable (d) not
contrary to public policy (e) reasonably specified and (f) not
unduly burdensome.2
In conclusion, cross-border discovery should be conducted
with the assistance of knowledgeable local privacy litigation
counsel and various threshold questions should be considered
to ensure legality.
The English perspective
The practical considerations surrounding cross-border
e-disclosure in the US also apply to English proceedings.
In addition, the recent procedural reforms in England have
impacted upon the disclosure (discovery) process and require
parties to start thinking about these practical considerations
early in proceedings.
Key changes to the disclosure process went into effect on 1
April 2013. Each party must now file and serve a disclosure
report at an early stage of the proceedings - 14 days before
the case management conference (CMC). The report must
describe the relevant documents that exist, where they are,
how electronic documents are stored and it must provide for
an estimate of costs of standard disclosure. Parties are also
required to meet at least seven days before the CMC to discuss
and try to agree the scope of disclosure.
Although disclosure is expansive in terms of the definition of
“document” and “control,” covering documents outside the
jurisdiction, the parties are encouraged to agree to limit its
scope to promote the overriding principle of proportionality
1
General Counsel of Seventh Day Adventists v. Tiffin (2001) Carswell Ont. 660. 142 O.A.C.
(386) C.A.
2
2002/2/EC: Commission Decision of 20 December 2001 pursuant to Directive 95/46/EC.
What are the intricacies of cross-border discovery?
(Civil Procedure Rule 1.1(2)(c)) and the court will have regard
to this overriding principle in its case management.
The parties may also be ordered to exchange an electronic
documents questionnaire if the court considers the agreement
reached between the parties in relation to the disclosure of
electronic documents to be inappropriate or insufficient. This
sets out information as to the scope, extent and most suitable
format for disclosure of electronic documents, including those
outside the jurisdiction.
Further reforms have introduced additional rules on cost
budgets and the need for accurate estimates of costs. Given
that the disclosure process usually accounts for a significant
proportion of total costs of a case, there is now even more
need for practitioners to give proper thought to planning and
costing the disclosure process. Any budget should consider
the practicalities of accessing and reviewing documents
from outside the jurisdiction and must do so as accurately
as possible. If the budget is wrong, a formal application can
be made to court to approve a revision but there must be
good reason for this. A mere mistake or miscalculation
in the amounts of data in other jurisdictions is unlikely
to be sufficient.
Disclosure (and particularly e-disclosure) necessitates careful
planning and management in all cases, but the recent reforms
to the procedural rules make it clear that parties also have to
consider the practicalities of disclosure and discuss the scope
and cost with each other early on in proceedings.
The Australian perspective
Just as in the US, cross-border discovery and disclosure in
Australia requires counsel to consider a number of sometimes
competing concerns before committing to a course of action.
Whether an Australian Court can make
discovery orders affecting an entity overseas
Several Australian cases have held that an Australian court
has power to order the disclosure of documents held by an
overseas entity that is a party to the litigation. The prevailing
view is that as discovery is a matter of procedure, the law
of the forum (i.e., Australia) governs matters of practice
and procedure.3 The fact that compliance with an order
for disclosure might render a party subject to the risk of
3
See Michael Wilson & Partners Ltd v Robert Colin Nicholls & Ors (2008) 74 NSWLR 218 per
Brereton J. Brereton J noted that where foreign obligations of confidentiality are involved, the
Court may limit or dispense with discovery or production as a matter of discretion, taking into
account whether the party is the plaintiff or defendant, and the identity of the third parties
whose confidentiality is at stake.
a prosecution under foreign law is relevant to the Court’s
discretion as to whether to make a discovery order but is not a
reason in itself not to make the order.4
In ACCC v Prsymian Cavi E Sistemi Energia SRL (No 7)5,
Besanko J refused to dismiss a Federal Court discovery order
made against a French company. Besanko J held that while
describing the documents in a list and producing them may
result in a breach of the French “blocking statute,” it was
unlikely that the French company would be prosecuted if it
complied with the Australian discovery order.
In ACCC v Prsymian Cavi E Sistemi Energia SRL (No 8)6,
Besanko J observed that foreign law, showing the impossibility
of compliance with a discovery order of the Court, may be
relevant to whether the Court would make orders in respect of
non-compliance with a discovery order.
