Your SlideShare is downloading. ×
0
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Boehning De Rico 20071205 Ic Mtl
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Boehning De Rico 20071205 Ic Mtl

1,876

Published on

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,876
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    1. LES LITIGES INTER-JURIDICTIONNELS ET LA GESTION DES DOCUMENTS ÉLECTRONIQUES H. Christopher Boehning - Paul, Weiss, Rifkind, Wharton & Garrison LLP Jean-François De Rico – Langlois Kronström Desjardins SENCRL La gestion stratégique et l’administration de documents électroniques Institut Canadien Montréal – 4 et 5 décembre 2007
    2. <ul><li>I. La communication de documents électroniques dans le contexte d’un litige inter-juridictionnels </li></ul><ul><ul><li>Les règles de procédure applicables </li></ul></ul><ul><ul><li>La protection des renseignements personnels </li></ul></ul><ul><ul><li>Les Blocking Statutes </li></ul></ul><ul><li>II. Les exigences des nouvelles règles de procédure fédérales américaines </li></ul><ul><ul><li>La conservation et la préservation des documents </li></ul></ul><ul><ul><li>Les obligations en cas de litige </li></ul></ul>
    3. <ul><li>I. LA COMMUNICATION DE DOCUMENTS ÉLECTRONIQUES DANS LE CONTEXTE D’UN LITIGE INTER-JURIDICTIONNELS </li></ul>
    4. <ul><li> Les règles de procédure du forum </li></ul><ul><li>vs </li></ul><ul><li>Les lois du situs des documents </li></ul><ul><li>L’obligation de communiquer tous les documents pertinents ( semblance of relevancy) </li></ul><ul><li>L’obligation de communiquer les documents que la partie entend invoquer </li></ul><ul><li>Les demandes de communication de documents </li></ul>
    5. <ul><li>La protection des renseignements personnels </li></ul><ul><ul><li>La communication </li></ul></ul><ul><ul><li>La conservation </li></ul></ul>
    6. <ul><li>La communication </li></ul><ul><li>Loi sur la Protection des renseignements personnels et les documents électroniques </li></ul><ul><li>7(3) Pour l’application de l’article 4.3 de l’annexe 1 (la règle du consentement) et malgré la note afférente, ne peut communiquer de renseignement personnel à l’insu de l’intéressé et sans son consentement que dans les cas suivants : </li></ul><ul><li>c) elle est exigée par assignation, mandat ou ordonnance d’un tribunal, d’une personne ou d’un organisme ayant le pouvoir de contraindre à la production de renseignements ou exigée par des règles de procédure se rapportant à la production de documents; </li></ul><ul><li>Voir aussi: </li></ul><ul><li>Loi sur la Protection des renseignements personnels dans le secteur privé ,L.R.Q. c. P-39.1, art. 18(6) </li></ul><ul><li>Mccue c. Younes, 2002 CanLII 30581 (QCCS) </li></ul><ul><li>BMG Canada Inc. c. John Doe , [2005] 4 C.F. 81 </li></ul>
    7. <ul><li>La conservation </li></ul><ul><li>Le principe 5 énoncé en annexe de la Loi prévoit: </li></ul><ul><li>On ne doit conserver les renseignements personnels qu’aussi longtemps que nécessaire pour la réalisation des fins déterminées. </li></ul>
    8. <ul><li>Les lois prohibant la communication </li></ul><ul><li>Loi sur les dossiers d'entreprises </li></ul><ul><li>2. Sous réserve de l'article 3, nul ne peut, à la suite ou en vertu d'une réquisition émanant d'une autorité législative, judiciaire ou administrative extérieure au Québec, transporter ou faire transporter, ou envoyer ou faire envoyer, d'un endroit quelconque au Québec à un endroit situé hors de celui-ci, aucun document ou résumé ou sommaire d'un document relatif à une entreprise. </li></ul><ul><li>Walsh c. Gaitan & Cusack , 1993 CanLII 4101 (QC C.A.) </li></ul><ul><li>Hunt c. T&N plc , [1993] 4 R.C.S. 289. </li></ul>
    9. <ul><li>II. LES STRATÉGIES À ADOPTER EN MATIÈRES DE CONSERVATION ET DE COMMUNICATION DE DOCUMENTS ÉLECTRONIQUES POUR SE CONFORMER AUX NOUVELLES RÈGLES DE PROCÉDURE AMÉRICAINES </li></ul><ul><li>II. STRATEGIES FOR LITIGATION, DOCUMENT RETENTION AND DOCUMENT PRESERVATION UNDER THE NEW RULES </li></ul>
