electronic devices

advertisement
1
William M. LeRoy - Moderator
President & CEO
American Legal & Financial Network “ALFN”
Dean Kanellis, Esq. - Panelist
Associate Attorney
Keith D. Weiner & Associates Co., LPA
2




Introduction
What is e-discovery?
Civil Rule Amendments
Cost of Producing


Preservation



Zubulake I and III
Zubulake IV and V
Practical Considerations
“Hypothetical” Cases
3






Why an eDiscovery Webinar?
Solutions guided by client expectations
Recognition of the obligations and challenges
Formulation and implementation of solutions
Discovery of ESI requires a new way of
thinking
It’s here now!
4

“Electronic discovery (or e-discovery) refers to
discovery in civil litigation which deals with
information in electronic format also referred to
as Electronically Stored Information (ESI).
Electronic information is different from paper
information because of its intangible form,
volume, [volatility]. Also, electronic information
is usually accompanied by metadata, which is
not present in paper documents.”
(http://en.wikipedia.org/wiki/Electronic_discover
y).
5

ESI refers to the format, not the object or its
content.
Discovery of data or information that is stored on
and/or created by electronic devices.
 Not the Note; the pdf file of the note, stored on the
file server, together with the associated metadata.

6

Example: RFP 1: Produce all documents and
electronically stored information that relate to, support,
contradict, evidence, in whole or in part, your allegation
that the Borrower signed the Note.


In the absence of an objection, or an agreement, Plaintiff must
allow the borrower to inspect and copy all physical instances of
the Note, and all electronic instances, including all pdf files,
together with all metadata created by a user or an electronic
device.
Why? Because the Civil Rules provide for it, and,
among other things, the ESI contains metadata.
7

ESI is different from physical documents or
objects
Intangible;
 Voluminous; and
 Volatile.

8



Content data is created by the user or key
player.
Artifact data is created by the electronic device.
All content and artifact information can be
categorized as:






File name data;
Content data;
Metadata;
File system data;
Application data; and
Operating system data.
9

File Allocation

In order for an electronic device to “see” data the
content must be linked to the file name.
 Content data linked to a specific file name is “allocated”
and is referred to as an “active file.”
 Traditional focus of preservation and production.

Content data that is no longer linked to a specific file
name is “unallocated.”
 When a file is “deleted”, the links between the content,
metadata, and file name data are broken. Although
unallocated data cannot be seen by the device, it they
still reside on it, can be recovered until overwritten.
10

Metadata






Metadata is electronically stored information that is a component of the
file’s structure.
May be created by an end user, such as the data in the “comment”
field linked to a Word document;
May be created by an application, such as the camera information
recorded by programs that transfer images from digital cameras; or
May be created by the file or operating system, such as creation dates
of content data.
The preservation of metadata from electronic documents creates
special challenges to prevent spoliation.
Metadata is sometimes plays an important part as evidence in
litigation.
“When did you send the notice of default and intent to accelerate to my
client?”
 “If that’s the case, why the file creation date on the pdf copy of the
Notice three months after the date you allege it was mailed?”

11




E-mail
Word processing documents
Spreadsheet documents
Case management databases
Collection notes
 Servicing notes
 Call logs


Accounting databases






Payment histories
Photographs
Instant messaging chats
Websites
Any other ESI which could have relevant evidence in a lawsuit
Raw data which can be reviewed for hidden evidence
12

Volume

Exponential increase in volume of electronic evidence due to:
 Proliferation of inexpensive media capable of storing vast
amounts of data at little cost
 In 1990, a gigabyte of data (70,000 – 80,000 pages/35 – 40
banker boxes) could be stored for $20,000.00.
 Today, the same amount of data is stored electronically for less
than $1.00.
 Increase in file types in which data is stored.
 Types of electronic communications have increased.
 E-mail, instant messaging, voice-mail, “intercoms”, web pages,
etc.
 Use of electronic communications has dramatically increased
as they have become more and more informal.
 E-mail and IM are commonly used by “key players” in litigation as
a substitute for face-to-face or telephone communications.
13

Volatility



Electronic data is easily modified and/or destroyed,
unless properly preserved.
Turning on an electronic device can automatically
modify and alter thousands of files.
Volatile nature of electronic devices requires
preservation early in a case so that electronic
evidence is not lost due to on-going use .
14


The volatile nature of ESI and changes in the
Civil Rules mandate that preservation of ESI
occur much earlier than in the case of
traditional paper documents.
ESI must be preserved:


Before it is clear that matter will not settle;
At the beginning of the case when factual and legal
issues are not fully known.
15

Preservation of “electronic witnesses.”

