SlideShare a Scribd company logo
1 of 1
Download to read offline
Pre-CMC E-Disclosure Timeline
Much emphasis is given to the new pre-CMC deadlines imposed by Jackson in April 2013,
and there have already been a number of high-profile dressing downs of parties who
have not adhered to them - the now infamous Mitchell being the main example of this.
When it comes to e-disclosure, if the parties have exchanged an Electronic Documents
Questionnaire (form N264), they should file it with their Disclosure Report no less than
14 days prior to the first CMC, and discuss disclosure no less than seven days in
advance. A naive lawyer will leave it to the last minute before looking to address these
two requirements.
As Rix LJ in Nichia v Argos [2007] EWCA Civ 741 said ‘Indeed, it is hard to think that
even before launching proceedings, a claimant has not carried out, in its own interests,
such a review of its own documents as will in all probability have already met, or all but
met, the requirements of a reasonable search’.
For example, I recently assisted a lawyer in the completion of the EDQ 15 days in
advance of the first CMC. This assistance involved helping them to formulate a
questionnaire for the client’s IT team and then subsequently collating and analysing the
responses. I am sure that while the client was contemplating litigation they would have
gone through a similar process internally, to find where relevant information might exist.
Also, to ensure they were complying with their duty to preserve, an exercise must have
been carried out to discover where information exists in order to preserve it.
The Technology and Construction Solicitors’ Association (www.tecsa.org.uk) have
published an e-disclosure protocol and associated guidance. Within the guidance there is
a diagram that outlines the different stages of litigation and the actions in relation to e-
disclosure that need to be taken at each stage. This is a very useful reference point and I
would urge any lawyer faced with a case which may involve the searching and disclosure
of electronic documents to refer to this, even if the case is not in the TCC.
For more advice and guidance on completing the EDQ, on e-disclosure, or information on
any of CCL’s products and services, please call us on 01789 261200, email
edisclosure@cclgroupltd.com or visit the UK’s leading supplier of electronic disclosure
and digital forensics consultancy, including: computer forensics, mobile phone
forensics and digital investigation services.

More Related Content

What's hot

What's hot (10)

Spotlight On Intellectual Property Law Center
Spotlight On Intellectual Property Law CenterSpotlight On Intellectual Property Law Center
Spotlight On Intellectual Property Law Center
 
#MALG14 Workshop A - Bailiff Reform - Slideset
#MALG14 Workshop A - Bailiff Reform - Slideset#MALG14 Workshop A - Bailiff Reform - Slideset
#MALG14 Workshop A - Bailiff Reform - Slideset
 
Edgar crook presentation
Edgar crook   presentationEdgar crook   presentation
Edgar crook presentation
 
Digitising Government-2
Digitising Government-2Digitising Government-2
Digitising Government-2
 
Data & Identity Presentation
Data & Identity  PresentationData & Identity  Presentation
Data & Identity Presentation
 
The Gatekeeper Presentation
The Gatekeeper PresentationThe Gatekeeper Presentation
The Gatekeeper Presentation
 
The New Cookie Law
The New Cookie LawThe New Cookie Law
The New Cookie Law
 
Intro presentation - Bucharest Legal Hackers #3
Intro presentation - Bucharest Legal Hackers #3Intro presentation - Bucharest Legal Hackers #3
Intro presentation - Bucharest Legal Hackers #3
 
DOA TOKENOMICS FOR DUMMIES.pdf
DOA TOKENOMICS FOR DUMMIES.pdfDOA TOKENOMICS FOR DUMMIES.pdf
DOA TOKENOMICS FOR DUMMIES.pdf
 
Patrick Berarducci on taxonomy of digital financial assets
Patrick Berarducci on taxonomy of digital financial assetsPatrick Berarducci on taxonomy of digital financial assets
Patrick Berarducci on taxonomy of digital financial assets
 

Similar to Pre-CMC E-Disclosure Timeline

Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
Internal vs outsourced e disclosure
Internal vs outsourced e disclosureInternal vs outsourced e disclosure
Internal vs outsourced e disclosurecclgroup
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model orderSeth Row
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
Digital Asset Transfer Authority  Bit license comment letter (21 10-14)Digital Asset Transfer Authority  Bit license comment letter (21 10-14)
Digital Asset Transfer Authority Bit license comment letter (21 10-14)DataSecretariat
 
