SlideShare a Scribd company logo
VISUAL GUIDE
AN
1 32
How to Create a
REASONABLE
Preservation Process
UNDER RULE 37(e)
Judge Facciola’s
Keys to Creating
Reasonable
Preservation Steps
Often-Forgotten
Preservation
Considerations
Questions
for Determining
Reasonable Steps
featuring
David Yerich
Director of eDiscovery
UnitedHealth Group
Hon. John M. Facciola (Ret.)
United States Magistrate Judge
D.C. District Court
&
FRCP 37(e) “recognizes that ‘reasonable steps’ to
preserve suffice; it does not call for perfection.”
— Committee Notes
1
3
2
Judge Facciola’s
Keys to Creating Reasonable
Preservation Steps
Often-Forgotten
Preservation Considerations
Questions for Determining
Reasonable Steps
Information Governance
A solid and well-reasoned record
retention policy that has compliance
measures in place for the whole
company puts you halfway (or more)
to convincing the court you’ve taken
reasonable steps.
Structured data and databases
Third party holders of data that is subject
to your access
Cross border data processing
and transfers
Regional privacy laws
Document Everything
Document everything so you can go
into court and say “we did everything
in our power to prevent [ESI loss] from
occurring” rather than “here’s a box
of backup tapes, but we have no idea
what’s on them.”
Be Proactive,
Not Reactive
All too many lawyers are called in like the
plumber, only when the sink backs up,
and confront the reality that there is no
rhyme or reason as to why certain things
have been kept and certain things have
been thrown out. Legal and IT must work
together to ensure data can be preserved
in a defensible, efficient manner.
Did you circulate a legal hold in a
timely fashion?
Were the legal holds distributed to
custodians/data sources (fileshares,
IT admins, etc.) who may hold
potentially responsive data?
Did you send out reminders/
re-issuance hold notices?
When new employees arrived in
the company, were they put on
legal hold?
Proportionality is
Reasonableness
If you’re blindly keeping everything,
you’re defeating one of the purposes
of Rule 26. Proportionality should be
applied to each phase of the e-discovery
process including preservation activities.
Just saving everything is cutting your
throat on a good rug.
Once litigation has been reasonably anticipated, ask these
questions to determine if reasonable steps have been taken:
Reasonable preservation steps include remembering to check and
potentially preserve data from these sources:
When employees on legal hold
depart the company, was their data
preserved?
For key custodians, have you
taken relevant data and put it in a
separate place where it cannot be
disposed of by users?
Did you suspend document
retention policies applying to
relevant data sources?
In order to do this in a way that doesn’t cripple the
enterprise, you have to think through these steps
and make them part of your planning process.
— David Yerich
“ ”
©2017 Exterro, Inc. | www.exterro.com

More Related Content

What's hot

SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
Welly Tjoe
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
Welly Tjoe
 
Data information and information system
Data information and information systemData information and information system
Data information and information system
nripeshkumarnrip
 
SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
Welly Tjoe
 
Backup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsBackup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & Directors
Lucy Denver
 
5 steps to secure data management
5 steps to secure data management5 steps to secure data management
5 steps to secure data management
shopiawilson
 
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesGuidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Iron Mountain
 
Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]
Integrated Enterprise Solutions Inc
 
DocuLynx Software Capabilities
DocuLynx Software CapabilitiesDocuLynx Software Capabilities
DocuLynx Software Capabilities
DocuLynx
 
Acc audit4
Acc audit4Acc audit4
Acc audit4
Marc Leprince
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
Bianca Mueller, LL.M.
 
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedFireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository Deconstructed
Armor
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
Rishu Mehra
 
Infovest_Factsheet_IDM
Infovest_Factsheet_IDMInfovest_Factsheet_IDM
Infovest_Factsheet_IDM
Robin Kemper
 
Big Data Analytics with MarkLogic
Big Data Analytics with MarkLogicBig Data Analytics with MarkLogic
Big Data Analytics with MarkLogic
MarkLogic Corporation
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
mrmwood
 
Itamg Power Point Presentation0310
Itamg Power Point Presentation0310Itamg Power Point Presentation0310
Itamg Power Point Presentation0310
ITAMG
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Symantec
 
