SlideShare a Scribd company logo
1 of 37
Not Just Another E-Discovery Presentation January 26, 2010 Carla Ashley Sarah Brehm
Where are we now?
Where have we come from?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is ESI?
What has changed?
Not a new concept ,[object Object],[object Object],[object Object]
A new example… text messages ,[object Object],[object Object],[object Object],[object Object],[object Object]
2009 Trends ,[object Object],[object Object],[object Object],[object Object],[object Object]
2009 Case Law Overview
Preservation & Spoliation
State & Federal Statutes
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Louisiana Code of Civil Procedure
[object Object],[object Object],[object Object],[object Object],Electronic Warrants
Federal Rule of Civil Procedure 26 ,[object Object],[object Object]
Federal Law: Rules 26, 16, and Form 35 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Federal Claw-Back ,[object Object],[object Object],[object Object]
Email Waiver ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rules 34 & 37 ,[object Object],[object Object],[object Object]
When does duty to preserve begin? ,[object Object],[object Object]
2-Tier Analysis ,[object Object],[object Object],[object Object],[object Object]
Reasonably accessible? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Courts Expect ,[object Object],[object Object],[object Object],[object Object],[object Object]
This Rule Has Teeth ,[object Object],[object Object],[object Object],[object Object]
Recent Cases – Sanctions ,[object Object],[object Object],[object Object],[object Object]
When dismissal may be warranted ,[object Object],[object Object]
Bad Boys ,[object Object],[object Object],[object Object]
Pesky little clause ,[object Object],[object Object],[object Object]
Attorneys Sanctioned ,[object Object],[object Object],[object Object],[object Object]
Ediscovery Expert Ordered ,[object Object],[object Object],[object Object]
Justify Your Methods -  Maggette ,[object Object],[object Object],[object Object]
The Death Penalty ,[object Object],[object Object],[object Object]
Blank is Suspicious ,[object Object],[object Object],[object Object]
Adverse Inferences ,[object Object],[object Object],[object Object],[object Object]
more  Keithley ,[object Object],[object Object]
Good Faith – Lessons from  Qualcomm ,[object Object],[object Object]
Ethical Implications ,[object Object],[object Object]
Parting thoughts ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionSam Bowne
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigationedwardbel
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
 
Email Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisEmail Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisforensicEmailAnalysis
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 

What's hot (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Data recovery
Data recoveryData recovery
Data recovery
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Email Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisEmail Headers – Expert Forensic Analysis
Email Headers – Expert Forensic Analysis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 

Similar to EDiscovery Presentation

E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competencejcassd619
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008John Jablonski
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?WileyReinLLP
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizurerlhicksjr
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsJohn Jablonski
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 

Similar to EDiscovery Presentation (20)

Daniel day
Daniel dayDaniel day
Daniel day
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal Holds
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 

EDiscovery Presentation

Editor's Notes

  1. Corporate technologies – in recent study conducted by Kroll, only 50% of companies have updated their ESI discovery policies to include commonly utilized corporate technologies such as mobile devices, social networking sites, virtualization and IM (as of 2006, 81% of corporate executives were connected through mobile devices all the time and 76% of Fortune 100 companies are using social media platforms aka twitter – twitter top social media platform as of 8/3/09 www.mashable.com). Even the president stays connected - Barack Obama is first president to have PDA (wonder if he’s ever butt-dialed anyone)
  2. Many companies have document retention policies, but much less are ready to implement a discovery plan once discovery begins (conflicting priorities between legal dept. and IT), corporations trying to handle more cases with fewer resources, pressure to decrease costs while at the same time minimizing risks
  3. 1354- Reasonably accessible – undue burden or cost (insert from paper), for motion to compel BOP on person from whom production is sought (not requesting party), if they show it’s not reasonably accessible, then BOP shifts to requesting party to show good cause why production should be ordered – court may specify conditions, including allocation of cost 1424 – absolute prohibition on attorney opinion work product (CTA expand) 1425 – not discoverable absent showing of exceptional circumstances that impractical to obtain from other sources- DOES NOT preclude discovery of facts or data expert relied upon (if document contains both – can redact) 1460 – when business recs consist of ESI – you can produce as regularly maintained, or have option for inspection when burden on the same for each party 1461 – 2007 changes to 1461 and 1462 – requesting party, within scope of 1422 and 1425 can now inspect and copy the product of a computer (such as paper printout or copy on disc), no initial right to inspect computer (unless the producing party chooses to or under 1462E a court compels production) 1462(E) – specifying form (native format – metadata included – be careful what you wish for) when ESI production insufficient or not in compliance, file motion to compel – court may allow inspect, copy, test, and sample the designated ESI within scope of 1422 and 1425 1471 – good faith requirement (sanctions can’t be imposed when ESI has been lost due to routine, good faith operation of an electronic information system absent exceptional circumstances) 1551 – similar to F.R.C.P. 26 meet and confer – issues related to ESI, including forms of production – may order non-complying party to pay costs