eDiscoveryDaily

Managing an eDiscovery Contract Review Team: Introduction

 

In a perfect world, attorneys responsible for a case would review an entire document collection for responsive materials.  On large cases with huge collections, that’s just not practical or possible.  In those situations, your only choice may be to pull together a team of contract reviewers to identify responsive materials.  

How well does this work?  A review done by a contract review team will certainly cost less than one done by a team of law firm attorneys.  More likely than not, it will be done more efficiently.  And if there’s good preparation and management, the quality will be just as good (in fact, it may be better because a contract staff is more likely to stay better focused on the inevitable, more mundane aspects of the work).

I’ve managed many successful review projects done by teams of contract employees.  Sometimes those teams were made up of attorneys, but more often they included mostly paralegals and college-educated lay personnel with good reading and comprehension skills.  These projects were successful because they were structured and managed in a way where decision-making responsibility was in the hands of the attorneys, but there were effective mechanisms in place for disseminating those decisions to the team.  In this blog series, I’m going to walk through how to do this.  Specifically, we’ll be covering:

  • Clearly defining the objectives of the document review
  • Getting a handle on the document collection
  • Determining the right mix of people for the project
  • Creating effective document review criteria
  • Effectively training the review team
  • Managing the project
  • Disseminating updated project information
  • Implementing effective quality control procedures

What has been your experience with contract review teams for large projects?  Do you have good or bad experiences you can tell us about?  Are there any specific problems you’ve had with review teams?  Please share any comments you might have and let us know if you’d like to know more about an eDiscovery topic.

eDiscovery Trends: 2011 Predictions — By The Numbers

 

Comedian Nick Bakay”>Nick Bakay always ends his Tale of the Tape skits where he compares everything from Married vs. Single to Divas vs. Hot Dogs with the phrase “It's all so simple when you break things down scientifically.”

The late December/early January time frame is always when various people in eDiscovery make their annual predictions as to what trends to expect in the coming year.  We’ll have some of our own in the next few days (hey, the longer we wait, the more likely we are to be right!).  However, before stating those predictions, I thought we would take a look at other predictions and see if we can spot some common trends among those, “googling” for 2011 eDiscovery predictions, and organized the predictions into common themes.  I found serious predictions here, here, here, here and here.  Oh, also here and here.

A couple of quick comments: 1) I had NO IDEA how many times that predictions are re-posted by other sites, so it took some work to isolate each unique set of predictions.  I even found two sets of predictions from ZL Technologies, one with twelve predictions and another with seven, so I had to pick one set and I chose the one with seven (sorry, eWEEK!). If I have failed to accurately attribute the original source for a set of predictions, please feel free to comment.  2) This is probably not an exhaustive list of predictions (I have other duties in my “day job”, so I couldn’t search forever), so I apologize if I’ve left anybody’s published predictions out.  Again, feel free to comment if you’re aware of other predictions.

Here are some of the common themes:

  • Cloud and SaaS Computing: Six out of seven “prognosticators” indicated that adoption of Software as a Service (SaaS) “cloud” solutions will continue to increase, which will become increasingly relevant in eDiscovery.  No surprise here, given last year’s IDC forecast for SaaS growth and many articles addressing the subject, including a few posts right here on this blog.
  • Collaboration/Integration: Six out of seven “augurs” also had predictions related to various themes associated with collaboration (more collaboration tools, greater legal/IT coordination, etc.) and integration (greater focus by software vendors on data exchange with other systems, etc.).  Two people specifically noted an expectation of greater eDiscovery integration within organization governance, risk management and compliance (GRC) processes.
  • In-House Discovery: Five “pundits” forecasted eDiscovery functions and software will continue to be brought in-house, especially on the “left-side of the EDRM model” (Information Management).
  • Diverse Data Sources: Three “soothsayers” presaged that sources of data will continue to be more diverse, which shouldn’t be a surprise to anyone, given the popularity of gadgets and the rise of social media.
  • Social Media: Speaking of social media, three “prophets” (yes, I’ve been consulting my thesaurus!) expect social media to continue to be a big area to be addressed for eDiscovery.
  • End to End Discovery: Three “psychics” also predicted that there will continue to be more single-source end-to-end eDiscovery offerings in the marketplace.

