SlideShare a Scribd company logo
1 of 7
Download to read offline
E-DISCOVERY AND ELECTRONIC EVIDENCE:
A NEW CHALLENGE IN BUSINESS LITIGATION



               William F. Codell
       HARNED BACHERT & MCGEHEE PSC
            324 East Tenth Avenue
             Post Office Box 1270
      Bowling Green, Kentucky 42102-1270
          Telephone: (270) 782-3938
           Facsimile: (270) 781-4737
              www.hbmfirm.com
Historical figure and Boston political boss Martin Lomasney was an individual that

understood the value of discretion. He is attributed with the famous quote: “Never write if

you can speak, never speak if you can nod, never nod if you can wink.” Recently, New York

Governor Eliot Spitzer put a modern twist on the famous quote. He is attributed with stating

that one should “never write when you can talk, never talk when you can nod, and never put

anything in an email.” While companies are generally not as susceptible as politicians to

damage from an unfortunate email, a basic understanding of electronic evidence is useful for

any company that may become subject to litigation.

        As the volume of electronically stored information continues to expand, electronic

evidence is becoming increasingly important in business litigation. Common forms of

electronically stored information include emails, databases, spreadsheets, and word

processing documents.      Current estimates provide that roughly 800 megabytes of

electronically stored information is created per person every year. A standard desktop

computer can store the equivalent of 40,000 typed pages of information. Many companies

have accumulated thousands of terabytes of electronically stored information. Considering

that 1 terabyte of electronically stored information equates to the amount of information in

approximately 1 million books, the task of managing electronic documents can be difficult

for any business.

        Similar to a business working to handle new technology, the legal system is

undergoing several changes in an effort to manage electronic evidence. In the legal system,

particular attention is being given to the process of electronic discovery in the business

litigation context.




                                                                                          2
The word “discovery” is generally defined in the legal environment as the process by

which attorneys reveal facts and develop evidence in preparation for a trial. Common

examples of discovery include a deposition in which an attorney may ask questions to a

witness and a request for production whereby an attorney may require a person or company

to provide certain documents. Traditionally, an attorney would use a discovery request for

production to get copies of correspondence, manuals, reports, blueprints, business records, or

any other documents that might be relevant to the dispute.

       Companies involved in litigation are not only required to provide many documents to

an adversary’s attorney upon request, they are further required to preserve documents that

may be relevant to a dispute. Specifically, once a company is on notice of pending litigation,

a “litigation hold” must be implemented to retain documents that the company reasonably

believes to be discoverable or relevant to the dispute. In order to comply with the “litigation

hold” requirement, a business must take affirmative measures to preserve potential evidence

that might otherwise be destroyed in the ordinary course of business.

       Several companies with a large volume of electronically stored information have

suffered painful consequences due to failure to properly preserve relevant electronic

documents after receiving notice of potential litigation. One case in which a company was

severely punished for failure to preserve relevant electronic evidence involved the

bankruptcy of an airline. A lawsuit arose out of the bankruptcy in connection with a

transaction that the airline’s Chief Financial Officer may have been involved.

       The airline’s attorneys advised the company to implement a “litigation hold” to avoid

the destruction of electronic documents connected to the dispute. However, the airline’s

CFO attempted to delete multiple files on a company laptop computer after receiving the



                                                                                             3
notice of the litigation hold. When confronted, the CFO claimed that he had deleted files

from the laptop in an effort to hide pornographic images downloaded from the internet. The

other party to the lawsuit asserted that some of the deleted electronic files contained

documents relevant to the case.

       The judge for the case punished the company by issuing multiple adverse inferences

and a fee award. Generally, an adverse inference means that a party to the litigation does not

need to prove an element of its case and/or the jury can infer certain elements of the case.

For example, a judge could instruct a jury that certain email documents relevant to a dispute

were destroyed and the jury may infer that the emails were harmful to the party guilty of the

destruction.

       Judges have wide discretion in resolving issues connected to discovery abuse.

Sanctions that may be imposed on a business for failure to preserve relevant evidence may

include the loss of certain defenses, payment of another company’s attorneys’ fees, and an

adverse inference instruction to the jury. Such an outcome in a legal fight can be devastating

to a business.