    10. <ul><ul><ul><li>Introduction </li></ul></ul></ul><ul><ul><ul><li>Mapping Information Systems </li></ul></ul></ul><ul><ul><ul><li>Document Retention Policies </li></ul></ul></ul><ul><ul><ul><li>What to Do When Litigation Commences </li></ul></ul></ul><ul><ul><ul><li>Strategies Once A Litigation is Underway </li></ul></ul></ul><ul><ul><ul><li>Wrap Up and Q&A </li></ul></ul></ul>
    11. <ul><li>The Amended Rules </li></ul><ul><ul><li>Early Planning and Discussion </li></ul></ul><ul><ul><li>Rule 16(b): Initial Pre-Trial Conference </li></ul></ul><ul><ul><li>Rule 26(a), 26(b)(2), 26(b)(5), 26(f): Initial Disclosures </li></ul></ul><ul><ul><li>Rule 33: Interrogatories </li></ul></ul><ul><ul><li>Rule 34: Production of Documents </li></ul></ul><ul><ul><li>Rule 37(f): The &quot;Safe Harbor&quot; </li></ul></ul><ul><ul><li>Rule 45: Subpoenas </li></ul></ul>
    12. Strategies for Litigation, Document Retention and Document Preservation Under the New Rules <ul><ul><ul><li>Mapping Information Systems </li></ul></ul></ul>
    13. Strategies for Litigation, Document Retention and Document Preservation Under the New Rules <ul><ul><li>Survey from ComputerWorld, just prior to Dec.1, 2006: </li></ul></ul><ul><ul><li>About 42 percent of the 170 IT Managers and staff surveyed </li></ul></ul><ul><ul><li>said they did not know the status of their company's </li></ul></ul><ul><ul><li>preparedness for the new rules, while 32 percent said their </li></ul></ul><ul><ul><li>company was not at all prepared. 15 percent they were </li></ul></ul><ul><ul><li>half-way prepared and 5 percent they were prepared. </li></ul></ul>
    14. Mapping Information Systems <ul><ul><li>Identify a Senior IT Representative to Oversee </li></ul></ul><ul><ul><li>and Coordinate Litigation Strategies </li></ul></ul><ul><ul><ul><li>Retention </li></ul></ul></ul><ul><ul><ul><li>Preservation </li></ul></ul></ul><ul><ul><ul><li>Coordination of Holds </li></ul></ul></ul><ul><ul><ul><li>Meet and Confer </li></ul></ul></ul><ul><ul><ul><li>Discovery Searches </li></ul></ul></ul><ul><ul><ul><li>Potential 30(b)(6) Witness </li></ul></ul></ul>
    15. Mapping Information Systems <ul><ul><li>What is Mapping Information Systems? </li></ul></ul><ul><ul><ul><li>A comprehensive picture of a company's technology architecture </li></ul></ul></ul><ul><ul><ul><li>A detailed representation of the type and location of all data throughout a company </li></ul></ul></ul><ul><ul><ul><li>Policies and Procedures for employment changes and technology changes </li></ul></ul></ul>
    16. <ul><ul><li>A comprehensive picture of the type and location of all data throughout a company </li></ul></ul><ul><ul><ul><li>Servers – both those with active and dynamic data, such as file servers and e-mail and voicemail servers, instant messaging </li></ul></ul></ul><ul><ul><ul><li>Data Management Systems – back-up tapes, financial systems, disaster recovery systems </li></ul></ul></ul><ul><ul><ul><li>Devices – desktop/laptops, PDAs, cell phones </li></ul></ul></ul><ul><ul><ul><li>Portable Media – flash drives, hard drives, CD/DVDs </li></ul></ul></ul><ul><ul><ul><li>Hosted Data – payroll systems </li></ul></ul></ul><ul><ul><ul><li>Third Party Vendors – spam filtering </li></ul></ul></ul>
    17. <ul><li>Sample Architecture Map </li></ul>
    18. <ul><li>Sample Data Map </li></ul>
    19. <ul><li>Sample Data Map </li></ul>
    20. Mapping Information Systems <ul><ul><li>Policies and Procedures for Employment Changes and Technology Changes </li></ul></ul><ul><ul><ul><li>New Employees and Departing Employees </li></ul></ul></ul><ul><ul><ul><ul><li>What happens to former employees' shared drives, e-mail and computers? </li></ul></ul></ul></ul><ul><ul><ul><li>New Technologies and &quot;Upgrades&quot; </li></ul></ul></ul><ul><ul><ul><ul><li>How does a technology upgrade change where and what information is being saved? </li></ul></ul></ul></ul><ul><ul><ul><ul><li>What happens to older computers, for example, has a VP's laptop been bequeathed to someone else? </li></ul></ul></ul></ul>
