SlideShare a Scribd company logo
1 of 12
Download to read offline
e-Discovery

Data Retention and Other Useful
       Discussion Topics
Document Retention Policy
• Document retention means many things to many people depending on
  their business.
        • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices)
        • HIPPA
• Can be mandated based on industry by either federal, or state
  jurisdictions, sometimes both.
• Basically if you are not mandated to retain your documents, draft and
  adhere to your own document retention policy. This will make any
  electronic discovery process much more efficient.
• Adhering to your own document retention policy ensures your ethical
  practices regarding data deletion if involved in litigation.
• An effective data retention policy should:
        • Reduce “data artifacts”
        • Reduce the amount of production and review: if involved in electronic discovery
        • Properly store and delete company relevant data based on requirements set by the
          organization or mandating authority.
        • Address all relative data and storage options utilized by the company, pc hard disks,
          servers, mobile devices, tapes, archives, off-site storage
Electronic Discovery
• Electronic discovery (or e-discovery) refers to discovery in civil litigation
  which deals with information in electronic format also referred to as
  Electronically Stored Information (ESI). Electronic information is different
  from paper information because of its intangible form, volume, transience
  and persistence. Also, electronic information is usually accompanied by
  metadata, which is not present in paper documents. However, paper
  documents can be scanned into electronic format and then manually
  coded with metadata. The preservation of metadata from electronic
  documents creates special challenges to prevent spoliation.

• Electronic discovery was the subject of amendments to the Federal Rules
  of Civil Procedure, effective December 1, 2006.[1] shows the changes, the
  complete Rules, where in particular rules 16 and 26 are of interest to
  electronic discovery.

* source http://en.wikipedia.org/wiki/Electronic_discovery
Federal Rules of Civil Procedure
                Related to e-Discovery
Rule 16. Pretrial Conferences; Scheduling; Management
(a) Purposes of a Pretrial Conference.
      (3) discouraging wasteful pretrial activities;
(b) Scheduling
      (3) Contents of the Order.
              (A) Required Contents. The scheduling order must limit the time to join other parties, amend the
                  pleadings, complete discovery, and file motions.
              (B) Permitted Contents. The scheduling order may:
                  (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1);
                  (ii) modify the extent of discovery;
                  (iii) provide for disclosure or discovery of electronically stored information;
(c) Attendance and Matters for Consideration at a Pretrial Conference.
       (2) Matters for Consideration
              (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule
                  26 and Rules 29 through 37;




* Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
Federal Rules of Civil Procedure
             Related to e-Discovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(a)   Required Disclosures
      (1) Initial Disclosures
           (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court,
           a party must, without awaiting a discovery request, provide to the other parties:
                (ii) a copy — or a description by category and location — of all documents, electronically stored information, and
                tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or
                defenses, unless the use would be solely for impeachment;
(b) Discovery Scope and Limits.
       (2) Limitations on Frequency and Extent
           (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of
           electronically stored information from sources that the party identifies as not reasonably accessible
           because of undue burden or cost. On motion to compel discovery or for a protective order, the party from
           whom discovery is sought must show that the information is not reasonably accessible because of undue
           burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if
           the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may
           specify conditions for the discovery.
           (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery
           otherwise allowed by these rules or by local rule if it determines that:
                (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is
                more convenient, less burdensome, or less expensive;
                (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or
                (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case,
                the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the
                importance of the discovery in resolving the issues.
Federal Rules of Civil Procedure
                Related to eDiscovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(b) Discovery Scope and Limits
      (3) Trial Preparation: Materials.
           (A) Documents and Tangible Things.
           (B) Protection Against Disclosure.
           (C) Previous Statement.
        (5) Claiming Privilege or Protecting Trial- Preparation Materials.
             (B)Information Produced.
(c) Protective Orders
      (1) In General
      (2) Ordering Discovery
(d) Timing and Sequence of Discovery
      (1) Timing
      (2) Sequence
(e) Supplementation of Disclosures and Responses.
      (1) In General
      (2) Expert Witness.
(f) Conference of the Parties; Planning for Discovery
      (3) Discovery Plan.



*source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
Electronically Stored Information (ESI)
•        Electronically stored information, for the purpose of the Federal Rules of Civil
         Procedure (FRCP) is information created, manipulated, communicated, stored, and
         best utilized in digital form, requiring the use of computer hardware and software.
         The term has become a legally defined phrase as the U.S. government determined
         for the purposes of the FRCP rules of 2006 that promulgating procedures for
         maintenance and discovery for electronically stored information was necessary. [1]

•        Types of ESI
         (1)Native Files (Office documents ect…)
         (2)Logical Data (RAM)




[1]source:   http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure)
[2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
e-Discovery as Experienced
The process as experienced:
• Requesting attorney/party issues legal hold (usually broad), or requests financial impact
    information for the legal hold they are about to request.
• Responding attorney/party rebuts request as too broad or implements legal hold on electronic
    information to the specified requirements of the request.
• Parties conference and discovery requirements are mandated.
• Responding party performs discovery on the data specified in the time frame required.
• Information/documents produced from the discovery are given to counsel to review for privileged
    information.
• Non-privileged information is given to requesting party in the specified required formats.

Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing
    their discovery requirements.

•   Typically this is a “data hunt” by the complainant counsel to discover what types of data are
    available, any data retention policies that exist, and in what formats the data is in.
•   This may even get into “known” information such as if the IT personnel is aware of any data
    destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has
    assisted any specific employees in question with data deletion.
Legal Hold
•   With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley
    cases, and the Supreme Court analyzing how document retention policies are
    enforced, corporate practices around the retention/ destruction of electronically
    stored information (ESI) have never been more important.
•   The “legal hold” operates at the intersection of litigation and corporate retention
    practices, and it has emerged as an almost-obligatory component of a company's
    response to notice or reasonable anticipation of litigation. The basis of this
    obligation is the common law duty against spoilation; that is, the duty to avoid the
    loss of, destruction of, or failure to preserve information that may be relevant to
    pending or potential proceedings.
•   In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the
    documents in your desk drawers or file cabinets. But modern businesses generate
    massive amounts of digital information, which is created and stored in an ever-
    expanding number of devices and locations, and which can be destroyed without
    any affirmative action. As a result, effective legal hold practices involve significantly
    more than merely issuing an internal letter and sitting back until the official
    discover process begins.

* source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
The Sedona Conference®
     Best Practices Recommendations & Principles for
       Addressing Electronic Document Production
1.   Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state
     equivalents. Organizations must properly preserve electronically stored information that can
     reasonably be anticipated to be relevant to litigation.
2.   When balancing the cost, burden, and need for electronically stored information, courts and
     parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its
     state equivalents, which require consideration of the technological feasibility and realistic costs of
     preserving, retrieving, reviewing, and producing electronically stored information, as well as the
     nature of the litigation and the amount in controversy
3.   Parties should confer early in discovery regarding the preservation and production of
     electronically stored information when these matters are at issue in the litigation and seek to
     agree on the scope of each party’s rights and responsibilities
4.   Discovery requests for electronically stored information should be as clear as possible, while
     responses and objections to discovery should disclose the scope and limits of the production
5.   The obligation to preserve electronically stored information requires reasonable and good faith
     efforts to retain information that may be relevant to pending or threatened litigation. However, it
     is unreasonable to expect parties to take every conceivable step to preserve all potentially
     relevant electronically stored information
6.   Responding parties are best situated to evaluate the procedures, methodologies, and
     technologies appropriate for preserving and producing their own electronically stored
     information
7.   The requesting party has the burden on a motion to compel to show that the responding party’s
     steps to preserve and produce relevant electronically stored information were inadequate
The Sedona Conference®
      Best Practices Recommendations & Principles for
        Addressing Electronic Document Production
8.    The primary source of electronically stored information for production should be active data and information.
      Resort to disaster recovery backup tapes and other sources of electronically stored information that are not
      reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs
      and burdens of retrieving and processing the electronically stored information from such sources, including the
      disruption of business and information management activities
9.    Absent a showing of special need and relevance, a responding party should not be required to preserve, review,
      or produce deleted, shadowed, fragmented, or residual electronically stored information
10.   A responding party should follow reasonable procedures to protect privileges and objections in connection with
      the production of electronically stored information
11.    A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored
      information by using electronic tools and processes, such as data sampling, searching, or the use of selection
      criteria, to identify data reasonably likely to contain relevant information
12.   Absent party agreement or court order specifying the form or forms of production, production should be made
      in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into
      account the need to produce reasonably accessible metadata that will enable the receiving party to have the
      same ability to access, search, and display the information as the producing party where appropriate or
      necessary in light of the nature of the information and the needs of the case
13.   Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing
      electronically stored information should be borne by the responding party, unless the information sought is not
      reasonably available to the responding party in the ordinary course of business. If the information sought is not
      reasonably available to the responding party in the ordinary course of business, then, absent special
      circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to
      the requesting party
14.   Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear
      duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a
      reasonable probability that the loss of the evidence has materially prejudiced the adverse party
Discussion Points
• Legal professionals don’t fully understand information
  technology and the extent of their requests. How does
  this impact IT/IS?
• Using cost-shifting as an effective tool to reducing e-
  Discovery requests.
• Why would my company need a data retention policy?
• Is data governance important to managing litigious
  corporate data?
• Ethical, practical, and efficient data retention
      • Does it exist?
      • Who’s managing it?