       It is important to note that a company need not intentionally or maliciously destroy

relevant electronic documents in order to become subject to discovery sanctions from a

court. Reckless or negligent behavior may be adequate to warrant sanctions. Destruction of

relevant electronically stored information may be sanctionable in circumstances where the

company was not consciously aware of the destruction. The inadvertent destruction of

relevant electronic evidence after notice of pending litigation is highly feasible for

companies with a large volume of electronically stored information and a regular practice of

recycling old “back up” tapes with seemingly outdated files.



                                                                                            4
The possibility of litigation sanctions arising from the destruction of electronic

documents combined with the accelerated rate at which electronically stored information is

generated presents a difficult dilemma for many companies. Despite the continued decrease

in the price of data storage, keeping every form of electronically stored information forever

is not practical for most businesses. A new amendment to the Federal Rules of Civil

Procedure provides one proposed solution.

       Federal Rule of Civil Procedure 37(f), which covers all cases filed in Federal Court

after December 1, 2006, provides that “absent exceptional circumstances, a court may not

impose sanctions under these rules on a party for failing to provide electronically stored

information lost as a result of the routine, good-faith operation of an electronic information

system.” Federal Rule of Civil Procedure 37(f) is a “safe harbor” for companies regarding

electronically stored information. It appears that the Rule will protect genuinely routine

deletions of data with regard to litigation in Federal Court. The most important language in

the Rule emphasizes that protection from sanctions is available only for “the routine, good-

faith operation” of a computer system.

       In order to gain the benefit of the Rule, a company in Federal Court litigation will

need to establish that it not only has a policy to deal with electronic document retention, but

also that the policy is followed by company officers and employees. As such, the existence

of an electronic document management policy can be critical for a business subject to

litigation. Due to the fact that every business is unique, no single plan or policy is

appropriate for every company. However, some basic standards regarding the management

of electronically stored information are equally applicable to almost every company. Four




                                                                                             5
generally applicable principles regarding the management of electronically stored

information are as follows:

        1.      Every company should have a written record retention policy;

        2.      Every company should understand that it has a duty to preserve
                records once it knows or should have known of potential litigation;

        3.      Every company should have a plan regarding how records will be
                preserved once a dispute emerges; and

        4.      Every company should make efforts to identify likely difficulties with
                preserving electronic evidence and prospective solutions.

        Companies that wait until litigation arises before confronting electronic document

retention issues will face the potentially impossible task of cataloging and preserving

electronically stored information under court mandated deadlines. Such circumstances

constitute a formula for catastrophe and significantly increase the risk of painful monetary

and evidentiary sanctions. Moreover, an adversary that already has a well-designed policy

that can effectively and efficiently deal with electronic evidence issues will have a significant

competitive advantage in litigation.

        The development of a good electronic document retention policy will not only benefit

a company after it becomes involved in litigation, it will additionally help officers and

employees better understand the business. Developing a policy to properly manage

electronically stored information will necessarily involve enhanced communication among

individuals from different areas of a company including human resources, information

technology, and management. In turn, a greater understanding of the methods of electronic

communication and document retention will increase a company’s ability to more efficiently

utilize future technological innovations. Current changes imposed on the legal system by

advancements in technology reflect new challenges and opportunities facing every business.


                                                                                               6
In order to meet new challenges and take advantage of new opportunities, a company would

be well advised to continually develop and monitor its electronic document management

policy.




                                                                                      7

More Related Content

What's hot

Designing A Compliant Record Retention Policy
Designing A Compliant Record Retention PolicyDesigning A Compliant Record Retention Policy
Designing A Compliant Record Retention Policyrlhicksjr
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocDavid Haines
 
Legal Implications of a Mobile Enterprise
Legal Implications of a Mobile EnterpriseLegal Implications of a Mobile Enterprise
Legal Implications of a Mobile EnterpriseHawley Troxell
 
Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrmcinderella1961
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White PaperKevin Featherly
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Richard Austin
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpraudrey miguel
 
Email Archiving for the Financial industry
Email Archiving for the Financial industryEmail Archiving for the Financial industry
Email Archiving for the Financial industrykdunnjatheon
 
Data_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKData_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKSally Hunt
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Website and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesWebsite and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesPageFreezer
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Dryden Geary
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRJenny Ferguson
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
GDPR - A practical guide
GDPR - A practical guideGDPR - A practical guide
GDPR - A practical guideAngad Dayal
 

What's hot (19)

