Electronic Discovery

eDiscovery Trends: Sedona Conference Provides Guidance for Judges

 

Last month, The Sedona Conference® made a public comments version of the Cooperation Proclamation: Resources for the Judiciary available on the Sedona Conference website. The Sedona Conference Cooperation Proclamation has set a non-trivial goal- to teach the profession to collaborate during the discovery process instead of the traditional gladiatorial style of litigation. The Resources for the Judiciary document aims to provide judges with a foundation for creating a collaborative and non-adversarial approach to managing eDiscovery.

The Cooperation Proclamation was published in 2008 and is a short document that argues that if lawyers work together during the discovery phase, the merits of the underlying dispute are more likely to get a fair hearing. Specifically, it calls on lawyers to "work more collaboratively during the discovery phase so that greater time and attention (and money) can be spent on litigating the merits of the underlying dispute." 

The Resources for the Judiciary distinguishes between “active case management” and “discovery management.” The former can be characterized as a proactive and the latter as a reactive judicial approach to managing discovery. While offering guidance for both approaches, the proclamation urges judges to take an active case management model approach. That is not to say that judges should make decisions for parties, but to provide “a clear set of expectations designed to move the evidence-gathering phase of the litigation forward in a speedy and inexpensive way, without the cost, delay, and gamesmanship associated with unmanaged discovery.”

The Resources for the Judiciary is a detailed and practical document, providing a practical “toolkit” to train and support judges in techniques of discovery cooperation, collaboration, and transparency. It is organized by common stages of discovery disputes from a judge’s perspective. Eighteen issue areas are listed, beginning with preservation and continuing through topics like choosing search methodology and ending with everyone’s least favorite issue, sanctions. Each topic area lists the Federal Rule that applies to any given topic, an explanation of the issue, and practical guidance for achieving successful resolution of disputes. Each section includes detailed guidance in the form of current case law and examples of orders from the bench.  

The Resources make the following recommendations:

  • Judges should adopt a “hands-on” approach to case management early in each action;
  • Judges should establish deadlines and keep parties to those guidelines (or make reasonable adjustments) with periodic status reports or conferences;
  • Judges should encourage the parties to meet before discovery commences to develop a realistic discovery plan;
  • Judges should encourage proportionality in preservation demands and expectations and in discovery requests and responses;
  • Judges should exercise their discretion to limit or condition disproportionate discovery and shift disproportionate costs;
  • If necessary, judges should exercise their authority to issue sanctions under the relevant statutes, rules, or the exercise of inherent authority on counsel or parties who create unnecessary costs or delay, or who otherwise frustrate the goals of discovery by “gaming the system”.

The Sedona Conference has acknowledged that cooperation is contrary to the adversarial instincts lawyers have been taught, and that it will require a generational shift for the nature of litigation to change. But there is perhaps no better way to encourage lawyers to cooperate than to create and active and informed judiciary on eDiscovery issues.

To submit a public comment, you can download a public comment form here, complete it and fax (yes, fax) it to The Sedona Conference® at 928-284-4240.  You can also email a general comment to them at tsc@sedona.net.

So, what do you think?  Can guidance like this help prevent intractable discovery disputes? Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Case Law: Court Rules Against Exclusion of Privileged Email

“Clawback” of inadvertently produced privileged documents is a hot topic these days, with J-M Manufacturing’s recent clawback request in their case one of the latest examples.  For more information on mechanisms for “clawback”, check out our blog posts of the last two days.

A District of Columbia court has ruled against exclusion of a privileged email that was inadvertently produced by the defendant, ruling that the defendant’s actions before and after the discovery of the email’s production pursuant to Federal Rule of Civil Procedure 26(b)(5)(B) were not sufficient to ensure protections under Federal Rule of Exclusion (FRE) 502(b)(3), in a case involving alleged violations of the District of Columbia Whistleblower Act.