More Related Content

What's hot

2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptxdravidmishra1
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionSam Bowne
 
Forgery by Shukun Karthika
Forgery by Shukun KarthikaForgery by Shukun Karthika
Forgery by Shukun KarthikaShukun Karthika
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Application of blockchain in law
Application of blockchain in lawApplication of blockchain in law
Application of blockchain in lawAashima Johur
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 

What's hot (20)

2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Csi ppt
Csi  pptCsi  ppt
Csi ppt
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
 
Forgery by Shukun Karthika
Forgery by Shukun KarthikaForgery by Shukun Karthika
Forgery by Shukun Karthika
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Application of blockchain in law
Application of blockchain in lawApplication of blockchain in law
Application of blockchain in law
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Corporate Espionage in India
Corporate Espionage in IndiaCorporate Espionage in India
Corporate Espionage in India
 

Similar to E Discovery

PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Seth Row
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeBoyarMiller
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer WorkshopJohn Jablonski
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 

Similar to E Discovery (20)

PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
 
Daniel day
Daniel dayDaniel day
Daniel day
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 

More from James Sutter

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214James Sutter
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014James Sutter
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David MannJames Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013James Sutter
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOTJames Sutter
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13James Sutter
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjtJames Sutter
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costsJames Sutter
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentationJames Sutter
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12James Sutter
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012 James Sutter
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12James Sutter
 

More from James Sutter (20)

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David Mann
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjt
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costs
 
CIO Branding
CIO BrandingCIO Branding
CIO Branding
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentation
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12
 
CIO Value Issue
CIO Value IssueCIO Value Issue
CIO Value Issue
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

