SlideShare a Scribd company logo
e-Discovery

Data Retention and Other Useful
       Discussion Topics
Document Retention Policy
• Document retention means many things to many people depending on
  their business.
        • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices)
        • HIPPA
• Can be mandated based on industry by either federal, or state
  jurisdictions, sometimes both.
• Basically if you are not mandated to retain your documents, draft and
  adhere to your own document retention policy. This will make any
  electronic discovery process much more efficient.
• Adhering to your own document retention policy ensures your ethical
  practices regarding data deletion if involved in litigation.
• An effective data retention policy should:
        • Reduce “data artifacts”
        • Reduce the amount of production and review: if involved in electronic discovery
        • Properly store and delete company relevant data based on requirements set by the
          organization or mandating authority.
        • Address all relative data and storage options utilized by the company, pc hard disks,
          servers, mobile devices, tapes, archives, off-site storage
Electronic Discovery
• Electronic discovery (or e-discovery) refers to discovery in civil litigation
  which deals with information in electronic format also referred to as
  Electronically Stored Information (ESI). Electronic information is different
  from paper information because of its intangible form, volume, transience
  and persistence. Also, electronic information is usually accompanied by
  metadata, which is not present in paper documents. However, paper
  documents can be scanned into electronic format and then manually
  coded with metadata. The preservation of metadata from electronic
  documents creates special challenges to prevent spoliation.

• Electronic discovery was the subject of amendments to the Federal Rules
  of Civil Procedure, effective December 1, 2006.[1] shows the changes, the
  complete Rules, where in particular rules 16 and 26 are of interest to
  electronic discovery.

* source http://en.wikipedia.org/wiki/Electronic_discovery
Federal Rules of Civil Procedure
                Related to e-Discovery
Rule 16. Pretrial Conferences; Scheduling; Management
(a) Purposes of a Pretrial Conference.
      (3) discouraging wasteful pretrial activities;
(b) Scheduling
      (3) Contents of the Order.
              (A) Required Contents. The scheduling order must limit the time to join other parties, amend the
                  pleadings, complete discovery, and file motions.
              (B) Permitted Contents. The scheduling order may:
                  (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1);
                  (ii) modify the extent of discovery;
                  (iii) provide for disclosure or discovery of electronically stored information;
(c) Attendance and Matters for Consideration at a Pretrial Conference.
       (2) Matters for Consideration
              (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule
                  26 and Rules 29 through 37;




* Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
Federal Rules of Civil Procedure
             Related to e-Discovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(a)   Required Disclosures
      (1) Initial Disclosures
           (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court,
           a party must, without awaiting a discovery request, provide to the other parties:
                (ii) a copy — or a description by category and location — of all documents, electronically stored information, and
                tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or
                defenses, unless the use would be solely for impeachment;
(b) Discovery Scope and Limits.
       (2) Limitations on Frequency and Extent
           (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of
           electronically stored information from sources that the party identifies as not reasonably accessible
           because of undue burden or cost. On motion to compel discovery or for a protective order, the party from
           whom discovery is sought must show that the information is not reasonably accessible because of undue
           burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if
           the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may
           specify conditions for the discovery.
           (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery
           otherwise allowed by these rules or by local rule if it determines that:
                (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is
                more convenient, less burdensome, or less expensive;
                (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or
                (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case,
                the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the
                importance of the discovery in resolving the issues.
Federal Rules of Civil Procedure
                Related to eDiscovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(b) Discovery Scope and Limits
      (3) Trial Preparation: Materials.
           (A) Documents and Tangible Things.
           (B) Protection Against Disclosure.
           (C) Previous Statement.
        (5) Claiming Privilege or Protecting Trial- Preparation Materials.
             (B)Information Produced.
(c) Protective Orders
      (1) In General
      (2) Ordering Discovery
(d) Timing and Sequence of Discovery
      (1) Timing
      (2) Sequence
(e) Supplementation of Disclosures and Responses.
      (1) In General
      (2) Expert Witness.
(f) Conference of the Parties; Planning for Discovery
      (3) Discovery Plan.