Does the party have control over documents held overseas?
Broadly speaking, in Australia, a party to litigation is only
required to disclose relevant documents over which it has
control.7 Where the litigation is between Australian resident
companies, documents which are in an overseas jurisdiction
may not be held by the litigating party but may well be held
by a related entity. The issue that arises then is whether those
documents can be said to be in the control of the litigating
party. Assuming that a “regular” corporate structure exists,
an Australian court will usually be reluctant to pierce the
corporate veil to rule that documents held by an overseas
parent company are within the control of an Australian
subsidiary and order the disclosure of those documents.8
Different considerations may arise if the companies are not
4
ACCC v Prsymian Cavi E Sistemi Energia SRL (No 7) [2014] FCA 5. Leave to appeal against
this decision was denied by White J in Nexans SA RCS Paris v ACCC (2014) FCA 255. White J
dismissed an argument that Besanko J failed to have regard to the principle of comity as stated
in Hua Wang Bank Berhard v Cmr of Taxation (2013) FCAFC 28, namely the need for caution
where there is intrusion on the sovereignty of a foreign state, and where enforcing Australian
laws may infringe legislative policies of other countries.
5
Ibid.
6
[2014] FCA 376.
7 Control is defined in the Federal Court Rules as meaning possession, custody or power. The
discovery obligation in Victoria, NSW and Western Australia applies to documents within the
disclosing party’s possession, custody or power. In the ACT it is slightly different - possession,
custody and power. In Qld it is limited to documents in the possession or under the control of
the disclosing party. The terms “possession”, “custody” and “power” refer to three alternative
states – “possession” refers to ownership, “custody” refers to the physical holding of the
document, irrespective of ownership, and “power” refers to a presently enforceable legal right
to inspect the document or obtain possession or control of the document without the need to
obtain the consent of anyone else
8 Gambro v Fresenius Medical [2002] FCA 1359 per Tamberlin J. Tamberlin J noted that
documents which may be possibly be relevant and that are in the possession of the subsidiary
company, depending on the corporate structure, may not be even within the control or power
of the parent company (citing Lonrho Ltd v Shell Petroleum Co Ltd [1980] 1 WLR 627; DouglasHill v Parke Davis Pty Ltd (1990) 54 SASR 346 at 350-2). See also ACCC v Prsymian Cavi E
Sistemi Energia SRL (No 8) where Besanko J declined to order a subsidiary company to disclose
documents held by another subsidiary in the corporate group .
Norton Rose Fulbright – December 2015 21
eDiscovery around the globe
truly operating as separate legal entities or where company
documents are stored on shared computer platforms. In some
cases, it may be necessary to disclose the documents for either
tactical or pleading reasons.
Although a party that does not have present control over a
document is not obliged to take reasonable steps to obtain
control over the document9, the Federal Court10 may, however,
order a party to take reasonable steps to obtain access to and
discover documents which are in the possession, custody and
power of a third party, where there is a real likelihood that the
party would be given access to the documents upon request
(termed a Sabre order11).
In Psalidis & Anor v Norwich Union Life Australia Ltd12,
Cavanough J of the Victorian Supreme Court noted that in
most cases where a Sabre order has been sought, there has
been a real difficulty in using the usual processes of partyparty discovery, third-party discovery or subpoenas. A typical
example is where the documents are overseas and are in the
possession of some entity that is not readily amenable to the
ordinary processes of the jurisdiction.13
Is it reasonable to search for documents held overseas?
In Federal Court litigation, a party is only required to disclose
documents of which it is aware after a reasonable search.14 To
determine whether a search is reasonable, a party must take
into account the nature and complexity of the proceedings, the
number of documents involved, the ease and cost of retrieving
a document, the significance of any document likely to be
found, and any other relevant matter.
were held only in paper copy in a remote location), and
where those documents are unlikely to be of significance.
Whether an Australian company can resist disclosure to
an overseas entity on privacy or data protection grounds
The Australian Privacy Act of 1988 regulates the collection, use
and disclosure of personal information15 by entities that have a
turnover of more than $3 million, and by government bodies.
