eDiscoveryDaily

Social Tech eDiscovery: Use of Smarsh for Social Media Archiving

 

The online world thrives on social media, but for attorneys who must preserve sensitive social media data for discovery, the widespread growth of social technology presents a laundry list of problems.

Not only is it challenging to trace the communications shared on popular sites like Facebook, LinkedIn and Twitter when privacy settings can be turned on and off at whim, it’s also difficult to know whether the information available at any given time is complete, as content can be edited by users at any time or lost due to technical malfunctions.

In some cases, like this example, courts have ruled that even locked or private content on Facebook and other social networking sites is not protected from being requested as part of discovery. In other cases, such as this one, they have ruled differently.  You don’t know for sure how courts will rule, so you have to be prepared to preserve all types of social media content, even possibly content that is changed frequently by users, such as Facebook profiles and blog posts.  And, even though Facebook has introduced a self-collection mechanism, it may not capture all of the changes you need.  And, other social media sites have not yet provided a similar mechanism.  If items are changed or lost after the duty to preserve goes into effect, your organization can be sanctioned with steep fines even receive an adverse inference judgment based on the information you are unable to produce.

Fortunately, there are viable solutions that enable you to create a backup of all social networking activity and archive such information in the event it has to be produced in discovery. Portland-based Smarsh has archiving and compliance tools, including social media archiving and compliance that automate the archiving of social media accounts, preserving all necessary data in case you need it later for discovery.

Some of the benefits of Smarsh’s social media archiving tools include:

  • A complete, logged, and quantifiable record of all social media posts and administrator activity
  • The ability to define which social media features your employees have access to and to track all business communications
  • Compliance with SEC and FINRA regulations (including Regulatory Notice 10-06)
  • The tools to identify and minimize risk, saving your business time, effort, and money

Smarsh has been designed to satisfy all regulatory compliance objectives, transforming the data management hazards of social media into a system that automatically updates and archives itself – an attorney’s dream when litigation strikes. This application creates a simple and proactive approach to archival of social media data, enforcing preservation to ensure that the duty to preserve is met.

So, what do you think?  Do you use Smarsh or any other social media archival tool?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Case Law: Completing Production AFTER Trial is Too Late

In DL v. District of Columbia, No. 05-1437 (RCL) (D.D.C. May 9, 2011), repeated, flagrant, and unrepentant failures of the District of Columbia to comply with discovery orders, failure to supplement discovery responses, and eventual production of thousands of e-mails—some more than two years old—after the date of trial resulted in a sanction of waiver of privilege over documents sought by plaintiffs.

Plaintiffs filed an action seeking injunctive and declaratory relief for the failure of the District of Columbia Government to provide them with a free appropriate public education as required under the Individuals with Disabilities and Education Act. On the first day of trial six years later, counsel for the District acknowledged that the District several days earlier had begun a rolling production of thousands of emails per day that was expected to continue through the end of trial. Counsel for the District stated that the court had not been informed of production problems because it had been hoped review of the documents for relevance and privilege and thus production of the documents could have been completed earlier. From the bench, the court ordered the District to produce all of the email without objection and with privilege waived within one week of the end of the trial so that plaintiffs could seek to supplement the trial record if necessary. The District sought reconsideration of the order.

Likening the District’s posture to an airplane with landing gear that deploys only after touchdown, the court denied the District’s motion. Waiver of privilege was an appropriate sanction because it was just and was proportional between offense and sanction, considering the District’s violation of multiple discovery orders and failure to meet its obligation to supplement its discovery responses. The court concluded that its sanction was justified considering prejudice to plaintiffs, prejudice to the judicial system, and the need to deter similar misconduct in the future. Since the District chose not to bring the situation to the court’s attention until the day of trial, the court “had no practical alternative short of entering a default.”

