SlideShare a Scribd company logo
1 of 24
Download to read offline
Discovery Malpractice Is At Your Doorstep
Friday, August 14
Jeff Bennion, Esq.
Robert Hilson, Logikcull
Presenters
Robert Hilson, Logikcull
Jeff Bennion, Of Counsel at Estey and Bomberger
Agenda
• Discovery malpractice landscape
• Emerging standards of competence
• Common risks
• Example cases
• Lessons learned
• Q and A
Malpractice Landscape
!
!
• Electronic data increasingly ubiquitous
• Increasing complexity of tools, data
• General lack of knowledge
• No formal standard of care
!
!
Yet… few reported malpractice cases.
!
But Don’t Be Fooled
Malpractice threat manifests in other ways…
!
!
!
	

- Disgorgment of fees
!
- Payment of sanctions
!
- Billing disputes
Emerging Standards
!
!
!
!
• ABA Model Rule 1.1 — Comment 8
“To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law
and its practice, including the benefits and risks associated with relevant technology.”
!
• California Formal Opinion No. 2015-193
“Attorney competence related to litigation generally requires, at a minimum, a basic understanding of,
and facility with, issues relating to e-discovery, i.e., the discovery of electronically stored information (“ESI”)”
Malpractice Trigger
!
!
!
!
1. Privilege Waiver - inadvertently disclosing privileged
documents without taking reasonable steps to prevent
their disclosure
!
!
Example Case
!
United States of America et al v. J-M Manufacturing Company, Inc.
5:06-cv-00055, C.D. Cal
!
• J-M’s law firm repeatedly discloses 3,900 privileged docs to adversaries
• No forceful clawback in place
• Failure to supervise contract attorneys
• Vendors failed to pass documents through privilege filters
!
!
Lessons
!
!
	

• FRE 502(d), the ‘get out of jail free’ card
!
!
!
• Owe a duty of supervision
• Make sure your vendor knows what it’s

doing
!
!
	

“The production of privileged or work-product protected documents,
electronically stored information (“ESI”) or information, whether
inadvertent or otherwise, is not a waiver of the privilege or protection
from discovery in this case or in any other federal or state proceeding.”
Malpractice Trigger
!
!
!
!
!
2. ‘Left hand doesn’t know what right hand is doing.’
- Small mistake, unchecked, festers and multiplies
- Lack of quality control
- Inadvertent spoliation of data
- Lax security
!
!
!
!
!
Example Case
!
Apple v. Samsung
5:11-cv-01846, N.D. Cal.
!
• Law firm associate improperly redacts sensitive Apple agreement obtained in discovery
• Uploads document to Samsung intranet
• Document obtained by top Samsung executives and law firms adverse to Apple
• Law firm ordered to pay monetary sanction
!
Lessons
!
!
	

!
• Bone up on the basics (and look for outside help)
• Ask for protective order
• Supervision and QC
• Secure discovery repository
!
!
Malpractice Trigger
!
!
!
!
!
!
!
3. Discovery sticker shock
!
!
!
!
!
	

? Processing fees
?
?
?
?
?
?
?
??
Hosting fees
User fees
OCR fees
TIFF fees
PDF fees
ECA fees
Ingestion fees
Ingestion fees
Endorsing fees
? Cold storage fees
? Review fees
? Fee analysis fee
?
? Searching fees
Example Case!
DLA Piper LLP v. Adam Victor
650374/2012, Supreme Court of the State of New York, County of New York.
!
• Client and firm sue each other over billing dispute
• 250,000 pages of documents produced to Victor in discovery
• Those include…
!
!
!
“I hear we are already 200k over our estimate — that’s Team DLA Piper!”
“Now [lawyer] has random people working full time on random research projects
in standard ‘churn that bill, baby!’ mode. That bill shall know no limits.”
“DLA seems to love to lowball the bills and with the number of bodies being
thrown at this thing it’s going to stay stupidly high….”
Lessons
!
!
	

!
• Practice transparent billing
• Defensive email writing
• ‘Reasonable’ markup…
!
!
Malpractice Trigger
!
!
!
!
!
!
!
4. Data breach
!
!
!
!
!
	

Careless disposal of client records
Device theft
Misuse of internal security protocols
Example Case
Too many to count…
!
!
!
Lessons
!
!
	