An entity covered by the Privacy Act can only disclose personal
information about an individual to overseas recipients, if it
takes reasonable steps to ensure that the overseas recipient
does not breach the Australian Privacy Principles16 in relation
to the information.17
There are some exceptions:
(1) If the entity reasonably believes that: (i) the recipient of the
information is subject to a law, or binding scheme, that has the
effect of protecting the information in a way that, overall, is at
least substantially similar to the way in which the Australian
Privacy Principles protect the information; and (ii) there are
mechanisms that the individual (whose personal information
has been disclosed) can access to take action to enforce that
protection of the law or binding scheme; or
(2) the disclosure of the information is required or authorised
by or under an Australian law or a court/tribunal order.
In the case of documents held overseas, after making
reasonable efforts to search for documents, a party may
be able to argue that it was not reasonable to continue
searching, if it would be difficult and costly for the party
to retrieve the documents (for example, if the documents
9 Gambro Pty Ltd v Fresenius Medical Care Australia Pty Ltd [2002] FCA 581, Dorajay Pty Ltd v
Aristocrat Leisure Ltd [2006] FCA 335 (NB: in the context of compliance with a subpoena) .
10 Some state Courts have also held that they have similar power to make such an order. This will
depend on the applicable court rules in each case .
11 In Sabre Corporation Pty Ltd v Russ Kalvin’s Hair Care Co (1993) 46 FCR 428 the applicants,
who had the exclusive right to distribute Joico hair products in Australia, brought proceedings
alleging that the respondent had engaged in misleading and deceptive conduct by selling a
generic version of Joico hair products. The documents containing the formulation of the Joico
hair products were not in the control of the applicant. Lockhart J ordered the applicant to
request those documents from the United States manufacturer of Joico products, with whom
the applicant had a close business relationship .
12 (2009) 29 VR 123.
13 At [124], citing Sabre, Bova v Avati [2009] NSWSC 921 at [370] – [374], compare SPI Spirits
(Cyprus) Ltd v Diageo Australia Ltd (No 2) (2006) 155 FCR 150.
14 Victoria has a similar limitation regarding reasonable searches.
22 Norton Rose Fulbright – December 2015
15 Personal information is defined as information or an opinion about an identified individual, or
an individual who is reasonably identifiable: (a) whether the information or opinion is true or
not; and, (b) whether the information or opinion is recorded in a material form or not.
16 Other than Australian Privacy Principle 1.
17 Australian Privacy Principle 8.
Chapter 4
Is it reasonable to rely on employees
to preserve documents?
Preserving and protecting electronically stored information
that may be relevant in potential or actual litigation is a trending
area that affects both in-house and outside litigation counsel.
04
eDiscovery around the globe
The United States perspective
Generally, a party in litigation with pre-trial discovery
must take reasonable steps to prevent the destruction or
modification of relevant information. This preservation duty
can be broken into two key components: (1) identifying the
relevant information (or at least where it is stored); and (2)
preventing its modification or deletion.
Is it reasonable for a party to rely on its employees to
accomplish these two tasks? Usually, the general answer is
YES, but there are some important qualifications. The entire
point behind a legal hold notice is to notify employees of the
duty to preserve and to stop them from deleting or modifying
relevant information. Legal hold notices have been the core
of preserving documents in the United States for more than
a decade. See e.g. Zubulake v. UBS Warburg LLC, 229 F.R.D.
422, 434 (SDNY 2004) (“Zubulake V”). Legal hold notices are
reasonable because the cost of issuing them is relatively low
and the benefit received from them is high. Most companies
have highly decentralized data management systems and
employees are in the best position to know their data
(identification) and have the most direct control (preservation).
The other preservation options – either the complete collection
of an entire data source (e.g. hard drive, e-mail account, or
server) or some type of search – can lead to even greater overpreservation and are more expensive.