    21. Strategies for Litigation, Document Retention and Document Preservation Under the New Rules <ul><ul><ul><li>Document Retention Policies </li></ul></ul></ul>
    22. Document Retention Policies <ul><li>Companies Must Have A Document Retention Policy </li></ul><ul><ul><li>No need to keep everything </li></ul></ul><ul><ul><li>&quot;Document retention policies, which are created in part to keep certain information from getting into the hands of others, including the Government, are common in business … It is, of course, not wrongful, for a manager to instruct his employees to comply with a valid document retention policy under ordinary circumstances.&quot; Arthur Andersen LLP v. United States , 544 U.S. 696, 704 (2005). </li></ul></ul><ul><ul><li>Too costly and burdensome </li></ul></ul>
    23. Document Retention Policies <ul><li>The Sedona Guidelines: Best Practice Guidelines & </li></ul><ul><li>Commentary for Managing Information & Records in the </li></ul><ul><li>Electronic Age </li></ul><ul><li>1. An organization should have reasonable policies and procedures for managing its information and records. </li></ul><ul><li>1.c. Defensible policies need not mandate the retention of all information and documents. </li></ul><ul><li>3. An organization need not retain all electronic information ever generated or received. </li></ul><ul><li>3.a. Destruction is an acceptable stage in the information life cycle; an organization may destroy or delete electronic information when there is no continuing value or need to retain it. </li></ul><ul><li>3.b. Systematic deletion of electronic information is not synonymous with evidence spoliation. </li></ul>
    24. <ul><li>What Kind of Retention Policy is Appropriate? </li></ul><ul><li>Realistic </li></ul><ul><li>Practical </li></ul><ul><li>Tailored to your organization </li></ul>
    25. Document Retention Policies <ul><li>Once You've Adopted a Policy, Then What? </li></ul><ul><li>Policy only as good as thoroughness of its implementation </li></ul><ul><li>Key is systematic enforcement throughout company </li></ul><ul><li>Education of employees </li></ul><ul><li>Cannot have periodic, random, or ad hoc enforcement </li></ul>
    26. Document Retention Policies <ul><li>Why Have a Retention Policy? </li></ul><ul><li>Reduces cost of maintaining information </li></ul><ul><li>Justifies periodic destruction of documents </li></ul><ul><li>May provide a &quot;safe harbor&quot; under new Rule 37(f) </li></ul><ul><li>Provides necessary guidance </li></ul>
    27. Document Retention Policies <ul><li>Steps to Creating a Retention Policy: </li></ul><ul><ul><li>Create a cross-functional team </li></ul></ul><ul><ul><li>Identify regulatory/legal compliance mandates and draft policy </li></ul></ul><ul><ul><li>Build a retention schedule </li></ul></ul><ul><ul><li>Determine functional/technical requirements </li></ul></ul><ul><ul><li>Select and deploy the technology </li></ul></ul><ul><ul><li>Communicate policy and processes </li></ul></ul><ul><ul><li>Establish audit/compliance processes </li></ul></ul>
    28. Document Retention Policies <ul><li>Conclusions </li></ul><ul><li>Design document retention program independent of pending or threatened litigation </li></ul><ul><li>Implement and enforce it on a routine basis throughout the company </li></ul><ul><li>Design it with an eye towards specific needs and obligations of your company </li></ul><ul><li>Suspend it when litigation is reasonably foreseeable </li></ul>
    29. <ul><ul><ul><li>What To Do When Litigation Commences </li></ul></ul></ul>
    30. What to Do When Litigation Commences <ul><li>When Do You Institute a Litigation Hold? </li></ul><ul><ul><li>Actual notice of litigation or document demand </li></ul></ul><ul><ul><li>Litigation &quot;reasonably foreseeable&quot; </li></ul></ul>