The 10 biggest threats to your information (caused by yourself the CEO)
The 10 biggest threats to your information (caused by yourself the CEO)The 10 biggest threats to your information (caused by yourself the CEO)
The 10 biggest threats to your information (caused by yourself the CEO)
Humoback
 
Executive Information System or Executive Support System
Executive Information System or Executive Support SystemExecutive Information System or Executive Support System
Executive Information System or Executive Support System
Saurav (Srv) Singhania
 

What's hot (20)

SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
 
Data information and information system
Data information and information systemData information and information system
Data information and information system
 
SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
 
Backup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsBackup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & Directors
 
5 steps to secure data management
5 steps to secure data management5 steps to secure data management
5 steps to secure data management
 
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective ApproachesGuidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
 
Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]
 
DocuLynx Software Capabilities
DocuLynx Software CapabilitiesDocuLynx Software Capabilities
DocuLynx Software Capabilities
 
Acc audit4
Acc audit4Acc audit4
Acc audit4
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedFireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository Deconstructed
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Infovest_Factsheet_IDM
Infovest_Factsheet_IDMInfovest_Factsheet_IDM
Infovest_Factsheet_IDM
 
Big Data Analytics with MarkLogic
Big Data Analytics with MarkLogicBig Data Analytics with MarkLogic
Big Data Analytics with MarkLogic
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
Itamg Power Point Presentation0310
Itamg Power Point Presentation0310Itamg Power Point Presentation0310
Itamg Power Point Presentation0310
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
The 10 biggest threats to your information (caused by yourself the CEO)
The 10 biggest threats to your information (caused by yourself the CEO)The 10 biggest threats to your information (caused by yourself the CEO)
The 10 biggest threats to your information (caused by yourself the CEO)
 
Executive Information System or Executive Support System
Executive Information System or Executive Support SystemExecutive Information System or Executive Support System
Executive Information System or Executive Support System
 

Viewers also liked

LPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERY
LPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERYLPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERY
LPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERY
Kelly Services
 
Cloud Function For Firebase - GITS
Cloud Function For Firebase - GITSCloud Function For Firebase - GITS
Cloud Function For Firebase - GITS
Yatno Sudar
 
HashiCorp's Vault - The Examples
HashiCorp's Vault - The ExamplesHashiCorp's Vault - The Examples
HashiCorp's Vault - The Examples
Michał Czeraszkiewicz
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
Amazon Web Services
 
A Walk in the Cloud with AWS Lambda
A Walk in the Cloud with AWS LambdaA Walk in the Cloud with AWS Lambda
A Walk in the Cloud with AWS Lambda
Amazon Web Services
 
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech TalksDeep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Amazon Web Services
 
Five keys to successful cloud migration
Five keys to successful cloud migrationFive keys to successful cloud migration
Five keys to successful cloud migration
IBM
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (8)

LPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERY
LPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERYLPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERY
LPO 2.0 - MARRYING TECHNOLOGY AND TALENT IN A NEW ERA OF eDISCOVERY
 
Cloud Function For Firebase - GITS
Cloud Function For Firebase - GITSCloud Function For Firebase - GITS
Cloud Function For Firebase - GITS
 
HashiCorp's Vault - The Examples
HashiCorp's Vault - The ExamplesHashiCorp's Vault - The Examples
HashiCorp's Vault - The Examples
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
 
A Walk in the Cloud with AWS Lambda
A Walk in the Cloud with AWS LambdaA Walk in the Cloud with AWS Lambda
A Walk in the Cloud with AWS Lambda
 
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech TalksDeep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
Deep Dive on AWS Lambda - January 2017 AWS Online Tech Talks
 
Five keys to successful cloud migration
Five keys to successful cloud migrationFive keys to successful cloud migration
Five keys to successful cloud migration
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
Bill Lisse
 
Frankston
FrankstonFrankston
Frankston
brentcarey
 
1. Introduction.pptx
1. Introduction.pptx1. Introduction.pptx
1. Introduction.pptx
EllenGrace9
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
EllenGrace9
 
HNBA Boston - eDiscovery
HNBA Boston - eDiscoveryHNBA Boston - eDiscovery
HNBA Boston - eDiscovery
Abel Cruz
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
Atlantic Training, LLC.
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
ARMA International
 
Archiving files. kainaiwa.15
Archiving files. kainaiwa.15Archiving files. kainaiwa.15
Archiving files. kainaiwa.15
CG Hylton Inc.
 