However, relying on employees is not without risk and requires
more active participation by IT and external and in-house
counsel to (1) provide clear instructions and guidance to the
employees; (2) support the employees and answer questions;
and (3) oversee and monitor their progress to ensure that they
are fulfilling their obligations. See id. at 432. It is best practice
to interview and communicate with the most important players
to make sure they understand what is relevant and what they
need to be doing to preserve information. See id. at 433. Where
a company’s IT systems automatically delete information, such
as a janitor system on e-mail, the duty to monitor and engage
with employees is greater because the employees need to take
affirmative steps to identify and preserve information. See
Apple, Inc. v. Samsung Elecs. Co. Ltd., No. C 11-1846 LHK (PSG)
(N.D. Cal. July 25, 2012). Depending on the case, you may
consider temporarily suspending an automatic delete process,
or taking a “snapshot” in time of certain or all e-mail boxes,
until more details are known about the scope of discovery.
24 Norton Rose Fulbright – December 2015
In certain cases, a legal hold notice may be insufficient or
considered unreasonable:
(1) An employee may be in conflict with his employer or
accused of malfeasance (sending a whistleblower or someone
accused of embezzlement a hold notice is unlikely to be
effective);
(2) Some courts may consider an individual with a direct stake
in the litigation (e.g. an officer with personal liability or an
individual plaintiff) unreliable, as their definition of relevant
may be too narrow or biased;
(3) Legal holds to employees will likely be ineffective in
preserving data that the employees do not directly control
(e.g., deleted data on their hard drives, the company website,
enterprise databases, or disaster recovery tapes).
Finally, issuing legal holds and relying on employees are
important steps in a legal team’s attempts to preserve relevant
information and they can be used with other tools depending
on value and risk (forensically image certain drives, snap
shot some data sources, and rely on employees for others).
Remember, perfection is not the standard. Act in good faith
and make reasonable, conservative, timely, and informed
decisions to find and preserve data, and you will make
reasonable preservation decisions.
The Canadian perspective
In common law jurisdictions in Canada, as in the United States,
a party to a litigation or a party that reasonably anticipates
litigation should take reasonable steps to preserve relevant
documents. Sedona Canada Principle 3 provides that “as
soon as litigation is reasonably anticipated, parties must
consider their obligation to take reasonable and good faith
steps to preserve potentially relevant electronically stored
information.”1 The Ontario e-Discovery Guidelines provide
that the obligation to preserve relevant electronic documents
arises when litigation is “contemplated or threatened.”2 In
the civil law jurisdiction of Quebec, discovery allows for the
communication of documents “relating to the issues.” The
question then becomes whether it is reasonable, in both
common and civil law jurisdictions in Canada for a party to rely
on its employees to preserve relevant documents.3
1
The Sedona Conference Working Group 7 (WG7) The Sedona Canada Principles Addressing
Electronic Discovery (Jan. 2008).
2
Ontario Bar Association Discovery Task Force Sub- Committee, Guidelines for the Discovery of
Electronic Documents in Ontario at 5.
3
“Section 397.1 et seq of the Code of Civil Procedure.
Is it reasonable to rely on employees to preserve documents?
As in the US, the answer is YES, with limitations. A legal
hold notice which sufficiently describes the nature of the
case and what should be preserved should be sent to key
individuals as soon as litigation is imminent. It is imperative
that in-house counsel and IT are involved at each stage of the
preservation process. Employees should be educated on the
perils of selective collection efforts and the legal ramifications
of intentionally or unintentionally destroying documents.
Finally, in Canada, the principle of proportionality should
be considered. Common law courts have opined that “the
obligation to preserve relevant electronic documents must be
balanced against other considerations, including the value
of the evidence, the time and expense involved in preserving
the documents, as well as privacy and confidentiality
considerations.”4 A similar principle of proportionality applies
to all Quebec proceedings.5
Even though Canadian jurisprudence on preservation, selfcollection and litigation holds are not as developed as in
the US, these issues should not be ignored by Canadian
practitioners or thought to be limited to complex commercial
lawsuits. A thorough understanding of these concepts is
critical to Canadian litigation and requires the “universal
understanding of the Canadian bar.”6
As the guidance in CPR Part 31 (dealing with the disclosure of
documents more generally) goes on to suggest, it is not enough
simply to give instructions that documents be preserved; steps
should be taken to ensure that documents are preserved.
In the case of Infabrics Ltd v Jaytex Ltd [1985] F.S.R. 75, the
maxim omnia praesummuntur contra spoliatorem (everything
is presumed against he who destroys) was applied against a
defendant who had not preserved documents affecting the
quantum of damage notwithstanding instructions from the
defendant company’s director to preserve such records.