Designing A Compliant Record Retention Policy
Designing A Compliant Record Retention PolicyDesigning A Compliant Record Retention Policy
Designing A Compliant Record Retention Policy
 
Fiachra Moody - E-Discovery
Fiachra Moody - E-DiscoveryFiachra Moody - E-Discovery
Fiachra Moody - E-Discovery
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.Doc
 
Legal Implications of a Mobile Enterprise
Legal Implications of a Mobile EnterpriseLegal Implications of a Mobile Enterprise
Legal Implications of a Mobile Enterprise
 
Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrm
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015
 
Cognizant business consulting the impacts of gdpr
Cognizant business consulting   the impacts of gdprCognizant business consulting   the impacts of gdpr
Cognizant business consulting the impacts of gdpr
 
Email Archiving for the Financial industry
Email Archiving for the Financial industryEmail Archiving for the Financial industry
Email Archiving for the Financial industry
 
Data_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKData_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UK
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Website and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesWebsite and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government Agencies
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Ballon paper
Ballon paperBallon paper
Ballon paper
 
Horner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPRHorner Downey & Co Newsletter- GDPR
Horner Downey & Co Newsletter- GDPR
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
GDPR - A practical guide
GDPR - A practical guideGDPR - A practical guide
GDPR - A practical guide
 

Viewers also liked

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Special law of electronic evidence
Special law of electronic evidenceSpecial law of electronic evidence
Special law of electronic evidenceVarun Singh
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalWilliam Hamilton
 
Electronic Evidence Questionnaire
Electronic Evidence QuestionnaireElectronic Evidence Questionnaire
Electronic Evidence QuestionnaireRon Romero
 
Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant maliAdv Prashant Mali
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Electronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of EmailElectronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of EmailDan Michaluk
 
Presentation logistikfokus webcoast.pptx
Presentation logistikfokus webcoast.pptxPresentation logistikfokus webcoast.pptx
Presentation logistikfokus webcoast.pptxPer Olof Arnäs
 
Technology Traps for Associations to Avoid
Technology Traps for Associations to AvoidTechnology Traps for Associations to Avoid
Technology Traps for Associations to AvoidStarChapter
 
Implementation ofthe Rule of Law principles by the Ukrainian courts
Implementation ofthe Rule of Law principles by the Ukrainian courtsImplementation ofthe Rule of Law principles by the Ukrainian courts
Implementation ofthe Rule of Law principles by the Ukrainian courtsAxon.Partners
 
Ivan Shirokov
Ivan ShirokovIvan Shirokov
Ivan Shirokovyaevents
 
Både äpplen och päron måste med
Både äpplen och päron måste medBåde äpplen och päron måste med
Både äpplen och päron måste medPer Olof Arnäs
 

Viewers also liked (20)

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Special law of electronic evidence
Special law of electronic evidenceSpecial law of electronic evidence
Special law of electronic evidence
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Evidence final
Evidence finalEvidence final
Evidence final
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 Final
 
Electronic Evidence Questionnaire
Electronic Evidence QuestionnaireElectronic Evidence Questionnaire
Electronic Evidence Questionnaire
 
EDI 2009- Admissibility of Electronic/Digital Evidence
EDI 2009- Admissibility of Electronic/Digital EvidenceEDI 2009- Admissibility of Electronic/Digital Evidence
EDI 2009- Admissibility of Electronic/Digital Evidence
 
Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of EmailElectronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of Email
 
Presentation logistikfokus webcoast.pptx
Presentation logistikfokus webcoast.pptxPresentation logistikfokus webcoast.pptx
Presentation logistikfokus webcoast.pptx
 
Technology Traps for Associations to Avoid
Technology Traps for Associations to AvoidTechnology Traps for Associations to Avoid
Technology Traps for Associations to Avoid
 
Terror maze
Terror maze Terror maze
Terror maze
 
Implementation ofthe Rule of Law principles by the Ukrainian courts
Implementation ofthe Rule of Law principles by the Ukrainian courtsImplementation ofthe Rule of Law principles by the Ukrainian courts
Implementation ofthe Rule of Law principles by the Ukrainian courts
 
Ivan Shirokov
Ivan ShirokovIvan Shirokov
Ivan Shirokov
 
Både äpplen och päron måste med
Både äpplen och päron måste medBåde äpplen och päron måste med
Både äpplen och päron måste med
 