In Williams v. District of Columbia, No. 06-02076 (CKK), 2011 WL 3659308 (D.D.C. Aug. 17, 2011), the court ruled that the burden of preventing disclosure was on the defendant, and that its insufficient follow up showed “indifference,” and has thus denied the defendant’s Motion to Exclude the inadvertently produced email from evidence.

  • As part of a “recommendation to terminate packet” produced by the defendant, the District of Columbia, in the course of this case, a privileged email was inadvertently included. This email is described as being included in the first ten pages of the packet.
  • Defendant’s counsel sent an email to plaintiff’s counsel five months later, requesting the return of the email and its exclusion under Rule 26(b)(5)(B). There was neither any form of response from the plaintiff nor follow up from the defendant. Only when the email was introduced as an exhibit, more than two years later, did the defendant file its Motion to Exclude.
  • The court considered whether the defendant had met the conditions of Rule 26(b)(5)(B) that a party must “discharge its obligations under Rule 502(b)(3),” and concluded that the defense was negligent in not taking enough steps promptly to remedy the mistake. The defendant’s inability to accurately portray its document review methodology or the number and type of documents produced were also cited as reasons that the defense was itself responsible for the waiver of privilege associated with the email in question.
  • The court found that the defense’s single email request, with no follow up, was inadequate to protect its interest in the privilege of the inadvertently produced email, especially when considered in light of “the approximately two years and eight months before it filed a motion seeking the court’s intervention.”
  • Accordingly, the court ruled against exclusion of the email under FRE 502(b)(3), stating that, “the only ‘injustice’ in this matter is that done by the defendant to itself…. The District’s failure to make reasonable efforts to guard against the disclosure in the first place and to rectify its error once discovered is fatal to its reliance on Rule 502(b).”

So, what do you think? Was the court fair in assigning fault to the defense, or should the benefit of protection under FRE 502(b)(3) have been accorded the District of Columbia in this case? Have you been involved in a similar case or situation? Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Law: Federal Rule of Evidence 502 Protects Against Accidental Waiver of Privilege

 

As noted yesterday, attorneys have reason to be worried about accidental waiver of privilege in today’s cases, where discovery of electronic documents reaches unprecedented volumes. With more electronically stored information (ESI) comes an increased risk of accidentally producing privileged information. Fortunately, there are provisions that can prevent some of the damage of such accidents.

Yesterday, we discussed “clawback” provisions and “quick peek” agreements. Both of these types of agreements can be used to protect against accidental waiver of privilege through production of the wrong documents for discovery. But, sometimes parties are unable to complete such agreements.  In other cases, these protections have been defeated by lawyers in court.  That's where Federal Rule of Evidence (FRE) 502 steps in to ensure that privilege is safeguarded when parties inadvertently produce privileged materials, assuming they take reasonable steps to avoid such inadvertent production.

FRE 502 was enacted in 2008, and it provides that:

  • "Subject matter waiver", the idea that production of a single privileged document waives privilege on all related documents on the same subject matter, does not exist. If and when waiver occurs, it is limited to the documents and information that were actually produced.
  • There is no waiver if the producing party takes reasonable steps to withhold privileged material or requests that materials accidentally produced be returned or destroyed.  Of course, what constitutes “reasonable steps” is open to interpretation.
  • If parties have agreed that inadvertent production will result in no waiver, such an agreement is binding only on the parties involved unless it is part of a court order. The effect of the agreement is broader if the agreement is included in a court order.
  • Any conflict between state and federal rules is determined by choosing the rule that provides the greatest protection of privilege.
  • FRE 502 applies even if a case is conducted under state law.

FRE 502 is relatively new and is still being interpreted by courts, but one thing is clear: the greatest protection afforded by FRE 502 is present when parties have entered into a “clawback” agreement and requested that it be made part of a court order. However, there remains no definitive ruling on what constitutes inadvertent production of privileged information or what constitutes “reasonable steps” to avoid such inadvertent production.