!
• Proper destruction of client files
• Keep documents in secure repository
• Limit use of physical media
• Keep client data encrypted
!
!
Malpractice Trigger
!
!
!
!
!
!
!
!
5. Blind reliance on your vendor
!
!
!
Example Case!
Peerless v. Crimson
1:11-cv-1768, N.D. Ill.
!
!
!
!
!
!
	

!
• Defendant allows discovery to proceed “entirely through 

a vendor”
• Plays “no part in process of obtaining requested discovery”
• “Such a hands-off approach is insufficient”
!
!
!
Lessons
!
!
	

“Defendants cannot place the burden of compliance on an outside vendor
and have no knowledge, or claim no control, over the process.”
!
!
	

!
• Must be able to attest to the completeness of discovery
- Rule 26(g)
• Attorneys must supervise outside service providers
• Identify the witness
!
!
Discovery Shouldn’t Be About Fear
!
• Strategic advantage
• Insight into important issues
• If you ‘win’ the meet-and-confer, you will win discovery
!
!
!
Questions?
Join the movement.
!
Trusted by the Fortune 500, AM Law 100, & The US Government
5.0 out of 5 stars. Read the reviews.

More Related Content

Viewers also liked

Viewers also liked (9)

Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 

Similar to Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'

Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014
Stephen McIntyre
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
stevejudge123
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
stevejudge123
 

Similar to Logikcull webcast 'Discovery Malpractice Is At Your Doorstep' (20)

Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
Ethically Litigating Forensic Science Cases: Daubert, Dna and Beyond
Ethically Litigating Forensic Science Cases: Daubert, Dna and BeyondEthically Litigating Forensic Science Cases: Daubert, Dna and Beyond
Ethically Litigating Forensic Science Cases: Daubert, Dna and Beyond
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private Purposes
 
Transparency ire13
Transparency ire13Transparency ire13
Transparency ire13
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Top 10 Malpractice Traps and Tools for Avoiding Them
Top 10 Malpractice  Traps and Tools for Avoiding ThemTop 10 Malpractice  Traps and Tools for Avoiding Them
Top 10 Malpractice Traps and Tools for Avoiding Them
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Demystifying Advanced Technologies to Find Solutions that Work
Demystifying Advanced Technologies to Find Solutions that WorkDemystifying Advanced Technologies to Find Solutions that Work
Demystifying Advanced Technologies to Find Solutions that Work
 
Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
EMC Kazeon & Randolph Kahn eDiscovery webinar
EMC Kazeon & Randolph Kahn eDiscovery webinarEMC Kazeon & Randolph Kahn eDiscovery webinar
EMC Kazeon & Randolph Kahn eDiscovery webinar
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 

More from Logikcull.com

Reading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof SkillsReading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof Skills
Logikcull.com
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
Logikcull.com
 

More from Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
ACEDS-Kroll Ontrack 1-14-15 Webcast
ACEDS-Kroll Ontrack 1-14-15 WebcastACEDS-Kroll Ontrack 1-14-15 Webcast
ACEDS-Kroll Ontrack 1-14-15 Webcast
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
ACEDS January 2015 Members Only Webcast
ACEDS January 2015 Members Only WebcastACEDS January 2015 Members Only Webcast
ACEDS January 2015 Members Only Webcast
 
ACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast Slides
 
BDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 WebcastBDO-ACEDS 10-29-14 Webcast
BDO-ACEDS 10-29-14 Webcast
 
Reading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof SkillsReading Industry Tea Leaves to Achieve Automation Proof Skills
Reading Industry Tea Leaves to Achieve Automation Proof Skills
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 

Recently uploaded

一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 

Recently uploaded (20)

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfNavigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 

Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'