Q2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesQ2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion Services
MarielenaCruzat
 
Data mapping
Data mappingData mapping
Data mapping
James Cortopassi
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
David Kearney
 
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
vrickens
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
ShubhraGoyal4
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
loglogic
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
Blancco
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
J. David Morris
 
Records Creation And Maintenance
Records Creation And MaintenanceRecords Creation And Maintenance
Records Creation And Maintenance
IIM-Africa
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
David D. Maxwell, MIT Security, CISM, CISA, CISSP
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
AIIM International
 

Similar to E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e) (20)

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Frankston
FrankstonFrankston
Frankston
 
1. Introduction.pptx
1. Introduction.pptx1. Introduction.pptx
1. Introduction.pptx
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
HNBA Boston - eDiscovery
HNBA Boston - eDiscoveryHNBA Boston - eDiscovery
HNBA Boston - eDiscovery
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
 
Archiving files. kainaiwa.15
Archiving files. kainaiwa.15Archiving files. kainaiwa.15
Archiving files. kainaiwa.15
 
Q2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesQ2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion Services
 
Data mapping
Data mappingData mapping
Data mapping
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docxITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9Information Gover.docx
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Records Creation And Maintenance
Records Creation And MaintenanceRecords Creation And Maintenance
Records Creation And Maintenance
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 

Recently uploaded

17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
seoglobal20
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
schubergbestrong
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 

Recently uploaded (20)

17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 

E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)

  • 1. VISUAL GUIDE AN 1 32 How to Create a REASONABLE Preservation Process UNDER RULE 37(e) Judge Facciola’s Keys to Creating Reasonable Preservation Steps Often-Forgotten Preservation Considerations Questions for Determining Reasonable Steps featuring David Yerich Director of eDiscovery UnitedHealth Group Hon. John M. Facciola (Ret.) United States Magistrate Judge D.C. District Court & FRCP 37(e) “recognizes that ‘reasonable steps’ to preserve suffice; it does not call for perfection.” — Committee Notes 1 3 2 Judge Facciola’s Keys to Creating Reasonable Preservation Steps Often-Forgotten Preservation Considerations Questions for Determining Reasonable Steps Information Governance A solid and well-reasoned record retention policy that has compliance measures in place for the whole company puts you halfway (or more) to convincing the court you’ve taken reasonable steps. Structured data and databases Third party holders of data that is subject to your access Cross border data processing and transfers Regional privacy laws Document Everything Document everything so you can go into court and say “we did everything in our power to prevent [ESI loss] from occurring” rather than “here’s a box of backup tapes, but we have no idea what’s on them.” Be Proactive, Not Reactive All too many lawyers are called in like the plumber, only when the sink backs up, and confront the reality that there is no rhyme or reason as to why certain things have been kept and certain things have been thrown out. Legal and IT must work together to ensure data can be preserved in a defensible, efficient manner. Did you circulate a legal hold in a timely fashion? Were the legal holds distributed to custodians/data sources (fileshares, IT admins, etc.) who may hold potentially responsive data? Did you send out reminders/ re-issuance hold notices? When new employees arrived in the company, were they put on legal hold? Proportionality is Reasonableness If you’re blindly keeping everything, you’re defeating one of the purposes of Rule 26. Proportionality should be applied to each phase of the e-discovery process including preservation activities. Just saving everything is cutting your throat on a good rug. Once litigation has been reasonably anticipated, ask these questions to determine if reasonable steps have been taken: Reasonable preservation steps include remembering to check and potentially preserve data from these sources: When employees on legal hold depart the company, was their data preserved? For key custodians, have you taken relevant data and put it in a separate place where it cannot be disposed of by users? Did you suspend document retention policies applying to relevant data sources? In order to do this in a way that doesn’t cripple the enterprise, you have to think through these steps and make them part of your planning process. — David Yerich “ ” ©2017 Exterro, Inc. | www.exterro.com