So, what do you think? Does FRE 502 provide important protections, or does it overstep in protecting parties and attorneys who are negligent? What do you think is necessary for a party to claim that production was inadvertent? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Law: Inadvertent Production is Inevitable, So How Do You Protect Yourself?

 

With exploding volumes of electronically stored information (ESI) being required in discovery proceedings, there is more chance than ever of inadvertently producing materials that should have been protected by privilege. No case exemplifies that better than the current eDiscovery malpractice case involving McDermott, Will & Emery discussed in this blog here, here and here where McDermott’s former client, J-M Manufacturing, has contended that 3,900 privileged documents were erroneously produced.  It is virtually impossible these days to keep every item from production that is protected by attorney-client or work product privilege.

Fortunately, there are protections against a claim of privilege waiver through inadvertent production.  The two most common historical protections are “quick peek” agreements and “clawback” provisions.

“Quick Peek” Agreement

“Quick peek” agreements are available, but not very common, because they present challenges for both parties in a lawsuit.

Instead of reviewing documents, everything is presented for a "quick peek." The requesting party is obligated to sort through all of the evidence and select the documents they wish to have presented for discovery. The producing party then has the opportunity to review those documents for privilege. The onus of review and labor for reviewing the entire collection is on the requesting party, but the producing party must be willing to accept the risk that opposing counsel will use any privileged information viewed against them, even if that information hasn’t been produced.

“Clawback” Provision

The more common protection is known as a “clawback” provision or “clawback” agreement. A part of the protective order made by the court early in a case, a “clawback” provision is an agreement between both parties that any discovery documents that are accidentally produced when they should have been protected by privilege are to be destroyed or returned upon request.

This kind of early agreement is usually simple and straightforward. It protects parties from disagreement over specific documents and prohibits the requesting party from making a claim of waiver.  Of course, parties don’t always agree to enter in such an agreement and sometimes courts have to decide.

One More Protection: Federal Rule of Evidence 502

In addition, the Federal Rule of Evidence (FRE) 502 was created in 2008 to provide additional protection. Before this rule was brought in, it has been argued, and sometimes upheld, that despite agreement between the parties as to no waiver through inadvertent production, that agreement did not extend to other parties in other proceedings. Waiving privilege on a single document has often constituted a waiver for all other documents on the same subject (called “subject matter waiver”).  FRE 502 provides extra protection in these cases.

But, more on that tomorrow!

So, what do you think? Have you ever been in a situation where you had to rely on one or more of these protections to deal with inadvertent production in a case? How did that work out for you and/or your client? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Trends: Is Email Still the Most Common Form of Requested ESI?

 

Email has historically been the most common form of requested electronically stored information (ESI), but that has changed, according to a survey performed by Symantec and reported in Law Technology News.

According to the article, Symantec’s survey, conducted this past June and July, included lawyers and technologists at 2,000 enterprises worldwide.  However, the article doesn’t indicate the total number of respondents or whether that’s the number of organizations receiving the survey or the number actually responding.

Regarding how frequently (percentage of situations requested) various types of ESI are requested during legal and regulatory processes, the survey yielded some surprising answers:

  • Files and Documents: 67 percent
  • Application and Database Records: 61 percent
  • Email: 58 percent
  • Microsoft SharePoint records: 51 percent
  • Messaging Formats (e.g., instant messaging, texts, and BlackBerry PIN messages): 44 percent
  • Social Media Data: 41 percent

Email requested in legal and regulatory processes just over half the time?  That’s more than surprising, that’s shocking!

Symantec’s survey also asked about implementation of a formal data retention policy, with 30 percent of responding companies indicating that they have discussed but have not implemented a policy and 14 percent indicating that they have no plans to implement a policy (44 percent total that have not implemented a policy).  Reasons for not doing so were as follows (respondents were allowed to pick multiple reasons):

  • No Need Identified: 41 percent
  • Cost: 38 percent
  • No Designated Employee (to implement the policy): 27 percent
  • Too Time Consuming: 26 percent
  • Lack of Expertise: 21 percent

Many of these companies may not feel compelled to implement a policy because they are not frequently in litigation nor are they in regulated industries.