In practice, should a party with the engagement of in-house
counsel and IT, suspend any routine document destruction
policy and adhere to the detailed instructions provided by
its solicitors in relation to the preservation of documents,
including educating key employees on the legal ramifications
of intentionally or unintentionally destroying documents,
the question of reliance on employees for such document
preservation should not necessarily be an issue.
Australia
Although the formal “litigation hold” concept does not apply
in England as such, Practice Direction 31B (paragraph 7) of
the Civil Procedure Rules (CPR) (dealing with the disclosure of
electronic documents) does state that “as soon as litigation is
contemplated, the parties’ legal representatives must notify their
clients of the need to preserve disclosable documents…which
would otherwise be deleted in accordance with a document
retention policy or in the ordinary course of business.” This is
done by way of a detailed letter to the client explaining its
disclosure obligations and the rules as to spoliation, including
important instructions about the creation, destruction and
amending of documents.
As in England, there is no formal requirement in Australia
to issue a “litigation hold” when litigation is anticipated.
However, there is an obligation under the general law to
preserve documents of potential relevance to anticipated
litigation. The obligation is articulated in each Australian
jurisdiction where it is a criminal offence to intentionally
destroy, conceal, alter or falsify evidence. The Victorian
legislation sets the benchmark as it most clearly applies to
evidence which might be required in a future proceeding.7 In
NSW, regulation 177 of the Legal Profession Regulation 2005
expressly prohibits legal practitioners from destroying or
moving a document from the place where it is kept or from the
person who has possession or control of it, and from advising
a client to do the same, if legal proceedings are likely to be
commenced and the document may be required. Given these
provisions, it is prudent practice to issue a litigation hold once
proceedings are anticipated or likely.
Therefore, in common with the position in the US and Canada,
the answer, in broad terms, is YES - it is reasonable to rely on
employees to preserve documents – but the party (and, to an
extent, their solicitor) must take positive steps to ensure that
such document preservation is being carried out effectively.
Where a party alleges that the destruction of documents before
the commencement of proceedings is prejudicial, the criterion
for court intervention “...(other than by drawing adverse
inferences, and particularly if the sanction sought is striking
out of the pleading) is whether that conduct of the other party
The English perspective
4
McCaffrey v. Paleolog, 2006 BCSC 69 (CanLII).
5
Section 4.1 of the Code of Civil Procedure.
6
The Sedona Canada Principles, supra.
7
This legislation, and the NSW regulation discussed in the following sentence, was introduced
following the Victorian Court of Appeal decision in British American Tobacco Australia Services
Limited v Cowell (as representing the estate of Rolah McCabe, deceased) (2002) 7VR 524.
Norton Rose Fulbright – December 2015 25
eDiscovery around the globe
amounted to an attempt to pervert the course of justice or,
if open, contempt of court occurring before the litigation
was on foot.”8
Once proceedings are commenced, Australian solicitors
have a duty to explain to their clients the requirement to
disclose relevant documents in litigation and to ensure that
clients comply with disclosure requirements. In a number of
Australian jurisdictions, solicitor are also required to certify to
the relevant court that they have explained to their client the
duty of disclosure. Solicitors should consider ceasing to act
if they consider that their client is not complying with their
disclosure obligations or has destroyed relevant evidence.9
Is it reasonable for a party to rely on its employees to preserve
relevant documents? As is the case within other jurisdictions,
a party to litigation must ensure that its employees understand
the directions given, and that employees comply with the
directions. In some cases it may be necessary to consider
whether external parties should be involved in implementing
the litigation hold (especially where the case involves
8
British American Tobacco Australia Services Limited v Cowell (as representing the estate of
Rolah McCabe, deceased) (2002) 7 VR 524.
9
Court procedure legislation in a number of Australian jurisdictions now imposes express
duties on parties to litigation to further the overarching purpose of the courts to resolve
disputes in a just, efficient and cost-effective way (e.g. s37N Federal Court of Australia Act
(Cth), s56 Civil Procedure Act (NSW), s10 Civil Procedure Act (Vic)). In Palavi v Radio 2UE
Sydney Pty Ltd, [2011] NSWCA 264 Allsop P of the NSW Court of Appeal noted that the duty
imposed by the NSW Civil Procedure Act, to act responsibly and honestly in court proceedings
should form the framework of the exercise of the court’s power to strike out proceedings,
where a party deliberately destroys discoverable material.
