• Save
Electronic Document Retention And Legal Holds
Upcoming SlideShare
Loading in...5
×
 

Electronic Document Retention And Legal Holds

on

  • 1,672 views

Overview of the duty to preserve records, the Seven Steps of a legal hold business process and basic evidence for the admissibility of electronic evidence (aka ESI)

Overview of the duty to preserve records, the Seven Steps of a legal hold business process and basic evidence for the admissibility of electronic evidence (aka ESI)

Statistics

Views

Total Views
1,672
Views on SlideShare
1,664
Embed Views
8

Actions

Likes
0
Downloads
0
Comments
0

3 Embeds 8

http://www.slideshare.net 3
http://www.linkedin.com 3
https://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Introduction:

Electronic Document Retention And Legal Holds Electronic Document Retention And Legal Holds Presentation Transcript

  • www.GoldbergSegalla.com Electronic Document Retention and Rules of Evidence Presented by: John J. Jablonski, Esq. PHILADELPHIA – NEW YORK – BUFFALO – ROCHESTER – SYRACUSE – ALBANY – WHITE PLAINS – LONG ISLAND – PRINCETON – HARTFORD – AFFILIATED EUROPEAN OFFICES
    • AGENDA
    • Preserving Documents: What is a Hold Policy?
    • Destroying Documents: Spoliation and Recent Court Decisions Shaping Preservation of Records / Legal Hold Practices
    • Presenting Electronic Evidence
  • Are Legal Hold’s Necessary?
    • Current Trends
    • Document Destruction
    • Duty to Preserve Documents
    • Balancing Act
    • Reasonable Anticipation of Litigation
    • Drawing the Line
  • 1. What is a Hold Policy?
    • Sample definition recommended to a client :
    • “ Suspends routine destruction of Records and other documents upon a finding that such suspension is necessary under applicable law due to actual or reasonably anticipated litigation or governmental investigation (or audit, for any documents not otherwise appropriately retained under a Tax Audit Record Series).
    • To be reasonably anticipated, particular litigation or investigative proceedings related to specific facts and circumstances must be anticipated, and not the mere fact that litigation regarding a particular topic is a general possibility. The Legal Department shall wholly or partially release a Legal Hold and issue instructions to return to routine retention those released Records and other documents immediately after the matter has been wholly or partially resolved.”
  • 2. Spoliation of Evidence
    • Where courts have great discretion, at minimum, to impose sanctions for destroying records relevant to pending or potential litigation.
    • Some states recognize it as a separate cause of action, while others simply give courts discretion on how to punish the parties involved.
    • New York Has Yet to Adopt a Separate Cause of Action.
  • Spoliation Sanctions
    • Evidentiary or legal sanctions
      • Not allowing documents introduced at trial
      • Special jury instructions or assumptions
      • Adverse Inference Charge
    • Financial sanctions
    • Fines per Statute (e.g., $5 mill per S-Ox)
    • Imprisonment per Statute (e.g., 20 yrs per S-Ox)
    • New lawsuit in states where available
    • Report to State Bar (it is unethical to destroy evidence)
  • The Duty to Preserve Continuum
    • Statutory or regulatory obligations to preserve
    • Statutes of limitations
    • Duty arising from potential or threatened litigation or investigation
    • Duty created by preservation letter from opposing counsel or agency
    • Duty created by service of a complaint and resulting civil discovery statutes, discovery requests or court orders
    • Items 3 to 5 should trigger legal holds.
  • What is Foreseeable Litigation?
    • General Guidelines per Zubulake & Sedona Principles
      • Sedona Principle #5
      • Zubulake IV
  • Sedona Principle #5
    • “ The obligation to preserve electronic data and documents requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation. However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant data.”
  • Duty to Preserve Documents
    • Zubulake IV (SDNY 2003) 220 F.R.D. 212, 216
    • “ Identifying the boundaries of the duty to preserve involves two related inquiries:
    • 1. When does the duty to preserve attach, and
    • 2. What evidence must be preserved?”
    • Citing Fujitsu v. Fedex (2d Cir. 2001) 247 F.3rd 423.
  • Foreseeable Litigation in General
    • Zubulake IV (SDNY 2003) 220 F.R.D. 212, 216
    • “ The obligation to preserve evidence thus arises:
    • When the party has notice that the evidence is relevant to litigation; or
    • When a party should have known that the evidence may be relevant to future litigation.”
  • 1. Trigger Event 2. Analyze Duty To Preserve 3. Define Scope 4. Implement Hold 5. Enforce & Examine 6. Modify NO Implementation / Oversight / Training / Audit / Tracking / Legal Hold Releases Preservation Not Required YES 7. Monitor & Remove