*source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
Electronically Stored Information (ESI)
•        Electronically stored information, for the purpose of the Federal Rules of Civil
         Procedure (FRCP) is information created, manipulated, communicated, stored, and
         best utilized in digital form, requiring the use of computer hardware and software.
         The term has become a legally defined phrase as the U.S. government determined
         for the purposes of the FRCP rules of 2006 that promulgating procedures for
         maintenance and discovery for electronically stored information was necessary. [1]

•        Types of ESI
         (1)Native Files (Office documents ect…)
         (2)Logical Data (RAM)




[1]source:   http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure)
[2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
e-Discovery as Experienced
The process as experienced:
• Requesting attorney/party issues legal hold (usually broad), or requests financial impact
    information for the legal hold they are about to request.
• Responding attorney/party rebuts request as too broad or implements legal hold on electronic
    information to the specified requirements of the request.
• Parties conference and discovery requirements are mandated.
• Responding party performs discovery on the data specified in the time frame required.
• Information/documents produced from the discovery are given to counsel to review for privileged
    information.
• Non-privileged information is given to requesting party in the specified required formats.

Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing
    their discovery requirements.

•   Typically this is a “data hunt” by the complainant counsel to discover what types of data are
    available, any data retention policies that exist, and in what formats the data is in.
•   This may even get into “known” information such as if the IT personnel is aware of any data
    destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has
    assisted any specific employees in question with data deletion.
Legal Hold
•   With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley
    cases, and the Supreme Court analyzing how document retention policies are
    enforced, corporate practices around the retention/ destruction of electronically
    stored information (ESI) have never been more important.
•   The “legal hold” operates at the intersection of litigation and corporate retention
    practices, and it has emerged as an almost-obligatory component of a company's
    response to notice or reasonable anticipation of litigation. The basis of this
    obligation is the common law duty against spoilation; that is, the duty to avoid the
    loss of, destruction of, or failure to preserve information that may be relevant to
    pending or potential proceedings.
•   In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the
    documents in your desk drawers or file cabinets. But modern businesses generate
    massive amounts of digital information, which is created and stored in an ever-
    expanding number of devices and locations, and which can be destroyed without
    any affirmative action. As a result, effective legal hold practices involve significantly
    more than merely issuing an internal letter and sitting back until the official
    discover process begins.

* source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
The Sedona Conference®
     Best Practices Recommendations & Principles for
       Addressing Electronic Document Production
1.   Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state
     equivalents. Organizations must properly preserve electronically stored information that can
     reasonably be anticipated to be relevant to litigation.
2.   When balancing the cost, burden, and need for electronically stored information, courts and
     parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its
     state equivalents, which require consideration of the technological feasibility and realistic costs of
     preserving, retrieving, reviewing, and producing electronically stored information, as well as the
     nature of the litigation and the amount in controversy
3.   Parties should confer early in discovery regarding the preservation and production of
     electronically stored information when these matters are at issue in the litigation and seek to
     agree on the scope of each party’s rights and responsibilities
4.   Discovery requests for electronically stored information should be as clear as possible, while
     responses and objections to discovery should disclose the scope and limits of the production
5.   The obligation to preserve electronically stored information requires reasonable and good faith
     efforts to retain information that may be relevant to pending or threatened litigation. However, it
     is unreasonable to expect parties to take every conceivable step to preserve all potentially
     relevant electronically stored information
6.   Responding parties are best situated to evaluate the procedures, methodologies, and
     technologies appropriate for preserving and producing their own electronically stored
     information
7.   The requesting party has the burden on a motion to compel to show that the responding party’s
     steps to preserve and produce relevant electronically stored information were inadequate
The Sedona Conference®
      Best Practices Recommendations & Principles for
        Addressing Electronic Document Production
8.    The primary source of electronically stored information for production should be active data and information.
      Resort to disaster recovery backup tapes and other sources of electronically stored information that are not
      reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs
      and burdens of retrieving and processing the electronically stored information from such sources, including the
      disruption of business and information management activities
9.    Absent a showing of special need and relevance, a responding party should not be required to preserve, review,
      or produce deleted, shadowed, fragmented, or residual electronically stored information
10.   A responding party should follow reasonable procedures to protect privileges and objections in connection with
      the production of electronically stored information
11.    A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored
      information by using electronic tools and processes, such as data sampling, searching, or the use of selection
      criteria, to identify data reasonably likely to contain relevant information
12.   Absent party agreement or court order specifying the form or forms of production, production should be made
      in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into
      account the need to produce reasonably accessible metadata that will enable the receiving party to have the
      same ability to access, search, and display the information as the producing party where appropriate or
      necessary in light of the nature of the information and the needs of the case
13.   Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing
      electronically stored information should be borne by the responding party, unless the information sought is not
      reasonably available to the responding party in the ordinary course of business. If the information sought is not
      reasonably available to the responding party in the ordinary course of business, then, absent special
      circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to
      the requesting party
14.   Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear
      duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a
      reasonable probability that the loss of the evidence has materially prejudiced the adverse party
Discussion Points
• Legal professionals don’t fully understand information
  technology and the extent of their requests. How does
  this impact IT/IS?
• Using cost-shifting as an effective tool to reducing e-
  Discovery requests.
• Why would my company need a data retention policy?
• Is data governance important to managing litigious
  corporate data?
• Ethical, practical, and efficient data retention
      • Does it exist?
      • Who’s managing it?