The court held that whether the District had acted in good faith and whether plaintiffs also had committed discovery violations was irrelevant:

Whether the District made a good-faith effort to produce all responsive e-mails before the trial is irrelevant. As explained above, it was not sanctioned for failing to make a good-faith effort. It was sanctioned for openly, continuously, and repeatedly violating multiple Court orders, failing to adhere to or even acknowledge the existence of the Federal Rules’ discovery framework, and committing a discovery abuse so extreme as to be literally unheard of in this Court. The Rules require more than simply making a good-faith effort to produce documents. They require adherence to a very precise framework for navigating the discovery process. Moreover, the duty to adhere to clear Court orders is among a lawyer’s most basic. Were it not for those two directives—the Federal Rules’ discovery framework and Court orders regarding discovery — discovery would devolve into pure bedlam. Disciplined adherence to those Rules and Orders on the part of courts as well as parties is the only tool our system has to wrangle the whirlwind as it were and tame an otherwise unmanageable part of the litigation process. A good-faith effort to produce documents in the absence of adherence to Court orders and the Federal Rules is useless.

So, what do you think?  Have you ever had opposing counsel try to produce documents at the beginning of trial – or even after?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: Email Footers Give Privilege Searches the Boot

 

This communication (including any attachments) is intended for the use of the intended recipient(s) only and may contain information that is confidential, privileged or legally protected.  Any unauthorized use or dissemination of this communication is strictly prohibited.  If you have received this communication in error, please immediately notify the sender by return e-mail message and delete all copies of the original communication. Thank you for your cooperation.

This is an example of a standard email disclaimer often automated to appear in the footer of outgoing emails to disclaim liability.  Many organizations choose to add disclaimers to their emails for legal protection to attempt to protect themselves from legal threats such as breach of confidentiality or accidental breach of privilege.

However, when it comes time to collect and search email collections for confidentiality and privilege, these email footers can wreak havoc with those searches.  Searches for the words “confidential” or “privileged” will essentially be rendered useless as they will literally retrieve every email with the email disclaimer footer in it.

So, what to do?

One way to address the issue is to identify any other variations of words and phrases that might imply privilege.  Searching for phrases like “attorney client” or “attorney work product” – provided those phrases are not in the footer – may identify many of the privileged files.

Another way is to shift your search focus to names of individuals likely to conduct privileged communications, such as the names of the attorneys communicating with the organization.  Sometimes you may not know the names of all of the attorneys, so a search for domains associated with the outside counsel firms should identify the names of the individuals sending from or receiving to those domains.

If searching for the term "privileged" is still the best way to ensure that you find all of the potentially privileged files, one of our readers, Mark Lyon, actually identified a better way to search for the term “privileged” that I sheepishly admit I did not think of late last night when I wrote this, so I had to amend this post to include it (a first!).   Identifying the various footers at use within at least the main companies included in the collection, then excluding those entire footers from the index will remove those footers from filling up your search results.  Another reader, Joe Howie, has discussed in more detail an approach for removing those footers from the index.  Thanks to both Mark and Joe for keeping me on my toes!  🙂

So, what do you think?  Are email disclaimer footers making your privileged searches more complicated?  Please share any comments you might have or if you’d like to know more about a particular topic.

Working Successfully with eDiscovery and Litigation Support Service Providers: Keeping a Preferred Vendor Program Up to Date

 

In the last several posts in this series, we talked about evaluating and selecting vendors for a preferred vendor program.  Once that’s done, you still have a bit of work to do before rolling out your program.  You need to establish a mechanism for on-going evaluation of the vendors on your list.  This is an important component of the program – you need to monitor the work of the vendors on your list to ensure that they continue to meet your requirements and live up to your expectations.  Here’s the first step in developing this part of the program:

1. Determine evaluation criteria for each service.  The first step in developing a preferred vendor program was to create a list of the services that you’d like vendors to provide.  Go back to that list, and for each service, identify evaluation criteria that you can apply to every project moving forward.  There are some general criteria points that will probably apply to all services.  Some examples are: 

  • Were our deadlines met?
  • Were costs what we expected?
  • Were quality expectations met?
  • Was the vendor easy to work with?
  • Was the vendor responsive?
  • If applicable, did we receive timely status reports with useful information?
  • Were invoices timely and accurate?

For each service, there are likely to be specific questions.  Some examples are: 

  • For electronic discovery processing services: were load files formatted correctly?
  • For coding services: were coding rules applied consistently?
  • For electronic discovery processing services:  were changes in priorities in processing implemented smoothly?
  • For OCR services:  was OCR quality sufficient?
  • For use of online review tools:  was searching easy?  Did the tool offer all the search features we needed? 

Your goal is to compile a list – for each service – of easy-to-answer questions that will let you know if the vendor performed well on a project

Next week, we’ll go over the remaining steps in establishing a mechanism for keeping your preferred vendor program up to date.