The “others receiving votes” category (two predicting each of these) included maturing and acceptance of automated review (including predictive coding), early case assessment moving toward the Information Management stage, consolidation within the eDiscovery industry, more focus on proportionality, maturing of global eDiscovery and predictive/disruptive pricing.

Predictive/disruptive pricing (via Kriss Wilson of Superior Document Services and Charles Skamser of eDiscovery Solutions Group respective blogs) is a particularly intriguing prediction to me because data volumes are continuing to grow at an astronomical rate, so greater volumes lead to greater costs.  Creativity will be key in how companies deal with the larger volumes effectively, and pressures will become greater for providers (even, dare I say, review attorneys) to price their services more creatively.

Another interesting prediction (via ZL Technologies) is that “Discovery of Databases and other Structured Data will Increase”, which is something I’ve expected to see for some time.  I hope this is finally the year for that.

Finally, I said that I found serious predictions and analyzed them; however, there are a couple of not-so-serious sets of predictions here and here.  My favorite prediction is from The Posse List, as follows: “LegalTech…renames itself “EDiscoveryTech” after Law.com survey reveals that of the 422 vendors present, 419 do e-discovery, and the other 3 are Hyundai HotWheels, Speedway Racers and Convert-A-Van who thought they were at the Javits Auto Show.”

So, what do you think?  Care to offer your own “hunches” from your crystal ball?  Please share any comments you might have or if you’d like to know more about a particular topic.

State eDiscovery Rules: Wisconsin Adopts Amendments to Rules for eDiscovery

 

On November 1 of last year, we noted on this blog that Oklahoma had become the latest state to adopt amendments to their Rules of Civil Procedure, leaving only 14 states (including DC) to not have enacted any rules changes that address discovery of ESI as of January 1st of this year.

That’s because on January 1, Wisconsin became the latest state to adopt eDiscovery amendments to their Rules of Civil Procedure.  The amendments affect the following Wisconsin Statutes:

  • §§ 802.10(3)(jm) – Scheduling Order: The scheduling order may address the need for discovery of ESI, which focuses early attention on eDiscovery issues.
  • §§ 804.01(4m) – Discovery Conference: The parties must confer regarding discovery of ESI unless excused by the court (required meet and confer).  The required issues to be discussed include the scope of electronic discovery, the preservation of ESI, the format of production, and the costs of proposed discovery (including the extent to which such costs shall be limited).
  • §§ 804.08(3) – Business Records: Parties have the option to produce or allow access to business records in response to an interrogatory.
  • §§ 804.09(1) and (2) – Format of Production: Requesting party may specify “form” of production of ESI and, if no form is requested, information must be produced in the form in which it is ordinarily maintained or in a “reasonably usable form”.
  • §§ 804.12(4m) – Safe Harbor: Contains a safe harbor provision to protect a party who destroys information in good faith according to a routine records retention policy.
  • §§ 805.07(2) – Subpoena: Protect parties from the unreasonable burden of responding to subpoenas asking for ESI by enabling the producing party to produce information in the form in which it is ordinarily maintained or in a “reasonably usable form” and also by permitting testing or sampling of the information instead of inspection of copying.

The required meet and confer provision – §§ 804.01(4m) – was adopted, despite the opinion of the Judicial Council Evidence and Civil Procedure Committee that Wisconsin did not need a mandatory meet and confer rule.  The strong dissent expressed the concern that the requirement “has the potential to diminish both fairness and efficiency along with the potential of increasing the time and expense of litigation” and noted that, unlike the federal courts, Wisconsin state courts “do not have many cases involving a large number of documents and electronic discovery disputes” and that such a rule would “impose ‘significant added burden on litigants while yielding little benefit.'”  It concluded with a call to “judges, lawyers, and litigants from around the state to monitor this new mandate, and if it is not working, [to] petition the court for change.”

So, what do you think?  Wondering where your state stands?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Case Law: Crispin v. Christian Audigier Inc.