More Related Content

What's hot

Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
Richard Austin
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
primeteacher32
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
Dr Raghu Khimani
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
University of Southern Mississippi
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
PrabithGupta1
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
saddamhusain hadimani
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
John J. Carney, Esq.
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
Seccuris Inc.
 

What's hot (20)

Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 

Similar to E Discovery

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
Kirby Drake
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
Hinshaw & Culbertson LLP
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Seth Row
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
Lourdes Fuentes Slater
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
Josh Kubicki
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
SethRandle
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
Financial Poise
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
Aubrey Owens
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
BoyarMiller
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Financial Poise
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
Brendan Kenny
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
John Jablonski
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
jvanacour
 

Similar to E Discovery (20)

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
 
Daniel day
Daniel dayDaniel day
Daniel day
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 

More from James Sutter

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
James Sutter
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014James Sutter
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David MannJames Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013James Sutter
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOTJames Sutter
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13James Sutter
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjtJames Sutter
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costsJames Sutter
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentationJames Sutter
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12James Sutter
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012 James Sutter
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12James Sutter
 

More from James Sutter (20)

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David Mann
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjt
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costs
 
CIO Branding
CIO BrandingCIO Branding
CIO Branding
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentation
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12
 
CIO Value Issue
CIO Value IssueCIO Value Issue
CIO Value Issue
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