Do you evaluate vendor performance after each project?  How do you do it?  Please share any comments you might have and let us know if you’d like to know more about an eDiscovery topic.

eDiscovery Case Law: Sue Me and Lose? Pay My Costs.

In a ruling that may give some plaintiffs’ lawyers pause, a federal judge in Pittsburgh has ruled that the winning defendants in an antitrust case are entitled to reimbursement of more than $367,000 in eDiscovery costs.

In Race Tires Amer., Inc. v. Hoosier Racing Tire, Corp., No. 2:07-cv-1294, 2011 WL 1748620 (W.D. Pa. May 6, 2011), U.S. District Judge Terrence F. McVerry issued a 25 page opinion, finding that courts are increasingly approving awards of eDiscovery costs, noting that one judge described them as “the 21st century equivalent of making copies.”

In the suit, Race Tires America claimed that its competitor, Hoosier Racing Tire Corp., violated Sections 1 and 2 of the Sherman Act by entering into exclusive dealing contracts with motorsport sanctioning body Dirt Motor Sports Inc. that included a “single tire rule.”  Under the single tire rule, Dirt Motor Sports required that drivers and racers participating in its races use a specific brand of tire for a series of races or for the entire racing season, which Race Tires America argued shut it out of the market.

But Judge McVerry dismissed the suit on summary judgment, holding that such exclusive contracts are permissible in instances when a sports-related organization has freely decided that it wants exclusivity and has good-faith, pro-competitive or business justifications for doing so.  The decision was appealed to the 3rd Circuit, where the defendants won again and, after winning the appeal, the defendants filed their bills of costs in the district court.

The plaintiff argued that the costs should be disallowed because “electronic document collection, hard drive imaging and indexing and searching, commonly referred to as ‘eDiscovery charges,’ are not enumerated under Section 1920(4), and thus are not properly deemed recoverable costs.”  But Judge McVerry found that Congress, in the Judicial Administration and Technical Amendments Act of 2008, modified the wording of Section 1920(4), changing the phrase “fees for exemplifications and copies of papers” to read “fees for exemplification and the costs of making copies of any materials.”  Since that amendment, Judge McVerry said, “no court has categorically excluded eDiscovery costs from allowable costs.”  For example, in an Idaho case, Judge McVerry noted, the court awarded $4.6 million for the costs incurred for “the creation of a litigation database.”

Given the extent of the defendant’s eDiscovery activities, including copying nearly 500 gigabytes of data in response to over 400 search terms and creation of a litigation database, the court awarded $367,000 of the $389,000 eDiscovery costs requested by the defendants.

So, what do you think?  Should plaintiffs have to reimburse eDiscovery costs to defendants if they lose?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Trends: The Only Prescription is More Cloud

 

A famous “philosopher” once said, “I got a fever, and the only prescription is more cowbell”.  Sorry, I couldn’t resist…that line always makes me laugh.  😉

It seems that many corporations and law firms “got a fever” and “the only prescription is more cloud”.

As we noted earlier this week, Forrester has forecast that the global Software-as-a-Service (SaaS) “cloud” computing market will grow from 40.7 billion dollars in 2011 to more than 241 billion dollars by 2020 – a six-fold increase.  In addition, the Gartner Group has projected that the cloud computing industry will have revenue of 148.8 billion dollars by 2014 – an even faster growth rate than Forrester’s forecast of 118.7 billion dollars for the same year.

So, there are the predictions.  The question is why?

One reason is the continued trend toward decentralization and globalization of organizations today.  In my recent interview with Jeffrey Brandt, Editor of the Pinhawk Law Technology Daily Digest, he noted that a 250 lawyer firm in Ohio was the 83rd largest law firm in the country several years ago, but now that same sized firm might not make it into the AMLAW 250.  Firms are growing and, as technology shrinks the world for many organizations, the barriers to expansion (even globally) are minimized.  Cloud computing technology is one of the ways in which technology shrinks the world today and enables decentralized organizations share applications and data.

And then, there is the economy.

In the past few years, many corporations and law firms have reduced their IT staffs – in some cases, significantly. Also, while the use of technology has continued to increase “by leaps and bounds”, expenditures for training or upgrading skill sets has lagged behind. Cloud computing technology solves this issue because the burden of keeping up with technology advances is shifted from the organization to the service provider.  As a result, many organizations are finding that “the only prescription for their fever” is “more cloud”.

