View as PowerPoint Presentation - Beirne, Maynard & Parsons, LLP

advertisement
E-Discovery:
The New Demands of a Wireless World
Lisa Ketai  James Smith  Lynette Fons
Beirne, Maynard & Parsons, L.L.P.
Houston 713.623.0887 ● Dallas 214.237.4300
www.bmpllp.com
Confidential Attorney Work Product
What Kinds of Electronic Data Are We Talking About?
• Includes all relevant electronic data:
– E-mail messages
– Word-processing files
– Databases
– Internet history files
– Calendars and schedules
CALENDAR SOFTWARE
This is a Hot Topic!
E-Discovery is a hot topic.
We’re Talking About Serious E-Mail Volume!
Worldwide e-mail traffic per day totals about 141
billion messages.
- Source: The Radicati Group, Inc.
E-Mail v. Paper Mail
• Authors think “send” means the e-mail is gone; they don’t
see the paper trail.
• Tendency to be informal in e-mails and use more colloquial
language than would be used in a letter.
• E-mails are not treated with the same sanctity as paper
correspondence.
• 􀂙E-mails potentially last forever.
E-Mail as Friend or Foe?
• E-mail can be an issue before or after litigation arises.
• Problem with e-mail: people act as if they were their private
property.
• E-mail can be very damaging, but it also protect you in
future litigation.
Merck: Vioxx
Dr. Edward Scolnick wrote an e-mail acknowledging that
cardiovascular links to Vioxx were “clearly there” before he
reviewed all of the data regarding the risk.
After reviewing additional data, Dr. Scolnick joined the
company line, i.e., there were no cardiovascular risks posed
by Vioxx.
Nevertheless, he wrote to the Vioxx project team:
“I will tell you that my worry quotient is high... I am actually in
minor agony.”
Houston Chronicle 12/6/05
Merck: Vioxx
In another internal e-mail, Scolnick referred to FDA as
“bastards” and “devious” for requesting additional safety data
and for considering adding a black box warning label to Vioxx.
In testimony, Dr. Scolnick tried to explain the emails. He said
he took issue with the regulators’ push for a black box warning
because the FDA advisory committee had not recommended
the labeling change.
His explanation did not erase the black and white of the emails. The Texas jury returned a verdict for $253 million.
When the Impact of E-Mail Discovery is Not Understood
A 1996 e-mail from a Wyeth-Ayerst administrator regarding the
side-effects of their diet drug, Phen-Fen:
􀂙“...can I look forward to my waning years signing checks for
fat people who are a little afraid of a silly lung problem?”
Zubulake: Seminal Case
In 2001, after Laura Zubulake, a senior salesperson at UBS
Warburg, filed an EEOC claim, a USB Warburg employee sent
an e-mail to a company human resources specialist
suggesting that Zubulake be fired “ASAP,” in part so she would
not be eligible for year-end bonuses.
– See Zubulake v. UBS Warburg, 2003 WL 21087884
(S.D.N.Y. May 13, 2003)
Response to Anticipated Litigation / Discovery Request
Institute a Litigation Hold
Once a party reasonably anticipates litigation, they must
suspend routine document retention/destruction policies and
institute a litigation hold to ensure preservation of relevant
documents.
• 1999: 93% of information was in digital format – only 7% paper.
• 2003: Survey of records management professionals found 47%
did not include electronic records in their retention schedules;
46% did not have a formal system for implementing legal holds;
65% reported that legal holds did not include electronic records.
Response to Anticipated Litigation / Discovery Request
Determine the Scope and Sources of Documents
Understand the business functions involved and appreciate the
supporting software:
• Insurance Information
• Accounting Information
• Medical Records
• Maintenance Records
• Quality Control Records
• Purchasing Information
• Personnel Files
• Grant Writing Files
• Product Research
• Accrediting and Compliance Records
Response to Anticipated Litigation / Discovery Request
Determine the Scope and Sources of Documents
Active Data
• Visible in directories or applications
• Recycle Bins
• History Files
Latent Data
•
•
•
•
•
Deleted Files
Temporary Files
Printer Spools
Meta Data
Hard Drive
Archival Data
• Back Up Tapes
• CDs
• Zip Disks
• Network Servers
Discovering Deleted Data
• Deleted data may be reconstructed from:
– Hard drives
– Network servers
– Storage media
• Cost can be very high
Remember: Parties seeking information without first
establishing a reasonable basis for the belief that it
exists may have to bear the cost of the discovery
effort.
Response to Anticipated Litigation / Discovery Request
Determine the Scope and Sources of Documents
Focus on storage devices, storage media and the storage
locations of the electronic information:
•
•
•
•
•
•
•
•
•
•
•
Desktops
Laptops
Cell phones
Home computers
CDs
Diskettes
Handheld devices
Backup media of all sorts
Voice-mail systems
Memory sticks
iPods
Response to Anticipated Litigation / Discovery Request
Institute Appropriate Retention Policies
• Must be reasonable
• Must be routinely observed
Response to Anticipated Litigation / Discovery Request
Develop a Sound Collection Protocol
• Incorporate custodian interviews or questionnaires.
