SlideShare a Scribd company logo
Mastering
Electronic Discovery
Brendan M. Kenny
Blackwell Burke
Minneapolis, MN
Eric P. Mandel
Zelle Hofmann
Minneapolis, MN
Don’t Be an Unreliable Narrator
The Unreliable Narrator and Law
Within the field of literature, the unreliable narrator is a
storyteller who violates our trust.
Whatever the cause, the reader starts to notice things
that suggest that the narrator is either lying or doesn’t
understand what is really going on.
Logical Fallacies
https://bookofbadarguments.com/
Appeal to Ignorance & Spoliation
https://bookofbadarguments.com/
Affirming the Consequent
https://bookofbadarguments.com/
Section 5
Drafting &
Responding to
Requests for
E-Discovery Under
the Revised Rules
Protecting Privileged Material During
E-Discovery
(3) Contents of the Order. * * *
(B) Permitted Contents. The scheduling
order may:
(iii) provide for disclosure, or discovery,
or preservation of electronically
stored information;
(iv) include any agreements the parties
reach for asserting claims of privilege
or of protection as trial-preparation
material after information is produced,
including agreements reached
under Federal Rule of Evidence 502
Rule 16 Order
Parties may obtain discovery regarding any nonprivileged
matter that is relevant to any party’s claim or defense and
proportional to the needs of the case, [considering the
amount in controversy, the importance of the issues at
stake in the action,] considering the importance of the
issues at stake in the action, the amount in controversy,
the parties relative access to relevant information, the
parties’ resources, the importance of the discovery in
resolving the issues, and whether the burden or expense
of the proposed discovery outweighs its likely benefit.
Information within this scope of discovery need not be
admissible in evidence to be discoverable.
Scope of Discovery: Rule 26(b)
Culling by Objective Criteria
http://www.papergreat.com/2014/01/old-style-ruth-manning-sanders-library.html
We want to use to cull out
irrelevant documents using these
filters:
Domain
Name
User
Date range
Custodian
Clustering
What Is the Case About?
Facts/admissions
Statute of limitations
Claims
Defenses
How Do My Client’s Systems Work?
Retention Schedule
Key Custodians
Document
Management
Obligations of Counsel Under Rule 26(g)
Metadata: How Important Is It?
What?: Data about data.
When?: Whenever lawyers
send, produce or receive ESI
containing metadata in
response to a discovery
request or subpoena.
Why?: If the history, tracking,
or management of an
electronic document matters.
How?: Review and produce
the document in a form that
maintains the metadata.
THE SEDONA CONFERENCE® COMMENTARY ON ETHICS & METADATA
What is to be done?
Work with other side to
determine how to deal
with metadata during
production.
Requesting Production of Native Files
Rule 34(b)(2)(E)
Producing the Documents or Electronically Stored Information.
Unless otherwise stipulated or ordered by the court, these
procedures apply to producing documents or electronically stored
information:
(i) Aparty must produce documents as they are kept in the usual
course of business or must organize and label them to
correspond to the categories in the request;
(ii) If a request does not specify a form for producing
electronically stored information, a party must produce it in a form
or forms in which it is ordinarily maintained or in a reasonably
usable form or forms; and
(iii) A party need not produce the same electronically stored
information in more than one form.
Case Law | Metadata & Cooperation
Covad Commc’n Co. v. Revonet, Inc.
Facts: Covad moved to compel Revonet to produce
documents in native format, even though Covad never
requested that they be produced in native form and
Revonet already produced the documents in hard copy.
Outcome: Motion denied
Take Away: Parties should cooperate to figure out
forms of production in Rule 26(f), include in the Discovery
Plan, and then make it part of Rule 16 order.
Objective Criteria Established During 26(f)
(f) CONFERENCE OF THE PARTIES;
PLANNING FOR DISCOVERY.
(3) Discovery Plan. A discovery plan must
state the parties’ views and proposals on: * *
*
(C) any issues about disclosure, or
discovery, or preservation of electronically
stored information, including the form or
forms in which it should be produced;
(D) any issues about claims of privilege or of
protection as trial-preparation materials,
including — if the parties agree on a