Identification and preservation of relevant ESI, at the
onset of the case, is the most difficult and costly
method of preservation and production.
 Use of key players to identify ESI is disruptive.
Inefficient when issues, claims, and defenses may
change.
 Clients may not be willing to spend significant money to
search and find relevant ESI early in the case, when
the probability is unknown.
 Key players and clients may not be very good at
recognizing relevant information or searching electronic
devices.
16



Identify and preserve the electronic devices
that store and/or create the information that will
ultimately be relevant to the case.
Electronic devices are used by key players to
create electronic evidence.
Treat the electronic devices as “electronic
witnesses” in the case.
17

Electronic Devices
Desktop and notebook computers
 File servers
 Mail servers
 Smart phones and PDA’s
 External drives, flash drives, and optical disks




Network infrastructure
Accessible vs. inaccessible ESI
Document retention policy
18








Recognize when the duty to preserve has attached.
Inform the client of the duty; litigation hold.
Familiarize yourself with the clients information
infrastructure.
Identify the key players.
Identify the devices used by the key players.
Preserve the electronic witnesses; cloning.
Negotiate an agreement with opposing counsel
regarding scope, methods, and manner of production,
etc.
Focus on settling your client’s case.
19




Formatting issues
ESI can be produced in a number of formats:
 Native file
 PDF formats
 JPEG
 Other
 Per agreement
“If a request does not specify the form or forms for producing
electronically stored information, a responding party may produce the
information in a form or forms in which the information is ordinarily
maintained if that form is reasonably useable, or in any form that is
reasonably useable.” Ohio R. Civ. P. 34(B)(3).
Production of e-mails in paper form, after converting to pdf, was
impermissible, and responding party was ordered to produce them again
in native format. “If the responding party ordinarily maintains the
information it is producing in a way that makes it searchable by electronic
means, the information should not be produced in a form that removes or
significantly degrades this feature.” White v. Graceland College, 2008 WL
3271924 (D.Kan.).
20

Document petrification involves the conversion
of native files into an image format that does
not require use of the native applications. This
is useful in the redaction of privileged or
sensitive information, since redaction tools for
images are traditionally more mature, and
easier to apply on uniform image types. Efforts
to redact similarly petrified PDF files have
resulted in the removal of redacted layers and
exposure of redacted information, such as
social security numbers and other private
information.
21







Federal
Ohio
Texas
Florida
New York
Arizona
California
22

Federal Rules of Civil Procedure


Amended in 2006 to expressly provide for discovery of ESI
Changes to the following rules:









Rule 16
Rule 26(a)
Rule 26(b)2
Rule 26(b)5
Rule 26(f)
Rule 33
Rule 34
Rule 37(e)
Rule 45
23

Civil Rule 16

Seeks to address eDiscovery issues early in the
litigation.

Gives the court discretion to adopt agreement
parties make regarding privilege or protection after
inadvertent production.
24

Civil Rule 26(a)


Substitutes ESI for data compilations
Civil Rule 26(b)(2)




Obligations of responding party to provide discovery of ESI
that is not readily accessible.
A party does not have to produce ESI that is not readily
accessible due to undue burden or cost.
A responding party must identify sources of potentially
responsive ESI that was not searched due to costs/burden.
However, Court can still order this ESI to be produced.
25

Civil Rule 26(b)5


Clarifies the procedure to use when a responding
party asserts claim of privilege or work product
protection after production.
The process
 responding party notifies requesting party of the
claim.
 requesting party must return, sequester, or destroy
ESI.
 requesting party may not disclose and must take
reasonable step to retrieve ESI if disclosed.
26

Rule 26(f)

Any issues regarding e-discovery should be
discussed at the parties’ conference




Topics to include
form of producing ESI
preservation issues
approaches to asserting claims of privilege or workproduct protection after inadvertent production in
discovery
27

Civil Rule 33

Allows a party to answer an interrogatory involving
review of business records by providing access to
the information if the interrogating party can find
the answer as readily as the responding party can
28