  • Step 1: Identify Trigger Events
    • Filing an Administrative Claim;
    • Organizational Knowledge of Potential Claim;
    • Conversations With Supervisors;
    • Retainer of Counsel and Experts;
    • Compiling a List of Opponents to Sue;
    • Threat to Sue Letter;
    • Prior Events That Have Led to Litigation;
    • Industry Wide Litigation;
    • Agency Investigation; and
    • Service of a Lawsuit.
  • Step 2: Analyze Dute to Preserve
    • Who determines whether a legal hold is necessary?
    • Collect Facts To Make Determination
    • Organizational Analysis
    • Legal analysis
  • Step 3: Define Scope Hold
    • Scope to be determined on a case by case analysis… Examples include:
      • Email
      • System Log Data
    • Possible Data Locations
    • What is reasonable?
    • Records and Other ESI Requiring Special Attention
    • Copyright infringement case filed 2/06
    • Held that preservation duty creates obligation to modify or suspend features or routine operation of electronic systems
    • Data stored temporarily in RAM for 6 hours (not Preserved)
    • Notified to preserve server log data 5/06
      • IP addresses of users of def’s website
      • Request for dot-torrent files
      • Dates and times of requests
    Columbia Pictures v. Bunnell (2007)
    • There was no prior precedent for RAM discovery
    • There was no specific request or discovery to preserve the data at issue
    • There was no violation of a preservation order
    • Decision recently upheld on appeal
    Columbia Pictures v. Bunnell (Cont’d.)
  • Step 4: Implement Hold
    • Who issues Hold order?
    • Who receives Hold order?
    • Form of Hold orders (notices & content)
    • Coordinating with IT
    • Technical Considerations (the Data Map)
    • Interview Key Witnesses
  • Step 5: Enforce and Examine Effectiveness of the Hold
    • Interview Key Witnesses
    • Get Together with IT
    • Consult with Legal Hold Oversight Committee
  • Step 6: Modify the Legal Hold
    • Re-check scope of Distribution
    • Broadening or Narrowing
    • Adding Custodians
    • Discussions with Potential Litigants
    • Court Orders
    • Modify Scope of Records
  • Step 7: Monitor / Remove
    • Audits
    • Record Hold Reminders
    • Issuance to New Employees
    • Narrow Over Time
    • Monitor Holds and Re-Check
    • Management of Terminated Employees
    • Releasing Legal Holds
    • The Cascading Hold Dilemma
  • Evidence 101
    • 1. Is the ESI relevant ? (Rule 401);
    • 2. Is it authentic ? (Rule 901);
    • 3. Is it hearsay , being offered for its substantive truth? (Rule 801) (If hearsay, does an exception apply? (Rules 803, 804 and 807);
    • 4. Is the ESI an original or duplicate ? If not, is there admissible secondary evidence to prove the content of the ESI? (Rules 1001-1008); and
    • 5. Is the probative value of the ESI substantially outweighed by the danger of unfair prejudice ? (Rule 403).
  • 2. Authentic Rule 901. Requirement of Authentication or Identification
    • (a) General provision.
    • The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.
    • (b) Illustrations.
    • By way of illustration only, and not by way of limitation, the following are examples of authentication or identification conforming with the requirements of this rule:
  • Rule 901. Requirement of Authentication or Identification
    • (1) Testimony of witness with knowledge.
    • Testimony that a matter is what it is claimed to be.
    • NOTE: A court may deem a lay witnesses testimony insufficient to address the underlying foundation necessary to admit electronically stored information into evidence. See Bazak Int’l Corp. v. Tarrant Apparel Group, 378 F.Supp.2d 377 (SDNY 2005) (holding that the authenticity of e-mail could not be determined by witness affidavit where a witness was not designated as an “expert witness.”)
  • Rule 901. Requirement of Authentication or Identification
    • (3) Comparison by trier or expert witness .
    • Comparison by the trier of fact or by expert witnesses with specimens which have been authenticated.
  • Rule 901. Requirement of Authentication or Identification
    • (7) Public records or reports.
    • Evidence that a writing authorized by law to be recorded or filed and in fact recorded or filed in a public office, or a purported public record, report, statement, or data compilation, in any form, is from the public office where items of this nature are kept.
  • Rule 901. Requirement of Authentication or Identification
    • (4) Distinctive characteristics and the like .
    • Appearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.
  • Rule 901. Requirement of Authentication or Identification