procedure to assert these claims after
production — whether to ask the court to
include their agreement in an order under
Federal Rule of Evidence 502;
Stake out your position
Section 6
Admitting ESI
into Evidence
for Trial
Evidence Admissible Only IF
Relevant: tends to make a fact “of consequence” more or
less probable.
Authentic: prima facie showing of trustworthiness that the
document is what the party claims it to be.
Non-Hearsay: not a third-party’s out-of-court statement
offered for its truth.
Hearsay Exception: hearsay statement, but falls under
exception.
Original or Duplicate Writing: original or duplicate
required unless proven by acceptable secondary evidence.
Applying FRE 901 and 902 to ESI
Rule 901: Can you show that the ESI is what you say it is?
Authorizes “[e]vidence describing a process or system
used to produce a result and showing that the process or
system produces an accurate result.”
Rule 902: Is the ESI self-authenticating?
Official Publications: Books, pamphlets, or other
publications purporting to be issued by public authority.
Trade Inscriptions: Information in the document
generated in the course of business that shows ownership,
control, or origin.
Records of Regularly Conducted Activity. Document
with declaration that showing that document was created
and kept in the regular course of business.
Hashtags & Metadata to Meet Rule 901
“A party that seeks to introduce its own electronic records
may have just as much difficulty authenticating them as
one that attempts to introduce the electronic records of an
adversary.”
-- Judge Grimm
Hashtags: A unique numerical identifier that can be
assigned to a file, a group of files, or a portion of a file.
Metadata: Information describing the history, tracking, or
management of an electronic document.
Tips for Authenticating Social Media Evidence
Don’t rely on print-outs.
Use programs to capture
and authenticate.
Remember: social-media
evidence = evidence.
Don’t forget circumstantial
evidence.
Using Witnesses to Introduce ESI
From the creator?
From the receiver?
From anyone else who could
know?
Evaluating Forensic Reports and
Handling Daubert Challenges
Framework for Evaluating Report
How was evidence collected?
Provides sufficient details to replicate findings?
Establishes tools used?
Establishes assumptions made?
Case Law | ESI Forensic Report
Nucor Corp v. Bell
Background: Nucor’s forensic report
stated that data was wiped from former
employee Bell’s laptop.
Problem: Nucor moved for a default
judgment or an adverse inference jury
instruction, based partly on expert’s theory
that specialized software wiped data from
laptop hard drive.
Outcome: Motion denied
Nucor expert’s methodology insufficient to show that defendants
intentionally wiped data, especially because he arrived at his final
theories only after the defendants’expert discredited his others.
Applying Daubert
Testing: Can and has the scientific procedure
been independently tested?
Peer Review: Has the scientific procedure
been published and subject to peer review?
Error rate: Is there a known error rate, or
potential to know the error rate, associated with
the use of this scientific procedure?
Standards: Are there standards and
protocols for the execution of the methodology?
Acceptance: Is the scientific procedure
generally accepted by the relevant scientific
community?
ESI and the Rules of Hearsay
Non-Hearsay #1: Some ESI isn’t
hearsay because no person created
the document and no assertion is
made in it.
Non-Hearsay #2: Not offered to
prove assertions.
Don’t Forget Business
Records Exception!
Applying the Original Writing /
Best Evidence Rule
ESI offered as evidence an original or a
duplicate?
Admissible secondary evidence (e.g.,
testimony)?
Rely on summaries?
Party admissions?
Object or you waive!
Section 7
Ethics
ABA Model Rule 1.1
Competence
“A lawyer shall provide competent
representation to a client. Competent
representation requires the legal knowledge,
skill, thoroughness and preparation reasonably
necessary for the representation.”
Case Law | Competence
Brown v. Tellermate Holdings Ltd.
Background: Fired salespeople bring sex-
discrimination action against Tellermate.
Problem: Defense counsel did not understand how to
find and produce information on client’s salesforce.com
account and made false statements to opposing counsel
and the court.
Outcome:
NY Rule Prof. Conduct 4.2(a)
Communication w/ Party
“[A] lawyer shall not communicate about the