  • 1. Discovery Malpractice Is At Your Doorstep Friday, August 14 Jeff Bennion, Esq. Robert Hilson, Logikcull
  • 2. Presenters Robert Hilson, Logikcull Jeff Bennion, Of Counsel at Estey and Bomberger
  • 3. Agenda • Discovery malpractice landscape • Emerging standards of competence • Common risks • Example cases • Lessons learned • Q and A
  • 4. Malpractice Landscape ! ! • Electronic data increasingly ubiquitous • Increasing complexity of tools, data • General lack of knowledge • No formal standard of care ! ! Yet… few reported malpractice cases. !
  • 5. But Don’t Be Fooled Malpractice threat manifests in other ways… ! ! ! - Disgorgment of fees ! - Payment of sanctions ! - Billing disputes
  • 6. Emerging Standards ! ! ! ! • ABA Model Rule 1.1 — Comment 8 “To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology.” ! • California Formal Opinion No. 2015-193 “Attorney competence related to litigation generally requires, at a minimum, a basic understanding of, and facility with, issues relating to e-discovery, i.e., the discovery of electronically stored information (“ESI”)”
  • 7. Malpractice Trigger ! ! ! ! 1. Privilege Waiver - inadvertently disclosing privileged documents without taking reasonable steps to prevent their disclosure ! !
  • 8. Example Case ! United States of America et al v. J-M Manufacturing Company, Inc. 5:06-cv-00055, C.D. Cal ! • J-M’s law firm repeatedly discloses 3,900 privileged docs to adversaries • No forceful clawback in place • Failure to supervise contract attorneys • Vendors failed to pass documents through privilege filters ! !
  • 9. Lessons ! ! • FRE 502(d), the ‘get out of jail free’ card ! ! ! • Owe a duty of supervision • Make sure your vendor knows what it’s
 doing ! ! “The production of privileged or work-product protected documents, electronically stored information (“ESI”) or information, whether inadvertent or otherwise, is not a waiver of the privilege or protection from discovery in this case or in any other federal or state proceeding.”
  • 10. Malpractice Trigger ! ! ! ! ! 2. ‘Left hand doesn’t know what right hand is doing.’ - Small mistake, unchecked, festers and multiplies - Lack of quality control - Inadvertent spoliation of data - Lax security ! ! ! ! !
  • 11. Example Case ! Apple v. Samsung 5:11-cv-01846, N.D. Cal. ! • Law firm associate improperly redacts sensitive Apple agreement obtained in discovery • Uploads document to Samsung intranet • Document obtained by top Samsung executives and law firms adverse to Apple • Law firm ordered to pay monetary sanction !
  • 12. Lessons ! ! ! • Bone up on the basics (and look for outside help) • Ask for protective order • Supervision and QC • Secure discovery repository ! !
  • 13. Malpractice Trigger ! ! ! ! ! ! ! 3. Discovery sticker shock ! ! ! ! ! ? Processing fees ? ? ? ? ? ? ? ?? Hosting fees User fees OCR fees TIFF fees PDF fees ECA fees Ingestion fees Ingestion fees Endorsing fees ? Cold storage fees ? Review fees ? Fee analysis fee ? ? Searching fees
  • 14. Example Case! DLA Piper LLP v. Adam Victor 650374/2012, Supreme Court of the State of New York, County of New York. ! • Client and firm sue each other over billing dispute • 250,000 pages of documents produced to Victor in discovery • Those include… ! ! ! “I hear we are already 200k over our estimate — that’s Team DLA Piper!” “Now [lawyer] has random people working full time on random research projects in standard ‘churn that bill, baby!’ mode. That bill shall know no limits.” “DLA seems to love to lowball the bills and with the number of bodies being thrown at this thing it’s going to stay stupidly high….”
  • 15. Lessons ! ! ! • Practice transparent billing • Defensive email writing • ‘Reasonable’ markup… ! !
  • 16. Malpractice Trigger ! ! ! ! ! ! ! 4. Data breach ! ! ! ! ! Careless disposal of client records Device theft Misuse of internal security protocols
  • 17. Example Case Too many to count… ! ! !
  • 18. Lessons ! ! ! • Proper destruction of client files • Keep documents in secure repository • Limit use of physical media • Keep client data encrypted ! !
  • 19. Malpractice Trigger ! ! ! ! ! ! ! ! 5. Blind reliance on your vendor ! ! !
  • 20. Example Case! Peerless v. Crimson 1:11-cv-1768, N.D. Ill. ! ! ! ! ! ! ! • Defendant allows discovery to proceed “entirely through 
 a vendor” • Plays “no part in process of obtaining requested discovery” • “Such a hands-off approach is insufficient” ! ! !
  • 21. Lessons ! ! “Defendants cannot place the burden of compliance on an outside vendor and have no knowledge, or claim no control, over the process.” ! ! ! • Must be able to attest to the completeness of discovery - Rule 26(g) • Attorneys must supervise outside service providers • Identify the witness ! !
  • 22. Discovery Shouldn’t Be About Fear ! • Strategic advantage • Insight into important issues • If you ‘win’ the meet-and-confer, you will win discovery ! ! !
  • 24. Join the movement. ! Trusted by the Fortune 500, AM Law 100, & The US Government 5.0 out of 5 stars. Read the reviews.