In the coming days, we will discuss other cloud benefits as well as issues to consider and address before making the move to the cloud.

So, what do you think?  Is your organization storing more data in the cloud?  Does your organization have an effective plan in place for getting to the data when litigation strikes?  Please share any comments you might have or if you’d like to know more about a particular topic.

As we are off on Monday for the Memorial Day holiday, eDiscoveryDaily would like to thank all veterans and the men and women serving in our armed forces and the sacrifices you make for our country.  Thanks to all of you and your families and have a happy and safe Memorial Day!

Working Successfully with eDiscovery and Litigation Support Service Providers: Establishing a Preferred Vendor Program, Part 2

 

Yesterday, we covered the first couple of steps in establishing a law firm preferred vendor program.  Here are the next steps in the process:

3. Review the vendors with which the firm has worked in the past year.  Make a list of the vendors with which the firm has recent experience.  For each, answer these questions:

  • What services were provided?
  • How much work did the vendor do for the firm?
  • Were deadlines met?
  • Did the vendor provide high-quality work?
  • Were costs reasonable and within expectations?
  • Was the vendor easy to work with?
  • Are there thresholds that if exceeded, the vendor might not be a good candidate (for example, high volume or quick turnaround projects)?

The vendors that pass muster in this initial review can be the starting point of your preferred vendor list.

4. Classify vendors by service.  So far, you’ve created two lists:  a list of the services you need provided, and a list of the vendors that have done good work for the firm.  Combine those lists.  Under each service, list the vendors that provide that service.  Make qualifying notes regarding thresholds, if applicable.

5. Evaluate additional vendors.  Fill in the holes on your list, if that’s necessary.  For each service, you should have multiple vendors.  If you need to add to your list, do some research and vendor evaluations.  Even if your lists are complete, it’s always a good idea to find out if there are other vendors you should be considering.  Talk to peers in the industry and do a little research to make sure you are not overlooking good candidates.

6. Finalize the list and negotiate “relationships”.  When your list is filled in, make sure you’ve met with each vendor and that you’ve clearly laid out the firm’s expectations and come to agreement on how you’ll work with the vendor.  This may involve negotiating standard pricing, standard deliverables, project start-up procedures, and communication protocols.

Next week we’ll focus on establishing the next component of a preferred vendor program:  establishing mechanisms for doing on-going evaluations of the vendors on your list.

Have you developed a preferred vendor program for your firm?  How did you do it?  Please share any comments you might have and let us know if you’d like to know more about an eDiscovery topic.

Working Successfully with eDiscovery and Litigation Support Service Providers: Establishing a Preferred Vendor Program

 

Last week, we talked about the components of a preferred vendor program.  Establishing a program is a “project”, and should be approached with a solid plan of action.  First, identify who will put the program together.  The team should be made up of experienced litigation support professionals and it should incorporate input from litigation team members.  Once the team is in place, you need a step-by-step approach for moving forward.

In the next few posts in this blog series, I’ll suggest an approach.  Here are the first couple of steps:

1. Create a list of the services to be provided by vendors.  You may need vendors to provide a variety of services – services that the firm’s litigation support department does not provide, and services for projects that exceed the capacity of the firm’s litigation support department offerings.  Your list may look something like this:

  • ESI collection
  • ESI processing
  • Tiffing
  • Photocopying and scanning
  • Coding / auto-coding
  • Hosting and providing online review platforms
  • Language translation
  • Document review staffing and management
  • Court reporting / deposition transcription
  • Trial support services 

2. Get input from litigation team members on preferences and priorities.  Survey attorneys and paralegals in the firm to determine what is most important to them.  For each service on the list, ask questions about pricing expectations, overall schedule requirements, and expectations on deliverables.  Ask them if they’ve worked with vendors that should be considered.  This is an important step.  First, it ensures that your evaluation process will take into account what’s most important to the users.  Second, litigation department members are more likely to embrace a program that they participated in developing.

We’ll continue with the next steps tomorrow.