subject of a representation with a party” who the
lawyer “knows to be represented by another
lawyer in the matter” unless the lawyer has the
consent of the other lawyer or the contact is
“authorized to do so by law.”
The Model Rule 3.3(a)
Candor
A lawyer shall not knowingly:
(1) Make a false statement of fact or law; or
(2) Offer evidence lawyer knows to be
false.
The Model Rule 3.4(a)
Fairness
“A lawyer shall not unlawfully obstruct another party’s
access to evidence or unlawfully alter, destroy or
conceal a document or other material having
potential evidentiary value. A lawyer shall not counsel
or assist another person to do any such act….”
Ethics Hypothetical
Axis employee loses control of concrete truck,
hits Bester’s car, and kills Bester’s wife.
Employee pleads to manslaughter.
Bester hires McGuire and sues Axis under
wrongful death and loss-of-consortium theories.
Axis counsel receives Facebook message from
Bester and found on profile; served
discovery.
McGuire’s office tells Bester to “clean up”
Facebook; no Facebook photos produced; Axis
moves to compel.
Claims:
Loss of Consortium
What’s relevant?
In a wrongful death action in Virginia, a spouse may
recover for sorrow, mental anguish, and solace, which
can include society, companionship, comfort,
guidance, “kindly offices” and advice of the decedent.
Facebook Ethics
Background: At the time, Facebook allowed you to
briefly access the private Facebook of anyone who
responds to your message.
AXIS COUNSEL OUT-OF-BOUNDS?
Some what-ifs:
Bester contacted Axis’s counsel first?
Bester told Axis’s to stay away from his Facebook
page?
Bester invited Axis’s counsel to be Facebook friends?
Axis’s counsel knew that the photo was private?
Discovery Ethics: Relevance & Scope
Flickr/a4gpa
The Big Picture: Is the photo
relevant under any circumstances?
Some What-ifs:
Picture taken before his wife died?
Picture taken a year after wife died?
Picture taken at wedding reception
where grooms men were given
shirts and expected to behave
badly.
Preservation Ethics
Can Bester’s attorney tell him to delete something from his
Facebook profile without violating ethics?
Some What-ifs:
McGuire tells Bester to “clean-up” his Facebook profile
because he doesn’t want to see photos as trial exhibits?
McGuire has paralegal contact Bester and asks him to
“clean-up” Facebook profile.
Discovery Ethics: Preparing & Responding
Some what-ifs:
Axis sends out discovery requesting: “screen print copies on
the day this request is signed of all pages from Isaiah Lester’s
Facebook page including, but not limited to, all pictures, his
profile, his message board, status updates, and all messages
sent or received.” OR…
Axis sends out more narrowly tailored discovery request.
OR…
Bester responds to discovery with “I do not have a Facebook
page on the date this is signed.” OR…
Bester objects to discovery because no showing that evidence
is relevant.
Motion to Compel
What Should
Court Do?
Investigating Panelists and Voir Dire
Juror did not hold his card up.
Juror did not hold his card up.
Juror’s Social Media
“No, we are not champions of civil/human rights. In
fact, our Courts are willing to usurp and strip each
and every one of those rights in order to protect
false entities, these big businesses.”
“Our people are in bondage. The shackles of wage
slavery and money are placed silently on our
minds from birth.”
Monitoring Jury’s Use of Social Media
Protecting Client Confidentiality
in Digital Communications
Model Rule 1.6 | Confidentiality: A lawyer shall
make reasonable efforts to prevent the inadvertent
disclosure of, or unauthorized access to, information
relating to the representation of a client.
The FRE 502 Order Shall Set You Free
Case Law | Confidentiality
Alamar Ranch, LLC v. County of Boise
Held: Court found privilege was waived
regarding e-mails sent via company e-mail
addresses using company computers.
Why: Attorney should have been aware
client’s employer would be monitoring and
accessing e-mail sent to that address since
it is now a common practice.
Cyber-Liability and Data Breach Risks
in Managing E-Discovery
Cloud computing raises legal ethics issues, particularly
around competence and confidentiality of information
as information stored in the cloud is outside the
lawyer’s control, and is often in numerous locations,
including different countries.
Lawyers must ensure steps are taken to safeguard
security and confidentiality of client information.