    31. What to Do When Litigation Commences <ul><li>What Documents Must be Preserved? </li></ul><ul><li> Documents </li></ul><ul><ul><ul><li>in existence at the time the duty to preserve documents arises or </li></ul></ul></ul><ul><ul><ul><li>created subsequent to that time </li></ul></ul></ul><ul><ul><li>that a party knows or reasonably should know are </li></ul></ul><ul><ul><ul><li>relevant in the litigation </li></ul></ul></ul><ul><ul><ul><li>reasonably calculated to lead to the discovery of admissible evidence in the litigation </li></ul></ul></ul><ul><ul><ul><li>reasonably likely to be requested during discovery in the litigation or </li></ul></ul></ul><ul><ul><ul><li>the subject of a pending discovery request. </li></ul></ul></ul><ul><ul><ul><li>See Zubulake v. UBS Warburg LLC , 220 F.R.D. 212, 217 (S.D.N.Y. 2003). </li></ul></ul></ul>
    32. What to Do When Litigation Commences <ul><ul><li>What Steps Can be Taken to Satisfy The </li></ul></ul><ul><ul><li>Duty to Preserve Documents? </li></ul></ul><ul><ul><ul><li>Understand the electronic data infrastructure </li></ul></ul></ul><ul><ul><ul><li>Implement the litigation hold </li></ul></ul></ul><ul><ul><ul><li>Keep records of everything done to satisfy the duty to preserve documents </li></ul></ul></ul>
    33. What to Do When Litigation Commences <ul><ul><li>What Steps Can be Taken to Satisfy The </li></ul></ul><ul><ul><li>Duty to Preserve Documents? </li></ul></ul><ul><ul><ul><li>Understand the electronic data infrastructure </li></ul></ul></ul><ul><ul><ul><li>Implement the litigation hold </li></ul></ul></ul><ul><ul><ul><li>Keep records of everything done to satisfy the duty to preserve documents </li></ul></ul></ul>
    34. What to Do When Litigation Commences <ul><ul><li>What Steps Can be Taken to Satisfy The </li></ul></ul><ul><ul><li>Duty to Preserve Documents? </li></ul></ul><ul><li>Implement the Litigation Hold </li></ul><ul><ul><ul><li>Identify relevant custodians and repositories of documents and data, including through interviews of persons involved in the subject of the litigation (checklists for these interviews are often helpful) </li></ul></ul></ul><ul><ul><ul><li>Notify relevant personnel of litigation hold </li></ul></ul></ul><ul><ul><ul><ul><li>Custodians with relevant documents or data </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Persons responsible for relevant repositories of documents and data, both on-site and offsite </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Information technology personnel </li></ul></ul></ul></ul>
    35. What to Do When Litigation Commences <ul><ul><li>What Steps Can be Taken to Satisfy The </li></ul></ul><ul><ul><li>Duty to Preserve Documents? </li></ul></ul><ul><li>Implement the Litigation Hold </li></ul><ul><ul><ul><li>Take affirmative steps to preserve data, including: </li></ul></ul></ul><ul><ul><ul><li>Creating a “snapshot&quot; of existing data </li></ul></ul></ul><ul><ul><ul><li>Halting the deletion or overwriting of backups, and if possible segregating backups </li></ul></ul></ul><ul><ul><ul><li>Making provision for later-created documents </li></ul></ul></ul>
    36. What to Do When Litigation Commences <ul><ul><li>What Steps Can be Taken to Satisfy The </li></ul></ul><ul><ul><li>Duty to Preserve Documents? </li></ul></ul><ul><ul><ul><li>Understand the electronic data infrastructure </li></ul></ul></ul><ul><ul><ul><li>Implement the litigation hold </li></ul></ul></ul><ul><ul><ul><li>Keep records of everything done to satisfy the duty to preserve documents </li></ul></ul></ul>
    37. What to Do When Litigation Commences <ul><ul><li>What Are the Potential Consequences of </li></ul></ul><ul><ul><li>Failure to Satisfy the Duty to Preserve </li></ul></ul><ul><ul><li>Documents? </li></ul></ul><ul><ul><ul><li>Criminal prosecution </li></ul></ul></ul><ul><ul><ul><li>Regulatory sanctions </li></ul></ul></ul><ul><ul><ul><li>Civil sanctions </li></ul></ul></ul><ul><ul><ul><ul><li>Monetary sanctions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Evidentiary sanctions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Imposition of higher burdens of proof </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Entry of judgment against the offender </li></ul></ul></ul></ul><ul><ul><ul><li>Disciplinary sanctions against lawyers </li></ul></ul></ul>