So, what do you think?  Do the percentages above reflect your experience as to how frequently the different types of ESI are requested?  Does the email percentage seem significantly low?  In my experience, it does.  Please share any comments you might have or if you’d like to know more about a particular topic.

Our First Birthday! eDiscovery Daily is One Year Old Today!

 

Break out the birthday cake and the noisemakers!  eDiscovery Daily is now a year old!  One year ago today, we launched this blog with the ambitious goal of providing eDiscovery news and analysis every business day.  And, we haven’t missed a day yet!  Knock on wood!

Since we last reported, during our “sixmonthiversary”, we’ve almost doubled viewership (again!) since those first six months, and have increased our subscriber base over 2 1/2 times over that span!  Clearly, there is no shortage of topics to write about regarding eDiscovery and we appreciate your continued interest and support!

We also want to thank the blogs and publications that have linked to our posts and raised our public awareness, including Pinhawk, Litigation Support Blog.com, The Electronic Discovery Reading Room, Litigation Support Technology & News, eDiscovery News, InfoGovernance Engagement Area, Ride the Lightning, ABA Journal, ABC's of E-Discovery, Above the Law, EDD: Issues, Law, and Solutions, Law.com and any other publication that has picked up at least one of our posts for reference (sorry if I missed any!).

Finally, a quick “thanks” to all who contributed to the blog in the past year, including Jane Gennarelli, Jason Krause and Brad Jenkins (my boss, got to thank him, right?), as well as Melissa Rudy for assisting with several of the posts.

For those of you who have not been following eDiscovery Daily all year (which is most of you), here are some topics and posts you may have missed.  Feel free to check them out!

Case Law:

eDiscovery Daily has published 50 posts related to eDiscovery case decisions and activities over the past year!  Victor Stanley v. Creative Pipe, commonly referred to as the “Victor Stanley” case was followed throughout the year, including our very first post, as well as here, here and here.  More recently, the eDiscovery malpractice case involving McDermott, Will & Emery has captured considerable interest, with recent posts here, here and yesterday’s post here.

Also among the case law posts is Crispin v. Christian Audigier Inc., which seems to reflect growing interest in discoverability of social media data, as this post was the most viewed post of the year on our blog!

Project Management:

Project management in eDiscovery is a popular topic and Jane Gennarelli provided a couple of series of posts to address best practices in this very important area.  The eDiscovery Project Management series was published over the October, November and December months of 2010, while the Managing an eDiscovery Contract Review Team series ran over January, February and into March.

Thought Leaders:

eDiscovery Daily was able to sit down with numerous industry thought leaders, including George Socha, Craig Ball, Tom O’Connor, Tom Gelbmann, Jack Halprin, Deidre Paknad, Jeffrey Brandt, Alon Israely, Jim McGann and Christine Musil to get their “takes” on the state of the industry and where it’s headed.  Thanks to all of those individuals who agreed to speak with us this past year!  We will continue to bring you more perspectives throughout the industry in the coming year.

Search Best Practices:

There were several posts on search best practices, including don’t get “wild” with wildcards, these posts on how to look for misspellings, a case study for using term lists, these posts on handling exception files and this post on the benefits of proximity searching.  We also talked about the “STARR” approach for defensible searching and published this three part series on best practices for sampling and revising searches.

Cloud Computing:

As cloud computing has become a major organizational driving force (overall and as part of eDiscovery), we have addressed several topics related to it, including the importance to be able to load your own data, benefits of software-as-a-service (SaaS) solutions for eDiscovery, the truth about security of SaaS and cloud-based systems, the Forrester and Gartner forecasts for tremendous growth in cloud computing, and even Craig Ball’s thoughts on the benefits of cloud computing for eDiscovery.