More Related Content

What's hot

Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
Ronald Coleman
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller
 
CTIN EDiscovery
CTIN EDiscoveryCTIN EDiscovery
CTIN EDiscovery
CTIN
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
BoyarMiller
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
BoyarMiller
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Ronak Karanpuria
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
CardinaleWay Mazda
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
Ed Sothcott
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Cases
annskowronski
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Cases
andresmedrano249
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
Kirby Drake
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNs
John Trigg
 
Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26
Michael Geske
 
Inter Partes Review - Learning From the Denied Petitions
Inter Partes Review - Learning From the Denied PetitionsInter Partes Review - Learning From the Denied Petitions
Inter Partes Review - Learning From the Denied Petitions
Klemchuk LLP
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Patent Law Review - IP Year in Review CLE v2
Patent Law Review - IP Year in Review CLE v2Patent Law Review - IP Year in Review CLE v2
Patent Law Review - IP Year in Review CLE v2
Bryan Beel
 
Ediscovery 101
Ediscovery 101Ediscovery 101
A Trial Lawyer's Approach to Ethical Problems in E-Discovery
A Trial Lawyer's Approach to Ethical Problems in E-DiscoveryA Trial Lawyer's Approach to Ethical Problems in E-Discovery
A Trial Lawyer's Approach to Ethical Problems in E-Discovery
Brendan Kenny
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 

What's hot (19)

Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
CTIN EDiscovery
CTIN EDiscoveryCTIN EDiscovery
CTIN EDiscovery
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Cases
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Cases
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNs
 
Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26
 
Inter Partes Review - Learning From the Denied Petitions
Inter Partes Review - Learning From the Denied PetitionsInter Partes Review - Learning From the Denied Petitions
Inter Partes Review - Learning From the Denied Petitions
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Patent Law Review - IP Year in Review CLE v2
Patent Law Review - IP Year in Review CLE v2Patent Law Review - IP Year in Review CLE v2
Patent Law Review - IP Year in Review CLE v2
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Ediscovery 101
 
A Trial Lawyer's Approach to Ethical Problems in E-Discovery
A Trial Lawyer's Approach to Ethical Problems in E-DiscoveryA Trial Lawyer's Approach to Ethical Problems in E-Discovery
A Trial Lawyer's Approach to Ethical Problems in E-Discovery
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 

Viewers also liked

The Concise Guide to E-Discovery
The Concise Guide to E-DiscoveryThe Concise Guide to E-Discovery
The Concise Guide to E-Discovery
Osterman Research, Inc.
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
jvanacour
 
Bringing eDiscovery In-House for Dummies
Bringing eDiscovery In-House for DummiesBringing eDiscovery In-House for Dummies
Bringing eDiscovery In-House for Dummies
EMC
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRM
Rob Robinson
 
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...
Brendan Kenny
 
Woodshedding in theTwenty-First Century
Woodshedding in theTwenty-First CenturyWoodshedding in theTwenty-First Century
Woodshedding in theTwenty-First Century
john Kelly
 
Administrative Adjudications by Civil Service Commissions in the State of Cal...
Administrative Adjudications by Civil Service Commissions in the State of Cal...Administrative Adjudications by Civil Service Commissions in the State of Cal...
Administrative Adjudications by Civil Service Commissions in the State of Cal...
Justin Hein
 
Social Lawyers by Nicole Hyland
Social Lawyers by Nicole HylandSocial Lawyers by Nicole Hyland
Social Lawyers by Nicole Hyland
Frankfurt Kurnit Klein + Selz PC
 
GWAVACon 2013: Why is third party archiving still neccessary?
GWAVACon 2013: Why is third party archiving still neccessary?GWAVACon 2013: Why is third party archiving still neccessary?
GWAVACon 2013: Why is third party archiving still neccessary?
GWAVA
 
Webinar: How Much Can You Save with Office 365?
Webinar: How Much Can You Save with Office 365?Webinar: How Much Can You Save with Office 365?
Webinar: How Much Can You Save with Office 365?
WithumSmith+Brown, formerly Portal Solutions
 
E Discovery and Archiving in Microsoft Office 365 - Presented by Atidan
E Discovery and Archiving in Microsoft Office 365 - Presented by AtidanE Discovery and Archiving in Microsoft Office 365 - Presented by Atidan
E Discovery and Archiving in Microsoft Office 365 - Presented by Atidan
David J Rosenthal
 
Office 365 ediscovery fr
Office 365 ediscovery frOffice 365 ediscovery fr
Office 365 ediscovery fr
Olivier Carpentier
 
SharePoint Online App Model Guidance
SharePoint Online App Model GuidanceSharePoint Online App Model Guidance
SharePoint Online App Model Guidance
Ryan Berg
 
Making Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantMaking Office 365 More Secure and Compliant
Making Office 365 More Secure and Compliant
Osterman Research, Inc.
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLaboraDK
 
Compliance and eDiscovery with Office 365
Compliance and eDiscovery with Office 365 Compliance and eDiscovery with Office 365
Compliance and eDiscovery with Office 365
Corey Roth
 
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
ESI Attorneys LLC
 
Identity and o365 on Azure
Identity and o365 on AzureIdentity and o365 on Azure
Identity and o365 on Azure
Mostafa
 