Civil Rule 34


Makes ESI a category subject to discovery distinct
from documents and things.
Authorizes a requesting party to specify the form of
production and allows the responding party to
object.
29

Civil Rule 37(e)


Safe Harbor
Some protection against sanctions for a party’s failure to
provide ESI



Absent exceptional circumstances, sanctions may not be
imposed if ESI sought is lost as result of routine operation of
electronic info system as long as that operation is in good
faith
If ESI is under duty to preserve (e.g. litigation hold) and it is
deleted then sanctions can be imposed
Civil Rule 45

Conforms the provisions for subpoenas to changes in other
discovery rules
30

Ohio Rules of Civil Procedure


Adopted e-discovery provisions in July 2008
Ohio made most of the same changes as the 2006
FRCP
31

Tracing Table





FRCP 26(a) is ORCP 26(A)
FRCP 26(b)2 is ORCP 26(B)(4)
FRCP 26(b)5 is ORCP 26(B)(6)
FRCP 26(f) isn’t in the ORCP
FRCP 33 is ORCP 33(C)
 This also requires that interrogatories be
served both electronically and in hard copy


FRCP 34 is ORCP 34
FRCP 37(e) is ORCP 37(F)
 Specific factors for the court to consider when deciding
whether to impose sanctions are listed
32

adopted e-discovery provisions in 1999

Rule 192.3
 A party may discover existence, description, nature, custody,
condition, location, and contents of documents and tangible things
 This includes electronic or videotape recordings, data and data
compilations

Rule 193.3(d)
 Allows a party to assert a claim of privilege to material or ESI
inadvertently produced without waiver of the privilege
 10 day notice period running from the party’s first awareness of the
mistake to assert claim
33

Rule 196.4
 Party must specifically request production of electronic or
magnetic data and the form in which it is to be produced
 Responding party must produce the ESI that is responsive
and reasonably available in the ordinary course of business
 If the responding party cannot produce it then the responding
party must state an objection
 The court can order the requesting party to pay the
reasonable expenses of any extraordinary step taken to
retrieve and produce the ESI
34

Has not changed its rules to specifically
address e-discovery
35
 NY has not changed its rules to specifically address e-discovery
 Trend is to require requesting party to pay for e-discovery, see
generally CPLR 3101
36


Adopted e-discovery rules in 2008
Tracing table

Rule 26.1(f)
 Corresponds to FRCP 26(b)5
 Rule 34(b)
 Corresponds to FRCP 34
 Rule 37(g)
 Corresponds to FRCP 37(f)
37
 Adopted e-discovery provisions in 2009 (with urgency)
 Had proposed changes to the rules in 2006
 Did not follow through with the 2006 changes as California was
waiting to see how the FRCP were changed
38

Zubulake I



Zubulake sued her former employer for gender
discrimination and illegal retaliation.
She claimed that key evidence was located in
various e-mails exchanged among employees that
now existed only on backup tapes and perhaps other
archived media.
The parties were unable to agree on who would bear
the $175,000.00 restoration cost (exclusive of
attorney time), and Zubulake moved for an order
compelling UBS to produce the e-mails at its
expense.
39

Who pays for the cost of ESI production?

Three-step analysis
 First, it is necessary to thoroughly understand the
responding party’s computer system, both with respect
to active and stored data.
 The usual rules of discovery apply to data that is kept in
an accessible format, and the responding party should
pay the costs of producing responsive data.
 Cost shifting is considered only when electronic data is
relatively inaccessible, such as in backup tapes.
40
 Second, because the cost-shifting analysis is so fact-intensive,
it is necessary to determine what data may be found on the
inaccessible media.
 Requiring the responding party to restore and produce
responsive documents from a small sample of the requested
backup tapes is a sensible approach in most cases.
41
 Third, in conducting the cost-shifting analysis, the following
factors should be considered, in order of importance:
 The extent to which the request is specifically tailored to discover
relevant information
 The availability of such information from other sources
 The total cost of production, compared to the amount in
controversy
 The total cost of production compared to the resources available
to the parties,
 The relative ability of each party to control costs and its incentive
to do so
 The importance of the issues at stake in the litigation and
 The relative benefits to the parties of obtaining information
42

Summary:



Generally the party from whom the ESI is requested
must pay for its production.
Cost-shifting should be considered when eDiscovery
imposes an undue burden or expense on the
responding party.
An undue burden is one in which the expense of
discovery outweighs its likely benefit when
considering the needs of the case, the amount in
controversy, the parties’ resources, the importance
of the issues at stake, and the importance of the
proposed discovery in resolving the issues.
43

Zubulake III
Decided on July 24, 2003
 The former employer produced a sample as required
in Zubulake I.
 Discoverable information was found on the
representative sample.
 Court applied 7 factor test.
 Zubulake was ordered to pay 25% of the cost of
restoring the remaining backup tapes.
 Cost-shifting does not apply to attorney fees.

44

Zubulake IV
Decided on October 22, 2003
 During restoration, the parties learned that certain
relevant backup tapes were missing.
 Zubulake moved for:

 An order requiring UBS to pay in full the costs of
restoring the remainder of the monthly backup tapes;
 An adverse inference instruction against UBS with
respect to the backup tapes that are missing;
 An order directing UBS to bear the costs of re-deposing
certain individuals.
45



Spoliation is “the destruction or significant
alteration of evidence, or the failure to preserve
property for another’s use as evidence in
pending or reasonably foreseeable litigation.”
Spoliation “can support an inference that the
evidence would have been unfavorable to the
party responsible for its destruction.”
Determination of the appropriate sanction “is
confined to the sound discretion of the trial
court.”
46

Three prong adverse inference test:





The party having control over the evidence had an obligation to
preserve it at the time it was destroyed.
The evidence was destroyed with a “culpable state of mind.”
The destroyed evidence was “relevant” to the party’s claim or
defense such that a reasonable trier of fact could find that it
would support that claim or defense.
Intentional destruction alone is sufficient to
demonstrate relevance.
Negligent, grossly negligent, or even reckless
destruction requires proponent to prove relevance.

Once duty to preserve attaches, any destruction is, at a
minimum, negligent.
47

Zubulake V



Decided on July 20, 2004
The responding party’s counsel failed to
communicate the litigation hold to all key people
therefore the party and the counsel had not taken
necessary steps to guarantee that relevant data was
preserved and produced.
Counsel must oversee compliance with litigation
holds after implementing one.
48

Zubulake’s motion for sanctions granted.
UBS ordered to pay for re-depositions;
 UBS ordered to restore and produce relevant
documents;
 UBS ordered to pay all “reasonable expenses,
including attorney fees….”
 Jury to be given adverse inference instruction.

49

Zubulake Revisited

“After a discovery duty is well established, the failure to adhere to
contemporary standards can be considered gross negligence. Thus,
after the final relevant Zubulake opinion in July, 2004, the following
failures support a finding of gross negligence, when the duty to
preserve has attached: to issue a written litigation hold; to identify all of
the key players and to ensure that their electronic and paper records
are preserved; to cease the deletion of email or to preserve the
records of former employees that are in a party’s possession, custody
or control; and to preserve backup tapes when they are the sole
source of relevant information or when they relate to key players, if the
relevant information maintained by those players is not obtainable from
readily accessible sources.” Pension Committee of the University of
Montreal Pension Plan, et al. v. Banc of America Securities LLC, et al.,
2010 U.S. Dist. LEXIS 4546 (S.D.N.Y. Jan. 15, 2010)
50

Preservation is the key to eDiscovery


Complete and accurate preservation early in the
case sets the foundation from which discovery
disputes and costs are minimized.
The effectiveness of ESI preservation is increased
and the cost of doing so is decreased by changing
the way counsel and their clients approach
discovery.
 Focus on electronic devices as “witnesses” not on the
data that is stored by them.
51

The duty to preserve


“The obligation to preserve evidence arises when the
party has notice that the evidence is relevant or
when a party should have known that the evidence
may be relevant to future litigation.” Zubulake v. USB
Warburg, 220 F.R.D. 212 (S.D.N.Y Oct. 22, 2003).
Duty arises before litigation.
52

Counsel is primarily responsible for preservation

“The obligation to preserve evidence runs first to counsel, who
has a duty to advise and explain the to the client its obligations
to retain documents and data that may be relevant to
litigation…[I]t is not acceptable to rely upon the client.” Telecom
Int’l Am., Ltd. v. AT&T Corp., 189 F.R.D. 76, 81 (S.D.N.Y 1999).