Feasibilities Study of Blockchain Ecosystem in Malaysia Government
Feasibilities Study of Blockchain Ecosystem in Malaysia GovernmentFeasibilities Study of Blockchain Ecosystem in Malaysia Government
Feasibilities Study of Blockchain Ecosystem in Malaysia GovernmentEffendy Zulkifly
 
By Scott Goldstein: Exploring New Territory
By Scott Goldstein: Exploring New TerritoryBy Scott Goldstein: Exploring New Territory
By Scott Goldstein: Exploring New TerritoryNDeXTech
 
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your PracticeESI Attorneys LLC
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Open letter to ARNECC
Open letter to ARNECCOpen letter to ARNECC
Open letter to ARNECCDavid Maher
 
Public sector e-signature policy webinar 170711
Public sector e-signature policy webinar 170711Public sector e-signature policy webinar 170711
Public sector e-signature policy webinar 170711K6 Partners
 
Ten steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionTen steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionJeffJohnson442
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptopRising Media, Inc.
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...
2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...
2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...D. Todd Smith
 

Similar to Pre-CMC E-Disclosure Timeline (20)

Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Public Matters November 2015
Public Matters November 2015Public Matters November 2015
Public Matters November 2015
 
Internal vs outsourced e disclosure
Internal vs outsourced e disclosureInternal vs outsourced e disclosure
Internal vs outsourced e disclosure
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model order
 
Compliance & Value of Digital Signatures
Compliance & Value of Digital SignaturesCompliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
Digital Asset Transfer Authority  Bit license comment letter (21 10-14)Digital Asset Transfer Authority  Bit license comment letter (21 10-14)
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
 
Feasibilities Study of Blockchain Ecosystem in Malaysia Government
Feasibilities Study of Blockchain Ecosystem in Malaysia GovernmentFeasibilities Study of Blockchain Ecosystem in Malaysia Government
Feasibilities Study of Blockchain Ecosystem in Malaysia Government
 
By Scott Goldstein: Exploring New Territory
By Scott Goldstein: Exploring New TerritoryBy Scott Goldstein: Exploring New Territory
By Scott Goldstein: Exploring New Territory
 
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Open letter to ARNECC
Open letter to ARNECCOpen letter to ARNECC
Open letter to ARNECC
 
Public sector e-signature policy webinar 170711
Public sector e-signature policy webinar 170711Public sector e-signature policy webinar 170711
Public sector e-signature policy webinar 170711
 
Ten steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionTen steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selection
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...
2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...
2012 06-15 sbot using modern marketing tools in compliance with disciplinary ...
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Pre-CMC E-Disclosure Timeline

  • 1. Pre-CMC E-Disclosure Timeline Much emphasis is given to the new pre-CMC deadlines imposed by Jackson in April 2013, and there have already been a number of high-profile dressing downs of parties who have not adhered to them - the now infamous Mitchell being the main example of this. When it comes to e-disclosure, if the parties have exchanged an Electronic Documents Questionnaire (form N264), they should file it with their Disclosure Report no less than 14 days prior to the first CMC, and discuss disclosure no less than seven days in advance. A naive lawyer will leave it to the last minute before looking to address these two requirements. As Rix LJ in Nichia v Argos [2007] EWCA Civ 741 said ‘Indeed, it is hard to think that even before launching proceedings, a claimant has not carried out, in its own interests, such a review of its own documents as will in all probability have already met, or all but met, the requirements of a reasonable search’. For example, I recently assisted a lawyer in the completion of the EDQ 15 days in advance of the first CMC. This assistance involved helping them to formulate a questionnaire for the client’s IT team and then subsequently collating and analysing the responses. I am sure that while the client was contemplating litigation they would have gone through a similar process internally, to find where relevant information might exist. Also, to ensure they were complying with their duty to preserve, an exercise must have been carried out to discover where information exists in order to preserve it. The Technology and Construction Solicitors’ Association (www.tecsa.org.uk) have published an e-disclosure protocol and associated guidance. Within the guidance there is a diagram that outlines the different stages of litigation and the actions in relation to e- disclosure that need to be taken at each stage. This is a very useful reference point and I would urge any lawyer faced with a case which may involve the searching and disclosure of electronic documents to refer to this, even if the case is not in the TCC. For more advice and guidance on completing the EDQ, on e-disclosure, or information on any of CCL’s products and services, please call us on 01789 261200, email edisclosure@cclgroupltd.com or visit the UK’s leading supplier of electronic disclosure and digital forensics consultancy, including: computer forensics, mobile phone forensics and digital investigation services.