ROI of Office 365: Forrester Total Economic Impact Summary
ROI of Office 365: Forrester Total Economic Impact SummaryROI of Office 365: Forrester Total Economic Impact Summary
ROI of Office 365: Forrester Total Economic Impact Summary
Why Microsoft
 
Success with Office 365 Administration
Success with Office 365 AdministrationSuccess with Office 365 Administration
Success with Office 365 Administration
Michael Blumenthal (Microsoft MVP)
 

Viewers also liked (20)

The Concise Guide to E-Discovery
The Concise Guide to E-DiscoveryThe Concise Guide to E-Discovery
The Concise Guide to E-Discovery
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Bringing eDiscovery In-House for Dummies
Bringing eDiscovery In-House for DummiesBringing eDiscovery In-House for Dummies
Bringing eDiscovery In-House for Dummies
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRM
 
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...
E-Discovery in Products Liability Litigation: Preparing for New FRCP Amendmen...
 
Woodshedding in theTwenty-First Century
Woodshedding in theTwenty-First CenturyWoodshedding in theTwenty-First Century
Woodshedding in theTwenty-First Century
 
Administrative Adjudications by Civil Service Commissions in the State of Cal...
Administrative Adjudications by Civil Service Commissions in the State of Cal...Administrative Adjudications by Civil Service Commissions in the State of Cal...
Administrative Adjudications by Civil Service Commissions in the State of Cal...
 
Social Lawyers by Nicole Hyland
Social Lawyers by Nicole HylandSocial Lawyers by Nicole Hyland
Social Lawyers by Nicole Hyland
 
GWAVACon 2013: Why is third party archiving still neccessary?
GWAVACon 2013: Why is third party archiving still neccessary?GWAVACon 2013: Why is third party archiving still neccessary?
GWAVACon 2013: Why is third party archiving still neccessary?
 
Webinar: How Much Can You Save with Office 365?
Webinar: How Much Can You Save with Office 365?Webinar: How Much Can You Save with Office 365?
Webinar: How Much Can You Save with Office 365?
 
E Discovery and Archiving in Microsoft Office 365 - Presented by Atidan
E Discovery and Archiving in Microsoft Office 365 - Presented by AtidanE Discovery and Archiving in Microsoft Office 365 - Presented by Atidan
E Discovery and Archiving in Microsoft Office 365 - Presented by Atidan
 
Office 365 ediscovery fr
Office 365 ediscovery frOffice 365 ediscovery fr
Office 365 ediscovery fr
 
SharePoint Online App Model Guidance
SharePoint Online App Model GuidanceSharePoint Online App Model Guidance
SharePoint Online App Model Guidance
 
Making Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantMaking Office 365 More Secure and Compliant
Making Office 365 More Secure and Compliant
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
 
Compliance and eDiscovery with Office 365
Compliance and eDiscovery with Office 365 Compliance and eDiscovery with Office 365
Compliance and eDiscovery with Office 365
 
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
 
Identity and o365 on Azure
Identity and o365 on AzureIdentity and o365 on Azure
Identity and o365 on Azure
 
ROI of Office 365: Forrester Total Economic Impact Summary
ROI of Office 365: Forrester Total Economic Impact SummaryROI of Office 365: Forrester Total Economic Impact Summary
ROI of Office 365: Forrester Total Economic Impact Summary
 
Success with Office 365 Administration
Success with Office 365 AdministrationSuccess with Office 365 Administration
Success with Office 365 Administration
 

Similar to Mastering E-Discovery Presentation (partial)

PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
Kirby Drake
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
jcassd619
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
scubastog
 
Michael Legg
Michael LeggMichael Legg
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Financial Poise
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
lnarvid
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
Bill Daniels
 
Can I Get A Witness? Technical Witness Bootcamp
Can I Get A Witness?  Technical Witness BootcampCan I Get A Witness?  Technical Witness Bootcamp
Can I Get A Witness? Technical Witness Bootcamp
Priyanka Aash
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
CallPM
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
Financial Poise
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
SethRandle
 
Why is it important to master the document review process.pdf
Why is it important to master the document review process.pdfWhy is it important to master the document review process.pdf
Why is it important to master the document review process.pdf
Proteus Discovery Group
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
Lourdes Fuentes Slater
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
Logikcull.com
 