And many more posts over the past year on various other topics that are too numerous to mention…

Finally, it’s important to mention that we have yet to archive any old posts, so every post we have ever published is still currently available on this site! (I can see the Information Governance buffs cringing at that statement!)  I believe that we are in the process of building an impressive knowledge base of information spanning all sorts of eDiscovery topics as well as the entire EDRM life cycle.  If there’s an eDiscovery topic you wish to research, chances are that it’s been discussed here at some point.  So, feel free to make eDiscovery Daily one of your first stops for your eDiscovery information needs!

So, what do you think? Do you have any topics that you would like to see covered in more depth? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Case Update: J-M Manufacturing Tries to Clawback Privileged Documents at Issue in McDermott Malpractice Case

 

One of the most talked about cases from an eDiscovery perspective this year is the case against McDermott Will & Emery for alleged malpractice in the disclosure of privileged documents.  McDermott’s former client, J-M Manufacturing, has contended that 3,900 privileged documents were erroneously produced as part of 250,000 J-M electronic records that were reviewed under McDermott’s supervision.  In late July, J-M filed an amended complaint to its case, naming Navigant Consulting, Stratify and Hudson Legal as third party vendors hired by McDermott to run documents through a filter to identify potential attorney-client privilege documents and perform review of those documents.

Now, J-M has filed a motion seeking clawback of 3,400 privileged documents it contends that McDermott wrongfully produced, claiming the US government and, then, their opponents in the case, received the documents erroneously from McDermott.

The malpractice case was filed in California Superior Court, but was successfully moved to federal court by McDermott.  Recently, Hobson Dungog Bernardino + Davis, representing J-M in this case, filed a motion to remand the case to state court.

J-M says the first production of privileged documents in the case, in response to federal subpoenas, occurred in 2007 and 2008.  Stratify was hired by McDermott to search 1.3 million electronic files to identify potentially responsive and privileged files.  J-M claims it took “various precautions to identify and segregate documents that were subject to attorney-client privilege.", but that McDermott turned over files to the government that were not properly screened for privilege. J-M retrieved those documents through an informal July 2007 “clawback” agreement with the government. Both parties agreed to “return, sequester or destroy any inadvertently produced privileged materials.”

According to the filing, J-M then turned over a second production to the government assuming that its McDermott and its vendor, Stratify, had properly conducted the privilege review as previously instructed.  However, on May 20, 2010 (two months after McDermott had been dismissed), attorneys for one of the relators (John Hendrix at Day Pitney), notified J-M that they held potentially privileged documents, J-M requested the return or destruction of the 3,400 privileged documents in June 2010, but was rebuffed by Day Pitney attorneys, who rejected the request saying J-M had waived privilege by not taking “reasonable steps to prevent disclosure” as specified in Federal Rule of Evidence 502 and Federal Rule of Civil Procedure 26.  J-M has contended that the production of privileged documents was inadvertent and not a waiver.

On February 18, 2011, almost a year after McDermott had been dismissed, J-M entered into a joint clawback agreement with all relators.  Ironically, in a June 3, 2011 email to Day Pitney attorneys, Sheppard Mullin noted an additional production in 2011 by them of 500 allegedly privileged documents as Stratify (still being used as the vendor in this case) “mistakenly released approximately 9,650 ESI files without first presenting them for attorney review”.  As these documents may fall under the February 2011 clawback agreement, the plaintiffs have expressed willingness to destroy these documents.

As Sheppard Mullin has been disqualified in federal court due to conflict of interest, J-M has hired yet a third mega-firm in the False Claims case, Paul Hastings.  The False Claims Act case is still awaiting trial, so it may be difficult for J-M at this point to show how the disclosure of privileged documents has caused it damages.

So, what do you think? Should J-M Manufacturing be able to clawback its privileged documents?  Is it too early to assess malpractice against McDermott? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Law: Texas Rule 196.4 Protects Parties from "Undue Burden or Cost"

 

A recent article published in Texas Lawyer and reprinted on Law.com raises the question of extensive and costly eDiscovery requests and how to handle them. The authors of Keep E-Discovery Costs from Torpedoing Litigation Budgets present a hypothetical scenario where the opposing counsel has requested production of 10 years of legacy electronic data – a prospect that could cost more in recovery expenses than the value of the entire lawsuit. What is the best approach for counsel to take under the circumstances and what kind of legal recourse is there if producing extensive amounts of electronic information doesn't make sense?