Similar to E-DISCOVERY AND ELECTRONIC EVIDENCE: A NEW CHALLENGE

Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model orderSeth Row
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docxdrennanmicah
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryDan Michaluk
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
New E-Discovery Rules Take Effect
New E-Discovery Rules Take Effect  New E-Discovery Rules Take Effect
New E-Discovery Rules Take Effect LawCrossing
 
E-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records RetentionE-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records Retentionwcodell
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Future-Proofing Your Law Firm Processes
Future-Proofing Your Law Firm ProcessesFuture-Proofing Your Law Firm Processes
Future-Proofing Your Law Firm ProcessesQorus Software
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi PowerpointJbhirsh
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 

Similar to E-DISCOVERY AND ELECTRONIC EVIDENCE: A NEW CHALLENGE (20)

Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model order
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
New E-Discovery Rules Take Effect
New E-Discovery Rules Take Effect  New E-Discovery Rules Take Effect
New E-Discovery Rules Take Effect
 
E-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records RetentionE-Discovery in Litigation and Records Retention
E-Discovery in Litigation and Records Retention
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Future-Proofing Your Law Firm Processes
Future-Proofing Your Law Firm ProcessesFuture-Proofing Your Law Firm Processes
Future-Proofing Your Law Firm Processes
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi Powerpoint
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