Have you developed a preferred vendor program for your firm?  How did you do it?  Please share any comments you might have and let us know if you’d like to know more about an eDiscovery topic.

eDiscovery Case Law: Defendant Can’t Be Plaintiff’s Friend on Facebook

In Piccolo v. Paterson, Bucks County, Pa., Common Pleas Court Judge Albert J. Cepparulo denied the motion from the defendant requesting access to the photos of plaintiff Sara Piccolo posted in her Facebook account.

Piccolo filed an action against the defendants after being injured in a one-car accident while a passenger in a car driven by defendant Lindsay Paterson. According to the defense motion, filed by attorneys at Moore & Riemenschneider, Piccolo testified she had a Facebook account and was asked at deposition if the defense counsel could send a “neutral friend request” to Piccolo so that he could review the Facebook postings Piccolo testified she made every day.  Piccolo’s attorney, Benjamin G. Lipman , ultimately denied the request, responding that the “‘materiality and importance of the evidence … is outweighed by the annoyance, embarrassment, oppression and burden to which it exposes'” the plaintiff.

The defense argued that access to Piccolo’s Facebook page would provide necessary and relevant information related to the claims by Piccolo and cited a case, McMillen v. Hummingbird Speedway, Inc. (previously summarized by eDiscoveryDaily here), in which the court ordered the plaintiff to provide his username and password to the defendant’s attorney. The plaintiff’s attorney argued that the defense had only asked for the pictures Piccolo posted on Facebook and that they had already been provided with “as complete a photographic record of the pre-accident and post-accident condition” of Piccolo.

As a result of the accident in May 2007, Piccolo suffered lacerations to her lip and chin when hit in the face with an airbag. She had 95 stitches to her face and then surgery to repair her scarring six months later. With permanent scars on her face, Piccolo allowed the insurer in 2008 to take photographs of her face and gave the defense 20 photos of her face from the week following the accident and five photos from the months just before the accident.

In Piccolo’s response to the defense motion, Lipman argued that defense counsel had only asked at Piccolo’s deposition about the pictures she posted on Facebook, not any textual postings. He said that the defendant had already been provided “as complete a photographic record of the pre-accident and post-accident condition” of Piccolo as she “could reasonably have a right to expect in this case.”

Judge Cepparulo agreed, ruling with the plaintiff and denying the defense access to Piccolo’s Facebook page in a one-paragraph motion.

So, what do you think?  Did the judge make the correct call or should he have issued a ruling consistent with McMillen?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Trends: Forecast for More Clouds

 

No, eDiscoveryDaily has not begun providing weather forecasts on our site.  Or stock forecasts.

But, imagine if you could invest in an industry that could nearly sextuple in nine years? (i.e., multiply six-fold).

Well, the cloud computing, or Software-as-a-Service (SaaS), industry may be just the industry for you.  According to a Forrester report from last month, the global cloud computing market will grow from 40.7 billion dollars in 2011 to more than 241 billion dollars by 2020.  That’s a 200 billion dollar increase in nine years.  That’s enough to put anybody “on cloud nine”!

The report titled Sizing The Cloud by Stefan Ried (Principal Analyst, Forrester) and Holger Kisker (Sr. Analyst, Forrester), outlines the different market dynamics for three core layers of cloud computing, as follows:

  • Public Cloud: From 25.5 billion dollars to 159.3 billion dollars by 2020;
  • Virtual Private Cloud: From 7.5 billion dollars to 66.4 billion dollars by 2020;
  • Private Cloud: From 7.8 billion dollars to 159.3 billion dollars by 2020.

Public cloud providers include everything from Facebook and Twitter to Amazon.com and Salesforce.com.  As the name implies, a private cloud is where companies implement their own cloud environment to support its own needs.  A virtual private cloud is simply a private cloud located within a public cloud.

Forrester is not the only analyst firm that expects big things for cloud computing.  The Gartner Group projected that the cloud computing industry will have revenue of 148.8 billion dollars by 2014, even higher than Forrester’s forecast of 118.7 billion dollars for the same year.  Clearly, the benefits of the cloud are causing many organizations to consider it as a viable option for storing and managing critical data.

What does that mean from an eDiscovery perspective?  That means a forecast for more clouds.  If your organization doesn’t have a plan in place for managing, identifying, preserving and collecting data from its cloud solutions, things could get stormy!

So, what do you think?  Is your organization storing more data in the cloud?  Does your organization have an effective plan in place for getting to the data when litigation strikes?  Please share any comments you might have or if you’d like to know more about a particular topic.