• Keep a description of the guidelines and procedures
followed in collecting the documents.
• Make sure the party doing the collecting understands the
need to maintain the integrity of the electronic data.
• Seek ways to avoid disruption of normal business.
• Keep a record of collection efforts.
Response to Anticipated Litigation / Discovery Request
The Basic Rules of Discovery Apply
Scope
Relevance
• In Texas state courts, to obtain electronic or magnetic
information, the requesting party must specifically request
electronic or magnetic data and specify the form in which
the he wants it produced.
• Objections including those based upon burden and
expense are available.
Response to Anticipated Litigation / Discovery Request
Review
• Take advantage of technology to make your review more
efficient:
– Identify
– Locate
– Categorize
• Caution: Electronic data may be altered when accessed.
Do Not Attempt Document Collection Yourself!
• You should not try to collect or process electronic data
yourself, unless you have been trained and are well versed
in computer forensics.
• Spoliation is a real danger.
• Evidence collectors are frequently called to testify on
collection methods, storage and preservation of the chain
of custody.
Do Not Attempt Document Collection Yourself!
Three Main Categories of Service Offerings
•
•
•
Computer forensics / investigative
– Recovering material previously thought to have been deleted or lost
– Restoring to usable format data contained in outdated formats, e.g.,
old e-mail systems
Electronic discovery / litigation support
– Data collection and conversion
– Data hosting
– Filtering and searching data
Consulting
– Advising on electronic discovery issues
– Acting as special masters
Response to Anticipated Litigation / Discovery Request
Production
• Discuss options with a computer expert.
• Consider how your opponent will process the data after it
has been accessed.
• Negotiate the scope of production.
Note: By forwarding documents - whether or not in the
context of production - you may be sending data about its
creation.
What Kind of Data Can Be Found?
Data about data: Detailed information describing a
document or e-mail message, even if that e-mail has been
deleted.
Potential Criminal Liability
In Texas, if you know that an investigation by a governmental
entity has begun, and you knowingly destroy or allow to be
destroyed evidence, you may be criminally liable – even if you
did not know that the “evidence” was relevant to the specific
legal action in question.
Not Just a Defense Issue
Remember: Parties seeking information without
first establishing a reasonable basis for the
belief that it exists may have to bear the cost of
the discovery effort.
In Case You Thought They Were Kidding!
Microsoft. Microsoft balks at the government's frequent requests for emails because many revealed aggressive business tactics. Microsoft
eventually settles.
Morgan Stanley. Court imposes sanctions against Morgan Stanley and
Ronald Perelman obtains $1.45 billion award.
UBS Warburg. In Zubulake v. UBS Warburg, U.S. District Judge Shira
Scheindlin makes an adverse inference ruling against UBS, leading to a
$29.3 million verdict.
Merck. Jury returns $253 million verdict against Merck & Co. Inc., when
a scientist's e-mail suggests that the company knew two years before it
put Vioxx on sale that it might cause heart problems.
Possible Sanctions for E-Discovery Errors
• Adverse inference instruction, which allows a jury to infer
from the fact that a party destroyed certain evidence that
the evidence would have been favorable to the party’s
opponent.
• Precluding a party from introducing any evidence or
argument pertaining to a specific topic.
• Monetary sanctions, such as costs, expert fees, and
attorneys’ fees incurred as a result of the discovery abuse.
• Striking a party’s pleadings and entering judgment against
it.
When Litigation is Even Suspected
• Unless clear instructions are given immediately upon the
expectation of legal action, people will continue to act as if
their e-mails are private correspondence and not subject to
discovery.
• All impacted individuals must be immediately advised of
potential or pending legal action and instructed to use
caution in with their e-mails.
E-Discovery Information
For a searchable database of e-discovery cases, go to:
http://www.ediscoverylaw.com/
We’re Talking About Serious E-Mail Volume!
“When President Bush leaves office after eight
years, the White House is expected to turn over
more than 100 million emails to the National
Archives, the government body entrusted with
preserving America's official recorded history.”
- Wall Street Journal 12/29/05
Back to the Fundamentals
• Some common sense is necessary or our entire civil
jurisprudence system will come to a grinding halt.
• Virtually every judge with significant exposure to electronic
discovery issues knows this.
• Individual judges with no technical training have
tremendous power and discretion in this area.
• It is imperative to be open and to appear open in dealing
with electronic discovery issues.
• The appearance of not playing fair in this context can have
serious adverse consequences.
Acknowledgement
We would like to acknowledge the work of Fios Inc. and of
Sharon Caffrey, John Coughlin, and Michael Krueger of
Duane Morris, which served as the source for some of the
information in this presentation.
Download