Yesterday, we took a look at “Major Tours, Inc. v. Colorel”, which addresses whether a party may obtain a Protective Order relieving it of the duty to access backup tapes, even when that party’s failure to issue a litigation hold resulted in the data only being available on those backup tapes.

Discoverability of social media content has been a big topic this year, with several cases addressing the issue, including this one, previously discussed on eDiscovery Daily.  The holiday week look back at cases concludes with Crispin v. Christian Audigier Inc., 2010 U.S. Dist. Lexis 52832 (C.D. Calif. May 26, 2010), which addresses whether ‘private’ data on social networks is discoverable.

This copyright infringement claim brought by artist Buckley Crispin against defendant and designer Christian Audigier, alleges that Audigier used artwork outside the scope of the original oral license between the parties and also sub-licensed the artwork to other companies and individuals (named as co-defendants) without Crispin’s consent.  The defendants served subpoenas on social media providers Facebook, MySpace, and Media Temple, directing them to turn over all communications between Crispin and Audigier, as well as any communications referencing the co-defendants.

Crispin sought to quash the subpoenas, arguing that they sought private electronic communications protected under the Stored Communications Act of 1986 (SCA), prohibiting Electronic Communication Services (ECS) and Remote Computing Services (RCS) providers from turning over those communications, but the motion was denied because Magistrate Judge John E. McDermott determined that Facebook, MySpace, and Media Temple did not qualify for protection from disclosure under the SCA.  Crispin moved for reconsideration with the U.S. District Court for the Central District of California.

District Court Judge Margaret Morrow’s decision partially reversed and partially vacated Judge McDermott’s order, finding that the SCA’s protections (and associated discovery preclusions) include at least some of the content hosted on social networking sites, including the private messaging features of social networking sites protected as private email.  She also concluded that because Facebook, MySpace, and Media Temple all provide private messaging or email services as well as electronic storage, they all qualify as both ECS and RCS providers, with appropriate SCA protections.

However, regarding Facebook wall postings and MySpace comments, Judge Morrow determined that there was insufficient evidence to determine whether these wall postings and comments constitute private communications as the user’s privacy settings for them were less clear and ordered a new evidentiary hearing regarding the portions of the subpoenas that sought those communications.

This opinion sets a precedent that, in future cases, courts may allow protection to social networking and web hosting providers from discovery based on SCA protections as ECS and RCS providers and may consider social media ESI protected, based on the provider’s privacy controls and the individual user’s privacy settings.

So, what do you think?  Is this the most significant eDiscovery case of 2010?  Please share any comments you might have or if you’d like to know more about a particular topic.

Happy New Year from all of us at Trial Solutions and eDiscovery Daily!

eDiscovery Case Law: Major Tours v. Colorel

Yesterday, we took a look at “Rajala v. McGuire Woods”, Judge David Waxse’s opinion regarding the applicability of Federal Rule of Evidence 502(d) and (e) in McGuire Woods’ request for a clawback provision for privileged documents.

The holiday week look back at cases continues with Major Tours, Inc. v. Colorel, 2010 WL 2557250 (D.N.J. June 22, 2010), which addresses whether a party may obtain a Protective Order relieving it of the duty to access backup tapes, even when that party’s failure to issue a litigation hold resulted in the data only being available on those backup tapes.

Major Tours appealed a 2009 Magistrate Judge’s order concluding that certain backup tapes were not reasonably accessible under Rule 26(b)(2)(B) and that the plaintiffs had not shown good cause to require their production under the seven factor test set forth in the Advisory Committee Notes to Rule 26(b)(2)(B). The Magistrate Judge made this determination despite finding that the defendant, Michael Colorel, had not instituted adequate litigation hold notices until several years after the duty to preserve had attached.

Upon appeal to U.S. District Court Judge Jerome Simandle, Major Tours claimed that the Magistrate Judge had not given “appropriate weight to the defendants’ culpability for the emails being inaccessible, given that the reason for the increased cost of recovery was the defendants’ failure to institute a timely and effective litigation hold.” and also argued that a party cannot rely on Rule 26(b)(2)(B) if that party’s negligence caused the inaccessibility of the requested data in the first place.