E-DISCOVERY AND ELECTRONIC EVIDENCE: A NEW CHALLENGE

  • 1. E-DISCOVERY AND ELECTRONIC EVIDENCE: A NEW CHALLENGE IN BUSINESS LITIGATION William F. Codell HARNED BACHERT & MCGEHEE PSC 324 East Tenth Avenue Post Office Box 1270 Bowling Green, Kentucky 42102-1270 Telephone: (270) 782-3938 Facsimile: (270) 781-4737 www.hbmfirm.com
  • 2. Historical figure and Boston political boss Martin Lomasney was an individual that understood the value of discretion. He is attributed with the famous quote: “Never write if you can speak, never speak if you can nod, never nod if you can wink.” Recently, New York Governor Eliot Spitzer put a modern twist on the famous quote. He is attributed with stating that one should “never write when you can talk, never talk when you can nod, and never put anything in an email.” While companies are generally not as susceptible as politicians to damage from an unfortunate email, a basic understanding of electronic evidence is useful for any company that may become subject to litigation. As the volume of electronically stored information continues to expand, electronic evidence is becoming increasingly important in business litigation. Common forms of electronically stored information include emails, databases, spreadsheets, and word processing documents. Current estimates provide that roughly 800 megabytes of electronically stored information is created per person every year. A standard desktop computer can store the equivalent of 40,000 typed pages of information. Many companies have accumulated thousands of terabytes of electronically stored information. Considering that 1 terabyte of electronically stored information equates to the amount of information in approximately 1 million books, the task of managing electronic documents can be difficult for any business. Similar to a business working to handle new technology, the legal system is undergoing several changes in an effort to manage electronic evidence. In the legal system, particular attention is being given to the process of electronic discovery in the business litigation context. 2
  • 3. The word “discovery” is generally defined in the legal environment as the process by which attorneys reveal facts and develop evidence in preparation for a trial. Common examples of discovery include a deposition in which an attorney may ask questions to a witness and a request for production whereby an attorney may require a person or company to provide certain documents. Traditionally, an attorney would use a discovery request for production to get copies of correspondence, manuals, reports, blueprints, business records, or any other documents that might be relevant to the dispute. Companies involved in litigation are not only required to provide many documents to an adversary’s attorney upon request, they are further required to preserve documents that may be relevant to a dispute. Specifically, once a company is on notice of pending litigation, a “litigation hold” must be implemented to retain documents that the company reasonably believes to be discoverable or relevant to the dispute. In order to comply with the “litigation hold” requirement, a business must take affirmative measures to preserve potential evidence that might otherwise be destroyed in the ordinary course of business. Several companies with a large volume of electronically stored information have suffered painful consequences due to failure to properly preserve relevant electronic documents after receiving notice of potential litigation. One case in which a company was severely punished for failure to preserve relevant electronic evidence involved the bankruptcy of an airline. A lawsuit arose out of the bankruptcy in connection with a transaction that the airline’s Chief Financial Officer may have been involved. The airline’s attorneys advised the company to implement a “litigation hold” to avoid the destruction of electronic documents connected to the dispute. However, the airline’s CFO attempted to delete multiple files on a company laptop computer after receiving the 3
  • 4. notice of the litigation hold. When confronted, the CFO claimed that he had deleted files from the laptop in an effort to hide pornographic images downloaded from the internet. The other party to the lawsuit asserted that some of the deleted electronic files contained documents relevant to the case. The judge for the case punished the company by issuing multiple adverse inferences and a fee award. Generally, an adverse inference means that a party to the litigation does not need to prove an element of its case and/or the jury can infer certain elements of the case. For example, a judge could instruct a jury that certain email documents relevant to a dispute were destroyed and the jury may infer that the emails were harmful to the party guilty of the destruction. Judges have wide discretion in resolving issues connected to discovery abuse. Sanctions that may be imposed on a business for failure to preserve relevant evidence may include the loss of certain defenses, payment of another company’s attorneys’ fees, and an adverse inference instruction to the jury. Such an outcome in a legal fight can be devastating to a business. It is important to note that a company need not intentionally or maliciously destroy relevant electronic documents in order to become subject to discovery sanctions from a court. Reckless or negligent behavior may be adequate to warrant sanctions. Destruction of relevant electronically stored information may be sanctionable in circumstances where the company was not consciously aware of the destruction. The inadvertent destruction of relevant electronic evidence after notice of pending litigation is highly feasible for companies with a large volume of electronically stored information and a regular practice of recycling old “back up” tapes with seemingly outdated files. 4
  • 5. The possibility of litigation sanctions arising from the destruction of electronic documents combined with the accelerated rate at which electronically stored information is generated presents a difficult dilemma for many companies. Despite the continued decrease in the price of data storage, keeping every form of electronically stored information forever is not practical for most businesses. A new amendment to the Federal Rules of Civil Procedure provides one proposed solution. Federal Rule of Civil Procedure 37(f), which covers all cases filed in Federal Court after December 1, 2006, provides that “absent exceptional circumstances, a court may not impose sanctions under these rules on a party for failing to provide electronically stored information lost as a result of the routine, good-faith operation of an electronic information system.” Federal Rule of Civil Procedure 37(f) is a “safe harbor” for companies regarding electronically stored information. It appears that the Rule will protect genuinely routine deletions of data with regard to litigation in Federal Court. The most important language in the Rule emphasizes that protection from sanctions is available only for “the routine, good- faith operation” of a computer system. In order to gain the benefit of the Rule, a company in Federal Court litigation will need to establish that it not only has a policy to deal with electronic document retention, but also that the policy is followed by company officers and employees. As such, the existence of an electronic document management policy can be critical for a business subject to litigation. Due to the fact that every business is unique, no single plan or policy is appropriate for every company. However, some basic standards regarding the management of electronically stored information are equally applicable to almost every company. Four 5
  • 6. generally applicable principles regarding the management of electronically stored information are as follows: 1. Every company should have a written record retention policy; 2. Every company should understand that it has a duty to preserve records once it knows or should have known of potential litigation; 3. Every company should have a plan regarding how records will be preserved once a dispute emerges; and 4. Every company should make efforts to identify likely difficulties with preserving electronic evidence and prospective solutions. Companies that wait until litigation arises before confronting electronic document retention issues will face the potentially impossible task of cataloging and preserving electronically stored information under court mandated deadlines. Such circumstances constitute a formula for catastrophe and significantly increase the risk of painful monetary and evidentiary sanctions. Moreover, an adversary that already has a well-designed policy that can effectively and efficiently deal with electronic evidence issues will have a significant competitive advantage in litigation. The development of a good electronic document retention policy will not only benefit a company after it becomes involved in litigation, it will additionally help officers and employees better understand the business. Developing a policy to properly manage electronically stored information will necessarily involve enhanced communication among individuals from different areas of a company including human resources, information technology, and management. In turn, a greater understanding of the methods of electronic communication and document retention will increase a company’s ability to more efficiently utilize future technological innovations. Current changes imposed on the legal system by advancements in technology reflect new challenges and opportunities facing every business. 6
  • 7. In order to meet new challenges and take advantage of new opportunities, a company would be well advised to continually develop and monitor its electronic document management policy. 7