26 Norton Rose Fulbright – December 2015
allegations against the employees who would otherwise
be asked to implement the litigation hold). In Victoria, a
corporation that is accused of destroying evidence may rely
on a defense of due diligence, but if its corporate culture is
such that the destruction was encouraged or tolerated, then its
representatives may face a significant fine.
Our global offices
Canada
Calgary
Montréal
Ottawa
Québec
Toronto
Europe
Amsterdam
Athens
Brussels
Frankfurt
Hamburg
London
Milan
Moscow
Munich
Paris
Piraeus
Warsaw
Kazakhstan
Almaty
USA
Austin
Dallas
Denver
Houston
Los Angeles
Minneapolis
New York
PittsburghSouthpointe
San Antonio
St Louis
Washington DC
Latin America
Bogotá
Caracas
Rio de Janeiro
Africa
Bujumbura**
Cape Town
Casablanca
Dar es Salaam
Durban
Harare**
Johannesburg
Kampala**
Middle East
Abu Dhabi
Bahrain
Dubai
Riyadh*
Asia
Bangkok
Beijing
Hong Kong
Jakarta*
Shanghai
Singapore
Tokyo
Australia
Brisbane
Melbourne
Perth
Sydney
*associate office
**alliance
Norton Rose Fulbright – December 2015 27
eDiscovery around the globe
28 Norton Rose Fulbright – December 2015
2014 in review
Norton Rose Fulbright
Norton Rose Fulbright is a global legal practice. We provide the world’s preeminent
corporations and financial institutions with a full business law service. We have more than
3800 lawyers and other legal staff based in more than 50 cities across Europe, the United
States, Canada, Latin America, Asia, Australia, Africa, the Middle East and Central Asia.
Recognized for our industry focus, we are strong across all the key industry sectors: financial
institutions; energy; infrastructure, mining and commodities; transport; technology and
innovation; and life sciences and healthcare.
Wherever we are, we operate in accordance with our global business principles of quality,
unity and integrity. We aim to provide the highest possible standard of legal service in each of
our offices and to maintain that level of quality at every point of contact.
Norton Rose Fulbright US LLP, Norton Rose Fulbright LLP, Norton Rose Fulbright Australia,
Norton Rose Fulbright Canada LLP and Norton Rose Fulbright South Africa Inc are separate
legal entities and all of them are members of Norton Rose Fulbright Verein, a Swiss verein.
Norton Rose Fulbright Verein helps coordinate the activities of the members but does not
itself provide legal services to clients.
More than 50 locations, including Houston, New York, London,
Toronto, Hong Kong, Singapore, Sydney, Johannesburg and Dubai.
Attorney advertising
References to ‘Norton Rose Fulbright’, ‘the law firm’, and ‘legal practice’ are to one or more of the Norton Rose Fulbright members or to one of their
respective affiliates (together ‘Norton Rose Fulbright entity/entities’). The principal office of Norton Rose Fulbright US LLP in Texas is in Houston.
Save that exclusively for the purposes of compliance with US bar rules, where James W. Repass will be responsible for the content of this publication,
no individual who is a member, partner, shareholder, director, employee or consultant of, in or to any Norton Rose Fulbright entity (whether or not
such individual is described as a ‘partner’) accepts or assumes responsibility, or has any liability, to any person in respect of this communication.
Any reference to a partner or director is to a member, employee or consultant with equivalent standing and qualifications of the relevant Norton Rose
Fulbright entity. The purpose of this communication is to provide information as to developments in the law. It does not contain a full analysis of the
law nor does it constitute an opinion of any Norton Rose Fulbright entity on the points of law discussed. You must take specific legal advice on any
particular matter which concerns you. If you require any advice or further information, please speak to your usual contact at Norton Rose Fulbright.
© Norton Rose Fulbright US LLP 12/15 (US/mo/im)
Extracts may be copied provided their source is acknowledged.
Norton Rose Fulbright – December 2015 29
Law around the world
nortonrosefulbright.com
Download