E Discovery

  • 1. e-Discovery Data Retention and Other Useful Discussion Topics
  • 2. Document Retention Policy • Document retention means many things to many people depending on their business. • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices) • HIPPA • Can be mandated based on industry by either federal, or state jurisdictions, sometimes both. • Basically if you are not mandated to retain your documents, draft and adhere to your own document retention policy. This will make any electronic discovery process much more efficient. • Adhering to your own document retention policy ensures your ethical practices regarding data deletion if involved in litigation. • An effective data retention policy should: • Reduce “data artifacts” • Reduce the amount of production and review: if involved in electronic discovery • Properly store and delete company relevant data based on requirements set by the organization or mandating authority. • Address all relative data and storage options utilized by the company, pc hard disks, servers, mobile devices, tapes, archives, off-site storage
  • 3. Electronic Discovery • Electronic discovery (or e-discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). Electronic information is different from paper information because of its intangible form, volume, transience and persistence. Also, electronic information is usually accompanied by metadata, which is not present in paper documents. However, paper documents can be scanned into electronic format and then manually coded with metadata. The preservation of metadata from electronic documents creates special challenges to prevent spoliation. • Electronic discovery was the subject of amendments to the Federal Rules of Civil Procedure, effective December 1, 2006.[1] shows the changes, the complete Rules, where in particular rules 16 and 26 are of interest to electronic discovery. * source http://en.wikipedia.org/wiki/Electronic_discovery
  • 4. Federal Rules of Civil Procedure Related to e-Discovery Rule 16. Pretrial Conferences; Scheduling; Management (a) Purposes of a Pretrial Conference. (3) discouraging wasteful pretrial activities; (b) Scheduling (3) Contents of the Order. (A) Required Contents. The scheduling order must limit the time to join other parties, amend the pleadings, complete discovery, and file motions. (B) Permitted Contents. The scheduling order may: (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1); (ii) modify the extent of discovery; (iii) provide for disclosure or discovery of electronically stored information; (c) Attendance and Matters for Consideration at a Pretrial Conference. (2) Matters for Consideration (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule 26 and Rules 29 through 37; * Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
  • 5. Federal Rules of Civil Procedure Related to e-Discovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (a) Required Disclosures (1) Initial Disclosures (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court, a party must, without awaiting a discovery request, provide to the other parties: (ii) a copy — or a description by category and location — of all documents, electronically stored information, and tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or defenses, unless the use would be solely for impeachment; (b) Discovery Scope and Limits. (2) Limitations on Frequency and Extent (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for the discovery. (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery otherwise allowed by these rules or by local rule if it determines that: (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.
  • 6. Federal Rules of Civil Procedure Related to eDiscovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (b) Discovery Scope and Limits (3) Trial Preparation: Materials. (A) Documents and Tangible Things. (B) Protection Against Disclosure. (C) Previous Statement. (5) Claiming Privilege or Protecting Trial- Preparation Materials. (B)Information Produced. (c) Protective Orders (1) In General (2) Ordering Discovery (d) Timing and Sequence of Discovery (1) Timing (2) Sequence (e) Supplementation of Disclosures and Responses. (1) In General (2) Expert Witness. (f) Conference of the Parties; Planning for Discovery (3) Discovery Plan. *source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
  • 7. Electronically Stored Information (ESI) • Electronically stored information, for the purpose of the Federal Rules of Civil Procedure (FRCP) is information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software. The term has become a legally defined phrase as the U.S. government determined for the purposes of the FRCP rules of 2006 that promulgating procedures for maintenance and discovery for electronically stored information was necessary. [1] • Types of ESI (1)Native Files (Office documents ect…) (2)Logical Data (RAM) [1]source: http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure) [2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
  • 8. e-Discovery as Experienced The process as experienced: • Requesting attorney/party issues legal hold (usually broad), or requests financial impact information for the legal hold they are about to request. • Responding attorney/party rebuts request as too broad or implements legal hold on electronic information to the specified requirements of the request. • Parties conference and discovery requirements are mandated. • Responding party performs discovery on the data specified in the time frame required. • Information/documents produced from the discovery are given to counsel to review for privileged information. • Non-privileged information is given to requesting party in the specified required formats. Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing their discovery requirements. • Typically this is a “data hunt” by the complainant counsel to discover what types of data are available, any data retention policies that exist, and in what formats the data is in. • This may even get into “known” information such as if the IT personnel is aware of any data destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has assisted any specific employees in question with data deletion.
  • 9. Legal Hold • With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley cases, and the Supreme Court analyzing how document retention policies are enforced, corporate practices around the retention/ destruction of electronically stored information (ESI) have never been more important. • The “legal hold” operates at the intersection of litigation and corporate retention practices, and it has emerged as an almost-obligatory component of a company's response to notice or reasonable anticipation of litigation. The basis of this obligation is the common law duty against spoilation; that is, the duty to avoid the loss of, destruction of, or failure to preserve information that may be relevant to pending or potential proceedings. • In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the documents in your desk drawers or file cabinets. But modern businesses generate massive amounts of digital information, which is created and stored in an ever- expanding number of devices and locations, and which can be destroyed without any affirmative action. As a result, effective legal hold practices involve significantly more than merely issuing an internal letter and sitting back until the official discover process begins. * source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
  • 10. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 1. Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state equivalents. Organizations must properly preserve electronically stored information that can reasonably be anticipated to be relevant to litigation. 2. When balancing the cost, burden, and need for electronically stored information, courts and parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its state equivalents, which require consideration of the technological feasibility and realistic costs of preserving, retrieving, reviewing, and producing electronically stored information, as well as the nature of the litigation and the amount in controversy 3. Parties should confer early in discovery regarding the preservation and production of electronically stored information when these matters are at issue in the litigation and seek to agree on the scope of each party’s rights and responsibilities 4. Discovery requests for electronically stored information should be as clear as possible, while responses and objections to discovery should disclose the scope and limits of the production 5. The obligation to preserve electronically stored information requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation. However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant electronically stored information 6. Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information 7. The requesting party has the burden on a motion to compel to show that the responding party’s steps to preserve and produce relevant electronically stored information were inadequate
  • 11. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 8. The primary source of electronically stored information for production should be active data and information. Resort to disaster recovery backup tapes and other sources of electronically stored information that are not reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs and burdens of retrieving and processing the electronically stored information from such sources, including the disruption of business and information management activities 9. Absent a showing of special need and relevance, a responding party should not be required to preserve, review, or produce deleted, shadowed, fragmented, or residual electronically stored information 10. A responding party should follow reasonable procedures to protect privileges and objections in connection with the production of electronically stored information 11. A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored information by using electronic tools and processes, such as data sampling, searching, or the use of selection criteria, to identify data reasonably likely to contain relevant information 12. Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and the needs of the case 13. Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing electronically stored information should be borne by the responding party, unless the information sought is not reasonably available to the responding party in the ordinary course of business. If the information sought is not reasonably available to the responding party in the ordinary course of business, then, absent special circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to the requesting party 14. Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a reasonable probability that the loss of the evidence has materially prejudiced the adverse party
  • 12. Discussion Points • Legal professionals don’t fully understand information technology and the extent of their requests. How does this impact IT/IS? • Using cost-shifting as an effective tool to reducing e- Discovery requests. • Why would my company need a data retention policy? • Is data governance important to managing litigious corporate data? • Ethical, practical, and efficient data retention • Does it exist? • Who’s managing it?