Meet Texas Rule 196.4

The answer – in the state of Texas, at least – is found in Texas Rule of Civil Procedure 196.4. Like Federal Rule of Civil Procedure 26(b)(2), Rule 196.4 states that parties must comply with "reasonable" production requests, but are not forced to produce electronic information for discovery if it cannot be retrieved "through reasonable efforts."  So, when it comes to unduly burdensome discovery requests, don’t mess with Texas!

Rule 196.4 also includes a provision that makes it possible to shift the cost of extensive discovery production to the requesting party. However, an attorney's ability to make a case for challenging a production request or shifting the cost of such production depends on thorough knowledge of the client's information systems. It's paramount to know the details of the client's data storage, backup systems, old and new equipment in order to make an objection on grounds of either Texas or Federal law.

Rule 196.4 Still Being Clarified

Courts are still ruling on how and when this rule applies, so it remains a useful recourse but not a foolproof procedure for issues surrounding extensive (and expensive) production. Therefore, courts have used Federal Rule 26(b)(2) and federal case law to help apply an understanding of what’s reasonably accessible.  In In Re Weekley Homes, LP (2009), the Texas Supreme Court addressed when a trial court may order production of information that is not reasonably available, but instructed trial courts to consider "the reasonable availability of information on a case-by-case basis" which leaves the implementation of these rules open-ended for the moment.

The Texas Lawyer article references other important cases, including the landmark Zubulake v. UBS Warburg LLC (2003) opinion (Zubulake I) which famously adopted a classification system of five categories of media on which electronic data is commonly stored, from most accessible to least, as follows:

  1. Active, online data, such as hard drives;
  2. Near-line data, such as an older robotic storage devices like optical disks;
  3. Offline storage/archives, such as removable media that can be labeled and stored on a shelf like CDs and floppy disks;
  4. Backup tapes, which are sequential access devices not intended for recovery of individual files; and
  5. Erased, fragmented or damaged data.

Understanding these five categories of media and their accessibility is a must for anyone to be prepared to respond to discovery requests, especially like the one posed hypothetically at the beginning of the article.

So, what do you think? Have you ever been hit with a production request with a scope that would have raised eDiscovery costs beyond the value of the suit itself? If so, what did you do? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Trends: Changes in Store for The Sedona Conference

 

One of the most influential organizations in eDiscovery is The Sedona Conference® (TSC), a Arizona-based non-profit, non-partisan law and policy think tank that has made numerous contributions to the industry since it was founded in 1997.  Some of the most recent contributions have been documented in this blog, including a commentary on proportionality released last year and database principles released earlier this year.

A couple of weeks ago, TSC announced that its Board of Directors “has adopted a new collaborative management structure designed to align the organization’s administration with its historical mission of dialogue and consensus building” and said that founder and former executive director Richard Braman is now its full-time chairman.  There will now be four Director-level positions, as follows:

  • Business Operations: Dustin McKissen is the new director of business operations, and previously was deputy CEO of the National Association for Information Destruction,
  • Conferences and Content: Howard Bergman joins as director of conferences and content, but will continue serving as counsel in residence at the University of Minnesota Law School,
  • Judicial Outreach: John Rabieg, previously appointed as executive director on Jan. 31, will move to become director of judicial outreach,
  • Judicial Education: Kenneth Withers, a member of Sedona since 2006 as director of judicial education and content, will narrow his focus to just the education component.

These four Director-level positions will now manage the affairs of TSC in a collaborative manner, reporting to an Executive Committee of the Board of Directors.  They will be formally announced at a Sept. 24 dinner in Washington, D.C.