Oregon Adopts Metadata Opinion
Oregon Adopts Metadata OpinionOregon Adopts Metadata Opinion
Oregon Adopts Metadata Opinion
Oregon Law Practice Management
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
Dan Michaluk
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
rlhicksjr
 
Sulloway Annual Ethics Update 2021 CLE
Sulloway Annual Ethics Update 2021 CLESulloway Annual Ethics Update 2021 CLE
Sulloway Annual Ethics Update 2021 CLE
Kevin O'Shea
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.Doc
David Haines
 
E Discovery
E DiscoveryE Discovery
E Discovery
James Sutter
 

Similar to Mastering E-Discovery Presentation (partial) (20)

PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Can I Get A Witness? Technical Witness Bootcamp
Can I Get A Witness?  Technical Witness BootcampCan I Get A Witness?  Technical Witness Bootcamp
Can I Get A Witness? Technical Witness Bootcamp
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Why is it important to master the document review process.pdf
Why is it important to master the document review process.pdfWhy is it important to master the document review process.pdf
Why is it important to master the document review process.pdf
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
Oregon Adopts Metadata Opinion
Oregon Adopts Metadata OpinionOregon Adopts Metadata Opinion
Oregon Adopts Metadata Opinion
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
 
Sulloway Annual Ethics Update 2021 CLE
Sulloway Annual Ethics Update 2021 CLESulloway Annual Ethics Update 2021 CLE
Sulloway Annual Ethics Update 2021 CLE
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.Doc
 
E Discovery
E DiscoveryE Discovery
E Discovery
 

Recently uploaded

一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 

Recently uploaded (20)

一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 

Mastering E-Discovery Presentation (partial)