    • Process or system .
    • Evidence describing a process or system used to produce a result and showing that the process or system produces an accurate result.
  • Rule 902. Self-Authentication
    • Extrinsic evidence of authenticity as a condition precedent to admissibility is not required with respect to the following:
    • Certified domestic records of regularly conducted activity.
    • The original or a duplicate of a domestic record of regularly conducted activity that would be admissible under Rule 803(6) if accompanied by a written declaration of its custodian or other qualified person, in a manner complying with any Act of Congress or rule prescribed by the Supreme Court pursuant to statutory authority, certifying that the record:
  • Rule 902. Self-Authentication
    • (11) Certified domestic records of regularly conducted activity.
    • Continued…
    • (A) was made at or near the time of the occurrence of the matters set forth by, or from information transmitted by, a person with knowledge of those matters;
    • (B) was kept in the course of the regularly conducted activity; and
    • (C) was made by the regularly conducted activity as a regular practice.
    • “ Computerized data” raises unique issues concerning accuracy and authenticity.
    • Accuracy may be impaired by incomplete data entry, mistakes in output instructions, programming errors, damage and contamination of storage media, power outages, and equipment malfunctions.
    • The integrity of data may also be compromised in the course of discovery by improper search and retrieval techniques, data conversion, or mishandling.
    • The proponent of computerized evidence has the burden of laying a proper foundation by establishing its accuracy.
  •  
  • In re Vee Vinhnee, 336 B.R. 437 (9th Cir. BAP 2005)
    • Most federal courts admit computer records under Fed. R. Evid. 803(6) on a showing that they are business records kept pursuant to a routine procedure for reasons that tend to assure their accuracy. See, e.g., United States v. Salgado, 250 F.3d 438, 452 (6th Cir. 2001); United States v. Destnik, 36 F.3d 904, 909-10 (10th Cir. 1994).
    • Vinhnee is a significant departure from this permissive approach.
    • An American Express employee testified, as custodian of records, that the entries in computerized credit card records were made at or about the time of the transactions, and that the records were kept in the ordinary course of business pursuant to a regular business practice.
    • The debtor did not object (he didn't appear for trial), the bankruptcy court sua sponte required additional foundational testimony regarding the computer, software and procedures to assure continuing accuracy of the data.
    • After supplementing the record the bankruptcy court excluded the electronic records and entered judgment for the debtor, adding "salt to the wound" by noting that American Express "would have prevailed on one of two counts if the records had been admitted." 336 B.R. at 440.
    • business uses a computer.
    • computer is reliable.
    • business has developed a procedure for inserting data into the computer.
    • procedure has built-in safeguards to ensure accuracy and identify errors.
    • business keeps the computer in a good state of repair.
    • witness had the computer readout certain data.
    • witness used the proper procedures to obtain the readout.
    • computer was in working order at the time the witness obtained the readout.
    • witness recognizes the exhibit as the readout.
    • 10. witness explains how he or she recognizes the readout.
    • 11. If the readout contains strange symbols or terms, the witness explains the meaning of the symbols or terms for the trier of fact.
    In re Vee Vinhnee at 446-47
    • E-Mail
    • Monotype Corp. PLC v. Int'l Typeface, 43 F.3d 443, 450 (9th Cir. 1994) (affirming trial court's exclusion of e-mail as inadmissible as a business record);
    • U.S. v. Safavian, 435 F.Supp.2d 36 (DDC 2006) (recognizing that e-mail may be authenticated by distinctive characteristics 901(b)(4), or by comparison of exemplars with other e-mails that already have been authenticated 901(b)(3));
    • U.S. v. Siddiqui, 235 F.3d 1318 (e-mail may be authenticated entirely by circumstantial evidence, including its distinctive characteristics);
    • Rambus v. Infineon Tech, 348 F.Supp.2d 698 (EDVa 2004) (e-mail that qualifies as business record may be self-authenticating under 902(11)); and
    • In re F.P., 878 A.2d 91 (Pa. Super. 2005) (e-mail may be authenticated by direct or circumstantial evidence).
  • Thank You
    • John J. Jablonski, Esq.
    • 716.566.5469
    • [email_address]
    • © COPYRIGHT 2008 Goldberg Segalla LLP
    • RIGHT OF REPRODUCTION GRANTED TO LORMAN / ALL RIGHTS RESERVED