As noted on their press release of August 29: “’The Sedona Conference’s success, right from the very start, has been based on creating intellectually stimulating and thought-provoking dialogue and content through collaboration by judges, lawyers, experts and academics,’ said Craig Weinlein, a member of The Sedona Conference® Board of Directors and a partner at Carrington Coleman Sloman & Blumenthal in Dallas. ‘Because of our growth in staff, activities, and influence, now are the right time to bring that dialogue-based, consensus building process to our business operations, in order to best maintain the quality of The Sedona Conference’s unique and highly successful efforts.’”

TSC now has nine Working Groups and presents ten to twelve conferences each year, focusing on “tipping point” issues in the areas of complex litigation, antitrust and intellectual property rights.  It will be interesting to see what impact the new management structure will have on the activities of the group.

So, what do you think?  Do you think this is a good move for TSC?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Trends: To Get the Latest Trends, Go Virtual

 

Many of you have likely attended at least one LegalTech trade show at some point.  LegalTech New York (LTNY) happens every year in the late January/early February time frame and there is also a LegalTech West Coast (LTWC) show later in the year (this year it was in mid-May).  LTNY and LTWC usually have several good sessions, as well as the latest product and service offerings from exhibitors.  But, what if you can’t make it to one of these shows?

For those who can’t travel, but still wish to stay up to date on the latest trends, American Lawyer Media (ALM) has begun offering Virtual LegalTech (VLT) sessions quarterly.  This is the second full year that these sessions have been available and the sessions for this quarter are being held tomorrow (many of which are CLE eligible, at least in certain jurisdictions).  These online sessions are free to attend – you simply have to provide information to obtain a login ID and password.

VLT is set up just like an actual trade show.  There’s a “campus” with two exhibit halls, a CLE Center auditorium, a lounge and a resource room.  Copies of slides for presentations are usually available a short time after the presentation is conducted in the resource room.  You can even check out vendor “booths” in the virtual exhibit halls!

For tomorrow’s “show”, there are several sessions related to eDiscovery concepts, including:

9:00 am – 10:00 am ET:

Recover Costs, Improve Profits & Reduce Risk: Cost Recovery for eDiscovery Content

Description: Law firms, like all businesses, are constantly looking for ways to reduce costs and improve profits. Traditional cost recovery focuses on tracking, managing and assigning costs associated with activities such as scanning, faxing, printing, and e-mailing. To make documents eDiscoverable at point of capture, documents should be tagged with metadata such as filename, matter, client and billing code information; easing the burden on staff and lawyers, so more time can be spent strategizing the case and less time at the device handling administrative tasks. This session will explore various practices for integrating eDiscovery into traditional cost recovery tactics. Industry experts will also discuss tips and tricks to help profits soar while also reducing risk of data loss.

Speakers are: Chris Wyszkowski Nuance Communications; Thomas Goldman, JD Author of Technology in the Law Office, Second Edition

11:00 am – 12:00 pm ET:

Attack of the Clouds: Virtual Privacy & Online Security

Description: Look at cloud computing through the lens of eDiscovery and its easy to become confused as to whether the cloud is a great equalizer; allowing firms of all sizes to spend less time and money on the mechanics of eDiscovery, or the refuge of the naïve for whom its only a matter of time until their miracle solution falls flat. The cloud offers great cost savings and convenience to law practitioners, but there are very real concerns about cloud privacy and security.

Our expert panel will share a unique legal and technical perspective on privacy and security in the cloud, looking at case law regarding the liability of cloud providers and how it impacts the health of the cloud industry. This informative discussion will span legal and cybersecurity issues with the cloud, giving you a clear view of the risks and rewards involved with this exciting new technology.