E Discovery

  • 1. e-Discovery Data Retention and Other Useful Discussion Topics
  • 2. Document Retention Policy • Document retention means many things to many people depending on their business. • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices) • HIPPA • Can be mandated based on industry by either federal, or state jurisdictions, sometimes both. • Basically if you are not mandated to retain your documents, draft and adhere to your own document retention policy. This will make any electronic discovery process much more efficient. • Adhering to your own document retention policy ensures your ethical practices regarding data deletion if involved in litigation. • An effective data retention policy should: • Reduce “data artifacts” • Reduce the amount of production and review: if involved in electronic discovery • Properly store and delete company relevant data based on requirements set by the organization or mandating authority. • Address all relative data and storage options utilized by the company, pc hard disks, servers, mobile devices, tapes, archives, off-site storage
  • 3. Electronic Discovery • Electronic discovery (or e-discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). Electronic information is different from paper information because of its intangible form, volume, transience and persistence. Also, electronic information is usually accompanied by metadata, which is not present in paper documents. However, paper documents can be scanned into electronic format and then manually coded with metadata. The preservation of metadata from electronic documents creates special challenges to prevent spoliation. • Electronic discovery was the subject of amendments to the Federal Rules of Civil Procedure, effective December 1, 2006.[1] shows the changes, the complete Rules, where in particular rules 16 and 26 are of interest to electronic discovery. * source http://en.wikipedia.org/wiki/Electronic_discovery
  • 4. Federal Rules of Civil Procedure Related to e-Discovery Rule 16. Pretrial Conferences; Scheduling; Management (a) Purposes of a Pretrial Conference. (3) discouraging wasteful pretrial activities; (b) Scheduling (3) Contents of the Order. (A) Required Contents. The scheduling order must limit the time to join other parties, amend the pleadings, complete discovery, and file motions. (B) Permitted Contents. The scheduling order may: (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1); (ii) modify the extent of discovery; (iii) provide for disclosure or discovery of electronically stored information; (c) Attendance and Matters for Consideration at a Pretrial Conference. (2) Matters for Consideration (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule 26 and Rules 29 through 37; * Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
  • 5. Federal Rules of Civil Procedure Related to e-Discovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (a) Required Disclosures (1) Initial Disclosures (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court, a party must, without awaiting a discovery request, provide to the other parties: (ii) a copy — or a description by category and location — of all documents, electronically stored information, and tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or defenses, unless the use would be solely for impeachment; (b) Discovery Scope and Limits. (2) Limitations on Frequency and Extent (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for the discovery. (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery otherwise allowed by these rules or by local rule if it determines that: (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.
  • 6. Federal Rules of Civil Procedure Related to eDiscovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (b) Discovery Scope and Limits (3) Trial Preparation: Materials. (A) Documents and Tangible Things. (B) Protection Against Disclosure. (C) Previous Statement. (5) Claiming Privilege or Protecting Trial- Preparation Materials. (B)Information Produced. (c) Protective Orders (1) In General (2) Ordering Discovery (d) Timing and Sequence of Discovery (1) Timing (2) Sequence (e) Supplementation of Disclosures and Responses. (1) In General (2) Expert Witness. (f) Conference of the Parties; Planning for Discovery (3) Discovery Plan. *source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
  • 7. Electronically Stored Information (ESI) • Electronically stored information, for the purpose of the Federal Rules of Civil Procedure (FRCP) is information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software. The term has become a legally defined phrase as the U.S. government determined for the purposes of the FRCP rules of 2006 that promulgating procedures for maintenance and discovery for electronically stored information was necessary. [1] • Types of ESI (1)Native Files (Office documents ect…) (2)Logical Data (RAM) [1]source: http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure) [2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
  • 8. e-Discovery as Experienced The process as experienced: • Requesting attorney/party issues legal hold (usually broad), or requests financial impact information for the legal hold they are about to request. • Responding attorney/party rebuts request as too broad or implements legal hold on electronic information to the specified requirements of the request. • Parties conference and discovery requirements are mandated. • Responding party performs discovery on the data specified in the time frame required. • Information/documents produced from the discovery are given to counsel to review for privileged information. • Non-privileged information is given to requesting party in the specified required formats. Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing their discovery requirements. • Typically this is a “data hunt” by the complainant counsel to discover what types of data are available, any data retention policies that exist, and in what formats the data is in. • This may even get into “known” information such as if the IT personnel is aware of any data destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has assisted any specific employees in question with data deletion.
  • 9. Legal Hold • With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley cases, and the Supreme Court analyzing how document retention policies are enforced, corporate practices around the retention/ destruction of electronically stored information (ESI) have never been more important. • The “legal hold” operates at the intersection of litigation and corporate retention practices, and it has emerged as an almost-obligatory component of a company's response to notice or reasonable anticipation of litigation. The basis of this obligation is the common law duty against spoilation; that is, the duty to avoid the loss of, destruction of, or failure to preserve information that may be relevant to pending or potential proceedings. • In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the documents in your desk drawers or file cabinets. But modern businesses generate massive amounts of digital information, which is created and stored in an ever- expanding number of devices and locations, and which can be destroyed without any affirmative action. As a result, effective legal hold practices involve significantly more than merely issuing an internal letter and sitting back until the official discover process begins. * source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
  • 10. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 1. Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state equivalents. Organizations must properly preserve electronically stored information that can reasonably be anticipated to be relevant to litigation. 2. When balancing the cost, burden, and need for electronically stored information, courts and parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its state equivalents, which require consideration of the technological feasibility and realistic costs of preserving, retrieving, reviewing, and producing electronically stored information, as well as the nature of the litigation and the amount in controversy 3. Parties should confer early in discovery regarding the preservation and production of electronically stored information when these matters are at issue in the litigation and seek to agree on the scope of each party’s rights and responsibilities 4. Discovery requests for electronically stored information should be as clear as possible, while responses and objections to discovery should disclose the scope and limits of the production 5. The obligation to preserve electronically stored information requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation. However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant electronically stored information 6. Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information 7. The requesting party has the burden on a motion to compel to show that the responding party’s steps to preserve and produce relevant electronically stored information were inadequate
  • 11. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 8. The primary source of electronically stored information for production should be active data and information. Resort to disaster recovery backup tapes and other sources of electronically stored information that are not reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs and burdens of retrieving and processing the electronically stored information from such sources, including the disruption of business and information management activities 9. Absent a showing of special need and relevance, a responding party should not be required to preserve, review, or produce deleted, shadowed, fragmented, or residual electronically stored information 10. A responding party should follow reasonable procedures to protect privileges and objections in connection with the production of electronically stored information 11. A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored information by using electronic tools and processes, such as data sampling, searching, or the use of selection criteria, to identify data reasonably likely to contain relevant information 12. Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and the needs of the case 13. Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing electronically stored information should be borne by the responding party, unless the information sought is not reasonably available to the responding party in the ordinary course of business. If the information sought is not reasonably available to the responding party in the ordinary course of business, then, absent special circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to the requesting party 14. Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a reasonable probability that the loss of the evidence has materially prejudiced the adverse party
  • 12. Discussion Points • Legal professionals don’t fully understand information technology and the extent of their requests. How does this impact IT/IS? • Using cost-shifting as an effective tool to reducing e- Discovery requests. • Why would my company need a data retention policy? • Is data governance important to managing litigious corporate data? • Ethical, practical, and efficient data retention • Does it exist? • Who’s managing it?