“[I]t is not sufficient to notify all employees of a litigation hold
and expect that the party will then retain and produce all
relevant information. Counsel must take affirmative steps to
monitor compliance so that all sources of discoverable
information is identified and searched. Zubulake v. USB
Warberg, LLC, 229 F.R.D. 422 (S.D.N.Y 2004).
53

Crawl vs. Clone

Preservation strategies can be classified in two
ways:
 Crawl: Relies on key players or other client personnel
to “crawl” through ESI.
 Clone: Uses technology to clone or duplicate the
electronic devices themselves.


While both methods are supported by case law, the
choice depends on the type of case, the cost, the
time available for preservation, and whether counsel
wants to and can defend the client filtering.
Generally, the crawl method tends to be inefficient,
disruptive, less effective, and ultimately more costly.
54

Crawl Method







Interview key players to identify sources of ESI within
the clients information architecture.
Initiate litigation hold.
Monitor compliance.
Reiterate the litigation hold regularly.
Rely on key players to identify and produce relevant
data.
Segregate and preserve other media, such as
backup tapes, etc.
Repeat the process when new issues or key players
are identified!
55

Clone Method
Interview key players to identify the electronic
devices within the clients information architecture
that are likely to contain discoverable ESI.
 Initiate litigation hold.
 Clone and preserve the electronic devices.
 Use search tools to identify responsive ESI.

56

Object, but produce something.


Responding party bears cost
“Unduly burdensome” objection is fact specific




Must be litigated
Client witness required
Court appearances required
Cost of litigating “unduly burdensome” objection may exceed cost of production
 Upon finding that plaintiffs had established the relevance of the material requested
and that defendant’s estimated costs of production were “greatly exaggerated,” the
court granted plaintiff’s motion to compel. Spieker v. Quest Cherokee, LLC, 2009 WL
2168892 (D. Kan. July 21, 2009).




Arrive at discovery stipulations early in the case.
Preserve objections, but produce enough to allow court to conclude you are
acting in good faith.
Client information infrastructure decisions must factor the issues and
costs of eDiscovery.
If effective information infrastructure is in place, eDiscvoery may actually
reduce the costs of discovery.
57

The Property Preservation Case








Borrower defaults on their loan
Lender initiates lawsuit
Borrower defaults and lender obtains judgment
Property is purchased by third-party
Third-party inspects property and informs the lender
that it is vacant and utilities may be turned off
Lender engages in preservation activity
The property is vandalized and/or damaged
The purchaser sues the lender and its attorney for
damages sustained by virtue of negligent
preservation
58

The Loan Modification Defense




Borrower defaults on their loan
Lender initiates lawsuit
Borrower applies for a HAMP modification, but is
denied
Borrower amends their answer to assert an
affirmative defense based on wrongful denial of a
HAMP modification
59
If you have any further questions that were not addressed in this presentation, or
want to contact one of our speakers, please email Matt Bartel, COO of ALFN, at
mbartel@alfn.org. Thank you for your participation in this webinar. Please
complete the brief survey which you will be directed to at the conclusion of this
presentation.
ALFN provides the information contained in these webinars as a public service for educational and general
information purposes only, and not provided in the course of an attorney-client relationship. It is not
intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in
the relevant jurisdiction.
Use of ALFN Webinar Materials
The information, documents, graphics and other material made available through this Webinar are
intended for use solely in connection with the American Legal and Financial Networks (hereinafter “ALFN”)
educational activities. These materials are proprietary to ALFN, and may be protected by copyright,
trademark and other applicable laws. You may download, view, copy and print documents and graphics
incorporated in the documents from this Webinar ("Documents") subject to the following: (a) the
Documents may be used solely for informational purposes related to the educational programs offered by
the ALFN; and (b) the Documents may not be modified or altered in any way. Except as expressly
provided herein, these materials may not be used for any other purpose, and specifically you may not use,
download, upload, copy, print, display, perform, reproduce, publish, license, post, transmit or distribute any
information from ALFN Webinars in whole or in part without the prior written permission of ALFN.
60
ALFN’s 8th Annual Leadership Conference
July 18-21, 2010
Grand Hyatt Washington D.C.
Register on our website at www.alfn.org
61
Download