    38. Strategies for Litigation, Document Retention and Document Preservation Under the New Rules <ul><ul><ul><li>Strategies Once A Litigation is Underway </li></ul></ul></ul>
    39. Strategies Once A Litigation is Underway <ul><li>The Ground Rules </li></ul><ul><ul><li>Plan ahead </li></ul></ul><ul><ul><li>Stay focused </li></ul></ul><ul><ul><li>Hide the ball at your peril </li></ul></ul><ul><ul><li>Know what you control </li></ul></ul><ul><ul><li>Don't over delegate </li></ul></ul>
    40. Strategies Once A Litigation is Underway <ul><li>The Basics </li></ul><ul><ul><li>Identify what information exists </li></ul></ul><ul><ul><li>Determine the burden and cost of producing information </li></ul></ul><ul><ul><li>Identify what you are not willing to search/produce/retrieve </li></ul></ul><ul><ul><li>Develop a reasonable search protocol </li></ul></ul><ul><ul><li>Identify a preferred production method </li></ul></ul><ul><ul><li>Make a proposal </li></ul></ul>
    41. Strategies Once A Litigation is Underway <ul><li>District of Delaware - Default Standard for Discovery of </li></ul><ul><li>Electronic Documents (&quot;E-Discovery&quot;) </li></ul><ul><li>Discovery Conference </li></ul><ul><li>Parties shall discuss the parameters of their anticipated e-discovery at the Fed. R. Civ. P. 26(f) conference, as well as at the Fed. R. Civ. P. 16 scheduling conference with the court, consistent with the concerns outlined below. More specifically, prior to the Rule 26(f) conference, the parties shall exchange the following information: </li></ul><ul><ul><li>A list of the most likely custodians of relevant electronically stored information, including a brief description of each person’s title and responsibilities. </li></ul></ul><ul><ul><li>A list of each relevant electronic system that has been in place at all relevant times (*) and a general description of each system including, but not limited to, the nature, scope, character, organization, and formats employed in each system. The parties should also discuss whether their electronically stored information is reasonably accessible. Electronically stored information that is not reasonably accessible may include information created or used by electronic media no longer in use, maintained in redundant electronic storage media, or for which retrieval otherwise involves undue burden or substantial cost. </li></ul></ul><ul><ul><li>(*) For instance, in a patent case, the relevant times for a patent holder may be the date the patent(s) issued or the effective filing date of each patent in suit. </li></ul></ul>
    42. Strategies Once A Litigation is Underway <ul><li>District of Delaware - Default Standard for Discovery of </li></ul><ul><li>Electronic Documents (&quot;E-Discovery&quot;) </li></ul><ul><li>Discovery Conference </li></ul><ul><ul><li>The name of the individual responsible for retention of that party’s electronically stored information (.the retention coordinator.), as well as a general description of that party’s retention policies for the systems identified above (see ¶ 7). </li></ul></ul><ul><ul><li>The name of the individual who shall serve as that party’s liaison for e-discovery (.e-discovery liaison.) (see ¶ 3). </li></ul></ul><ul><ul><li>Provide notice of any problems reasonably anticipated to arise in connection with e-discovery, e.g., email duplication. </li></ul></ul><ul><ul><li>To the extent that the state of the pleadings does not permit a meaningful discussion of the above by the time of the Rule 26(f) conference, the parties shall either agree on a date by which this information will be mutually exchanged or submit the issue for resolution by the court at the Rule 16 scheduling conference. </li></ul></ul>