  • 1. Mastering Electronic Discovery Brendan M. Kenny Blackwell Burke Minneapolis, MN Eric P. Mandel Zelle Hofmann Minneapolis, MN
  • 2. Don’t Be an Unreliable Narrator
  • 3. The Unreliable Narrator and Law Within the field of literature, the unreliable narrator is a storyteller who violates our trust. Whatever the cause, the reader starts to notice things that suggest that the narrator is either lying or doesn’t understand what is really going on.
  • 4.
  • 6. Appeal to Ignorance & Spoliation https://bookofbadarguments.com/
  • 8. Section 5 Drafting & Responding to Requests for E-Discovery Under the Revised Rules
  • 9. Protecting Privileged Material During E-Discovery
  • 10. (3) Contents of the Order. * * * (B) Permitted Contents. The scheduling order may: (iii) provide for disclosure, or discovery, or preservation of electronically stored information; (iv) include any agreements the parties reach for asserting claims of privilege or of protection as trial-preparation material after information is produced, including agreements reached under Federal Rule of Evidence 502 Rule 16 Order
  • 11. Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense and proportional to the needs of the case, [considering the amount in controversy, the importance of the issues at stake in the action,] considering the importance of the issues at stake in the action, the amount in controversy, the parties relative access to relevant information, the parties’ resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit. Information within this scope of discovery need not be admissible in evidence to be discoverable. Scope of Discovery: Rule 26(b)
  • 12. Culling by Objective Criteria http://www.papergreat.com/2014/01/old-style-ruth-manning-sanders-library.html We want to use to cull out irrelevant documents using these filters: Domain Name User Date range Custodian Clustering
  • 13. What Is the Case About? Facts/admissions Statute of limitations Claims Defenses
  • 14. How Do My Client’s Systems Work? Retention Schedule Key Custodians Document Management
  • 15. Obligations of Counsel Under Rule 26(g)
  • 16. Metadata: How Important Is It? What?: Data about data. When?: Whenever lawyers send, produce or receive ESI containing metadata in response to a discovery request or subpoena. Why?: If the history, tracking, or management of an electronic document matters. How?: Review and produce the document in a form that maintains the metadata. THE SEDONA CONFERENCE® COMMENTARY ON ETHICS & METADATA What is to be done? Work with other side to determine how to deal with metadata during production.
  • 17. Requesting Production of Native Files Rule 34(b)(2)(E) Producing the Documents or Electronically Stored Information. Unless otherwise stipulated or ordered by the court, these procedures apply to producing documents or electronically stored information: (i) Aparty must produce documents as they are kept in the usual course of business or must organize and label them to correspond to the categories in the request; (ii) If a request does not specify a form for producing electronically stored information, a party must produce it in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms; and (iii) A party need not produce the same electronically stored information in more than one form.
  • 18. Case Law | Metadata & Cooperation Covad Commc’n Co. v. Revonet, Inc. Facts: Covad moved to compel Revonet to produce documents in native format, even though Covad never requested that they be produced in native form and Revonet already produced the documents in hard copy. Outcome: Motion denied Take Away: Parties should cooperate to figure out forms of production in Rule 26(f), include in the Discovery Plan, and then make it part of Rule 16 order.
  • 19. Objective Criteria Established During 26(f) (f) CONFERENCE OF THE PARTIES; PLANNING FOR DISCOVERY. (3) Discovery Plan. A discovery plan must state the parties’ views and proposals on: * * * (C) any issues about disclosure, or discovery, or preservation of electronically stored information, including the form or forms in which it should be produced; (D) any issues about claims of privilege or of protection as trial-preparation materials, including — if the parties agree on a procedure to assert these claims after production — whether to ask the court to include their agreement in an order under Federal Rule of Evidence 502;
  • 20. Stake out your position
  • 21. Section 6 Admitting ESI into Evidence for Trial
  • 22. Evidence Admissible Only IF Relevant: tends to make a fact “of consequence” more or less probable. Authentic: prima facie showing of trustworthiness that the document is what the party claims it to be. Non-Hearsay: not a third-party’s out-of-court statement offered for its truth. Hearsay Exception: hearsay statement, but falls under exception. Original or Duplicate Writing: original or duplicate required unless proven by acceptable secondary evidence.
  • 23. Applying FRE 901 and 902 to ESI Rule 901: Can you show that the ESI is what you say it is? Authorizes “[e]vidence describing a process or system used to produce a result and showing that the process or system produces an accurate result.” Rule 902: Is the ESI self-authenticating? Official Publications: Books, pamphlets, or other publications purporting to be issued by public authority. Trade Inscriptions: Information in the document generated in the course of business that shows ownership, control, or origin. Records of Regularly Conducted Activity. Document with declaration that showing that document was created and kept in the regular course of business.
  • 24. Hashtags & Metadata to Meet Rule 901 “A party that seeks to introduce its own electronic records may have just as much difficulty authenticating them as one that attempts to introduce the electronic records of an adversary.” -- Judge Grimm Hashtags: A unique numerical identifier that can be assigned to a file, a group of files, or a portion of a file. Metadata: Information describing the history, tracking, or management of an electronic document.
  • 25. Tips for Authenticating Social Media Evidence Don’t rely on print-outs. Use programs to capture and authenticate. Remember: social-media evidence = evidence. Don’t forget circumstantial evidence.
  • 26. Using Witnesses to Introduce ESI From the creator? From the receiver? From anyone else who could know?
  • 27. Evaluating Forensic Reports and Handling Daubert Challenges
  • 28. Framework for Evaluating Report How was evidence collected? Provides sufficient details to replicate findings? Establishes tools used? Establishes assumptions made?