Speakers are: Caitlyn Murphy, Esq. – Senior Product Manager, AccessData Group; Joshua Gilliland – Attorney and Author of the Bow Tie Law Blog; Jeffrey Dye – CISSP, Network Defense and Digital Forensics, General Dynamics

12:00 pm – 1:00 pm ET:

Unbundling Litigation: Selecting and Using E-Discovery Counsel

Description: There was a time when corporations expected litigation counsel to handle all aspects of litigation, including discovery.  However, as e-discovery becomes more complex and mistakes are increasingly common, there is a trend toward unbundling litigation and selecting a separate e-discovery counsel.  E-discovery counsel is often a separate law firm that specializes in e-discovery issues and can do the work better, faster and cheaper than general litigation lawyers.  This panel will discuss the pros and cons of using e-discovery counsel in complex litigation.  We will also discuss best practices for selecting and integrating e-discovery counsel into the litigation process.

Speakers are: Chris Dale – Moderator and Author of the eDisclosure Information Project (UK); Darryl Shetterly – Partner, LeClair Ryan, LLC; William Belt – Partner and Team Leader, Discovery Solutions Practice, LeClair Ryan LLC; Heather Bryden – Assistant General Counsel. e-Discovery Manager, Capitol One Bank

2:00 pm – 3:00 pm ET:

Information Security – A Systematic Approach to Protecting Your Organization’s Data During the eDiscovery Process

Description: Information security is a high priority concern for both corporations and law firms in the eDiscovery process. The challenge is translating this concern into practice. Failing to take special care to ensure security can expose your company or client’s most critical information and breaches the ethical standards of  client-lawyer confidentiality. A centrally managed, systematic approach based upon a formal management system is the best way to ensure the highest level of information security.

In this session, we will offer an overview of approaches that will allow lawyers to ethically meet their  professional obligations related to information security best practices, standards and processes, such as:

  • Why a process driven approach to information security is needed?
  • Who should be responsible for information security in the eDiscovery process?
  • What are the hallmarks of good information security?
  • How to evaluate information security practices in your eDiscovery partner or vendor?

Speakers are: Doug Stewart – EnCE, Director of Technology, Daegis; Andy Teichholz, Esq. – Senior eDiscovery Consultant, Daegis; Mark Michels – Former eDiscovery and Litigation Counsel, Cisco; Aaron Crews – eDiscovery Counsel, Littler Mendelson

3:00 pm – 4:00 pm ET:

Judge's Panel: Leveraging Technology to Reduce the Challenges of Discovery

Description: What are the most important facts that will allow you to leverage the technology created to assist attorneys with litigation and discovery? This group of distinguished judges will spotlight decisive concerns, Federal Rules of Civil Procedure reform and what can be done to alleviate the responsibility and obligation that is essential to compliant discovery practice. The most technologically advanced methods to effectively approach the planning and managing of litigation preparation to meet key requirements will be discussed. This session is a “must attend” for those interested is lessening the burden of discovery.

Speakers are: Hon. Frank Maas – Magistrate Judge, Southern District of New York; Hon. Patty Shwartz – Magistrate Judge, District of Newark, NJ and Adjunct Professor of Law, Fordham University Law School; Hon. Ron Hedges – Former Magistrate Judge

4:00 pm – 5:00 pm ET:

Cross-Border Discovery and Investigations – Developing a Strategic Response Plan

Description: Companies operating in the global economy face increasing scrutiny from regulators in the US and Europe, with enhanced risk of related cross-border litigation and discovery. Join Howard Sklar, Senior Counsel of Recommind and Denise Backhouse, Associate, eData Practice, Morgan Lewis, as they address the data management issues in developing a strategic, cost-effective plan for responding to international discovery and investigations:

  • Data protection issues in European/US investigations and discovery:  the legal framework and recent developments
  • Preparing for investigations and discovery: creating a response plan; establishing a team; effective communication and privilege protection
  • Best practices for handling data in international matters

Speakers are: Denise E. Backhouse – Associate, eData Practice Morgan Lewis; Howard Sklar – Senior Counsel Recommind, Inc.

To “attend” any of these sessions or learn more about Virtual Legal Tech, go to Virtual Legal Tech Show.

So, what do you think?  Do you attend virtual seminars?  Please share any comments you might have or if you’d like to know more about a particular topic.