    43. Strategies Once A Litigation is Underway <ul><li>District of Delaware - Default Standard for Discovery of </li></ul><ul><li>Electronic Documents (&quot;E-Discovery&quot;) </li></ul><ul><li>E-Discovery Liaison </li></ul><ul><li>In order to promote communication and cooperation between the parties, each party to a case shall designate an e-discovery liaison through which all e-discovery requests and responses shall be made. Regardless of whether the e-discovery liaison is an attorney (in-house or outside counsel), a third party consultant, or an employee of the party, he or she must be: </li></ul><ul><ul><li>Familiar with the party’s electronic systems and capabilities in order to explain these systems and answer relevant questions. </li></ul></ul><ul><ul><li>Knowledgeable about the technical aspects of e-discovery, including the storage, organization, and format issues relating to electronically stored information. </li></ul></ul><ul><ul><li>Prepared to participate in e-discovery dispute resolutions. </li></ul></ul><ul><li>The court notes that, at all times, the attorneys of record shall be responsible for compliance with e-discovery requests. However, the e-discovery liaisons shall be responsible for organizing each party’s e-discovery efforts to insure consistency and thoroughness and, generally, to facilitate the e-discovery process. </li></ul>
    44. Strategies Once A Litigation is Underway <ul><li>District of Delaware - Default Standard for Discovery of </li></ul><ul><li>Electronic Documents (&quot;E-Discovery&quot;) </li></ul><ul><li>Search Methodology </li></ul><ul><li>If the parties intend to employ an electronic search to locate relevant electronically stored information, the parties shall disclose any restrictions as to the scope and method which might affect their ability to conduct a complete electronic search of such information. The parties shall reach agreement as to the method of searching, and the words, terms, and phrases to be searched with the assistance of the respective e-discovery liaisons, who are charged with familiarity with the parties’ respective systems. The parties also shall reach agreement as to the timing and conditions of any additional searches which may become necessary in the normal course of discovery. To minimize the expense, the parties may consider limiting the scope of the electronic search (e.g., time frames, fields, document types). </li></ul>
    45. Strategies Once A Litigation is Underway <ul><li>District of Delaware - Default Standard for Discovery of </li></ul><ul><li>Electronic Documents (&quot;E-Discovery&quot;) </li></ul><ul><li>Format </li></ul><ul><li>If, during the course of the Rule 26(f) conference, the parties cannot agree to the format for production of their electronically stored information, as permitted by Fed. R. Civ. P. 34, such information shall be produced to the requesting party as text searchable image files (e.g., PDF or TIFF), unless unduly burdensome or cost-prohibitive to do so. When a text searchable image file is produced, the producing party must preserve the integrity of the underlying electronically stored information, i.e., the original formatting, the metadata and, where applicable, the revision history. After initial production in text searchable image file format is complete, a party must demonstrate particularized need for production of electronically stored information in native format. </li></ul>
    46. Strategies Once A Litigation is Underway <ul><li>District of Delaware - Default Standard for Discovery of </li></ul><ul><li>Electronic Documents (&quot;E-Discovery&quot;) </li></ul><ul><li>Retention </li></ul><ul><li>Within the first 30 days of discovery, the parties should work towards an agreement (akin to the standard protective order) that outlines the steps each party shall take to segregate and preserve the integrity of all relevant electronically stored information. In order to avoid later accusations of spoilation, a Fed. R. Civ. P. 30 (b)(6) deposition of each party's retention coordinator may be appropriate. </li></ul><ul><li>The retention coordinator shall: </li></ul><ul><ul><li>Take steps to ensure that e-mail of identified custodians shall not