  • 29. Case Law | ESI Forensic Report Nucor Corp v. Bell Background: Nucor’s forensic report stated that data was wiped from former employee Bell’s laptop. Problem: Nucor moved for a default judgment or an adverse inference jury instruction, based partly on expert’s theory that specialized software wiped data from laptop hard drive. Outcome: Motion denied Nucor expert’s methodology insufficient to show that defendants intentionally wiped data, especially because he arrived at his final theories only after the defendants’expert discredited his others.
  • 30. Applying Daubert Testing: Can and has the scientific procedure been independently tested? Peer Review: Has the scientific procedure been published and subject to peer review? Error rate: Is there a known error rate, or potential to know the error rate, associated with the use of this scientific procedure? Standards: Are there standards and protocols for the execution of the methodology? Acceptance: Is the scientific procedure generally accepted by the relevant scientific community?
  • 31. ESI and the Rules of Hearsay Non-Hearsay #1: Some ESI isn’t hearsay because no person created the document and no assertion is made in it. Non-Hearsay #2: Not offered to prove assertions. Don’t Forget Business Records Exception!
  • 32. Applying the Original Writing / Best Evidence Rule ESI offered as evidence an original or a duplicate? Admissible secondary evidence (e.g., testimony)? Rely on summaries? Party admissions? Object or you waive!
  • 34.
  • 35. ABA Model Rule 1.1 Competence “A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.”
  • 36. Case Law | Competence Brown v. Tellermate Holdings Ltd. Background: Fired salespeople bring sex- discrimination action against Tellermate. Problem: Defense counsel did not understand how to find and produce information on client’s salesforce.com account and made false statements to opposing counsel and the court. Outcome:
  • 37. NY Rule Prof. Conduct 4.2(a) Communication w/ Party “[A] lawyer shall not communicate about the subject of a representation with a party” who the lawyer “knows to be represented by another lawyer in the matter” unless the lawyer has the consent of the other lawyer or the contact is “authorized to do so by law.”
  • 38. The Model Rule 3.3(a) Candor A lawyer shall not knowingly: (1) Make a false statement of fact or law; or (2) Offer evidence lawyer knows to be false.
  • 39. The Model Rule 3.4(a) Fairness “A lawyer shall not unlawfully obstruct another party’s access to evidence or unlawfully alter, destroy or conceal a document or other material having potential evidentiary value. A lawyer shall not counsel or assist another person to do any such act….”
  • 40. Ethics Hypothetical Axis employee loses control of concrete truck, hits Bester’s car, and kills Bester’s wife. Employee pleads to manslaughter. Bester hires McGuire and sues Axis under wrongful death and loss-of-consortium theories. Axis counsel receives Facebook message from Bester and found on profile; served discovery. McGuire’s office tells Bester to “clean up” Facebook; no Facebook photos produced; Axis moves to compel.
  • 41. Claims: Loss of Consortium What’s relevant? In a wrongful death action in Virginia, a spouse may recover for sorrow, mental anguish, and solace, which can include society, companionship, comfort, guidance, “kindly offices” and advice of the decedent.
  • 42. Facebook Ethics Background: At the time, Facebook allowed you to briefly access the private Facebook of anyone who responds to your message. AXIS COUNSEL OUT-OF-BOUNDS? Some what-ifs: Bester contacted Axis’s counsel first? Bester told Axis’s to stay away from his Facebook page? Bester invited Axis’s counsel to be Facebook friends? Axis’s counsel knew that the photo was private?
  • 43. Discovery Ethics: Relevance & Scope Flickr/a4gpa The Big Picture: Is the photo relevant under any circumstances? Some What-ifs: Picture taken before his wife died? Picture taken a year after wife died? Picture taken at wedding reception where grooms men were given shirts and expected to behave badly.
  • 44. Preservation Ethics Can Bester’s attorney tell him to delete something from his Facebook profile without violating ethics? Some What-ifs: McGuire tells Bester to “clean-up” his Facebook profile because he doesn’t want to see photos as trial exhibits? McGuire has paralegal contact Bester and asks him to “clean-up” Facebook profile.
  • 45. Discovery Ethics: Preparing & Responding Some what-ifs: Axis sends out discovery requesting: “screen print copies on the day this request is signed of all pages from Isaiah Lester’s Facebook page including, but not limited to, all pictures, his profile, his message board, status updates, and all messages sent or received.” OR… Axis sends out more narrowly tailored discovery request. OR… Bester responds to discovery with “I do not have a Facebook page on the date this is signed.” OR… Bester objects to discovery because no showing that evidence is relevant.
  • 46. Motion to Compel What Should Court Do?
  • 47. Investigating Panelists and Voir Dire Juror did not hold his card up. Juror did not hold his card up.
  • 48. Juror’s Social Media “No, we are not champions of civil/human rights. In fact, our Courts are willing to usurp and strip each and every one of those rights in order to protect false entities, these big businesses.” “Our people are in bondage. The shackles of wage slavery and money are placed silently on our minds from birth.”
  • 49. Monitoring Jury’s Use of Social Media
  • 50. Protecting Client Confidentiality in Digital Communications Model Rule 1.6 | Confidentiality: A lawyer shall make reasonable efforts to prevent the inadvertent disclosure of, or unauthorized access to, information relating to the representation of a client.
  • 51. The FRE 502 Order Shall Set You Free
  • 52. Case Law | Confidentiality Alamar Ranch, LLC v. County of Boise Held: Court found privilege was waived regarding e-mails sent via company e-mail addresses using company computers. Why: Attorney should have been aware client’s employer would be monitoring and accessing e-mail sent to that address since it is now a common practice.
  • 53. Cyber-Liability and Data Breach Risks in Managing E-Discovery Cloud computing raises legal ethics issues, particularly around competence and confidentiality of information as information stored in the cloud is outside the lawyer’s control, and is often in numerous locations, including different countries. Lawyers must ensure steps are taken to safeguard security and confidentiality of client information.