be permanently deleted in the ordinary course of business and that all other electronically stored information maintained by the identified custodians shall not be altered. </li></ul></ul><ul><ul><li>Provide notice as the criteria used for spam/virus filtering of e-mail and attachments; e-mail and attachments filtered out by such systems shall be deemed non-responsive as long as the criteria underlying the filtering are reasonable. Within 7 days of identifying relevant custodians, the retention coordinators shall implement the above procedures, and each party's counsel shall file a statement of compliance as such with the court. </li></ul></ul>
    47. Strategies Once A Litigation is Underway <ul><li>Accessible v. Inaccessible </li></ul><ul><li>Active, online data ( i.e. hard drives) </li></ul><ul><li>Near-line data (data in some sort of automated retrieval system) </li></ul><ul><li>Offline storage data (involving manual intervention to retrieve) </li></ul><ul><li>Backup tapes (compressed backups used for emergency data retrieval) </li></ul><ul><li>Erased, fragmented, or damaged data </li></ul>
    48. Strategies Once A Litigation is Underway <ul><li>&quot;In civil cases, I've instructed law firms directly that they are to </li></ul><ul><li>conduct the discovery of documents themselves and not have </li></ul><ul><li>corporate counsel conduct that discovery. They're representing </li></ul><ul><li>the client in the courtroom. And in-house counsel is not. They're </li></ul><ul><li>making a representation to the Court that the documents are, in </li></ul><ul><li>fact, the true documents that are requested in discovery. Not in- </li></ul><ul><li>house counsel. And they cannot rely on them. In-house counsel </li></ul><ul><li>has other loyalties. They can lose their job if they disclose them. </li></ul><ul><li>Outside counsel, it's true, the firm can lose the representation, </li></ul><ul><li>but if we're going to have independence in the bar and rely on the </li></ul><ul><li>bar, we've got to have them do the work…&quot; </li></ul><ul><li>Transcript of hearing at 15, United States v. Cardoso , 05 CR 563 (RPP), </li></ul><ul><li>(Sept. 20, 2006). </li></ul>
    49. Strategies Once A Litigation is Underway <ul><li>Make A Proposal </li></ul><ul><ul><li>List sources you propose to search/retrieve and those you do not propose to search/retrieve </li></ul></ul><ul><ul><li>When appropriate, identify search terms you propose to use or request a list of search terms </li></ul></ul><ul><ul><li>Suggest format for production </li></ul></ul>
    50. Strategies Once A Litigation is Underway <ul><li>Managing The Phases of E-Discovery </li></ul><ul><ul><li>Collection </li></ul></ul><ul><ul><ul><li>Logistics and project management </li></ul></ul></ul><ul><ul><ul><li>Be mindful of chain of custody issues </li></ul></ul></ul><ul><ul><ul><li>Consider a checklist </li></ul></ul></ul><ul><ul><ul><li>Prioritize </li></ul></ul></ul><ul><ul><ul><li>Do-it-yourself? </li></ul></ul></ul><ul><ul><li>Processing </li></ul></ul><ul><ul><ul><li>One size does not necessarily fit all </li></ul></ul></ul><ul><ul><ul><ul><li>Different vendors/strategies depending on needs of case </li></ul></ul></ul></ul><ul><ul><ul><li>Consider all phases </li></ul></ul></ul><ul><ul><ul><ul><li>Form of production? </li></ul></ul></ul></ul><ul><ul><li>Reviewing </li></ul></ul><ul><ul><ul><li>Develop and implement a review strategy </li></ul></ul></ul><ul><ul><ul><ul><li>Artificial Intelligence? </li></ul></ul></ul></ul><ul><ul><ul><li>Project management </li></ul></ul></ul><ul><ul><li>Producing </li></ul></ul><ul><ul><ul><li>Be open with adversaries, regulators, etc. </li></ul></ul></ul>
    51. LES LITIGES INTER-JURIDICTIONNELS ET LA GESTION DES DOCUMENTS ÉLECTRONIQUES H. Christopher Boehning - Paul, Weiss, Rifkind, Wharton & Garrison LLP Jean-François De Rico – Langlois Kronström Desjardins SENCRL La gestion stratégique et l’administration de documents électroniques Institut Canadien Montréal – 4 et 5 décembre 2007

    ×