Judge Simandle first addressed “whether, as a matter of law, a protective order under Rule 26(b)(2)(B) can ever be granted to a party when the evidence is inaccessible because of that party’s failure to institute a litigation hold” and concluded that “no such bright line rule exists.”, finding that Colorel’s culpability in failing to preserve the information did not override application of the multi-factor good cause test under Rule 26(b)(2)(B). Judge Simandle cited the decision in Disability Rights Council of Greater Washington v. Washington Metropolitan Transit, 242 F.R.D. 139 (D.D.C. 2007), in which Magistrate Judge John M. Facciola considered the same issue and “concluded that the proper approach was to balance the defendants’ culpability as one factor in the seven factor analysis.”  Judge Simandle noted that “The Rules compel exactly this discretionary balancing of costs and benefits of discovery, not a bright line requirement of production, no matter how burdensome, how likely to succeed, or how necessary to the litigation, if a party fails to adequately preserve every byte of previously accessible data.”

As to whether the magistrate judge adequately considered defendants’ culpability, Judge Simandle found that he did and affirmed his order, noting that considering the volume of evidence produced by Colorel, the backup tapes were “likely to produce evidence of only marginal, cumulative benefit and at great expense” and that “this outweighed the slim likelihood of the discovery of non-cumulative evidence even if there was some unknown degree of negligent spoliation.”

So, what do you think?  Is this the most significant eDiscovery case of 2010?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Case Law: Rajala v. McGuire Woods

Yesterday, we took a look at “Pension Committee”, Judge Shira Scheindlin’s significant opinion regarding the duty for plaintiffs (as well as defendants) to preserve ESI and sanctions for failing to live up to that duty.

The holiday week look back at cases continues with Rajala v. McGuire Woods LLP, (D. Kan. July 22, 2010), which addresses the applicability of Federal Rule of Evidence 502(d) and (e) in McGuire Woods’ request for a clawback provision for privileged documents.

As part of negotiations over an appropriate protective order covering the treatment of confidential information, defendant McGuire Woods drafted a proposed order that included a clawback provision. Plaintiff opposed inclusion of a clawback provision in the agreement, arguing that the protective order should not deal with privilege issues and that “[t]he parties are free to enter stipulations at other times over other discovery issues, including … waiver of privileges and clawbacks… There is no need to force the issue here.” The protective order was subsequently entered without a clawback provision. After further meet and confer sessions, plaintiff still would not enter into a clawback agreement, and defendant filed a motion for entry of a clawback provision.

Agreeing with defendant’s arguments, the Court held that both Federal Rule of Civil Procedure 26(f) and Federal Rule of Evidence 502 contemplated the use of clawback provisions and that “entry of an order containing a clawback provision is not dependent on the agreement of the parties.” Because of the extensive amount of ESI in the litigation, and because defendant is a law firm with thousands of clients and a high risk of potential inadvertent disclosure, the Magistrate Judge concluded that defendant had made the requisite showing of good cause for entry of a clawback provision:

“[T]his case is precisely the type of case that would benefit from a clawback provision. Such a provision will permit the parties to conduct and respond to discovery in an expeditious manner, without the need for time-consuming and costly pre-production privilege reviews, and at the same time preserve the parties’ rights to assert the attorney-client privilege or work product immunity.”

So, what do you think?  Is this the most significant eDiscovery case of 2010?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Sidley Austin LLP.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Pension Committee

This holiday week, we’re taking a look back at some of the cases which have had the most significance (from an eDiscovery standpoint) of the year.  The first case we will look at is The Pension Committee of the Montreal Pension Plan v. Banc of America Securities, LLC, 29010 U.S. Dist. Lexis 4546 (S.D.N.Y. Jan. 15, 2010) (as amended May 28, 2010), commonly referred to as “Pension Committee”.

In “Pension Committee”, New York District Court Judge Shira Scheindlin defined negligence, gross negligence, and willfulness from an eDiscovery standpoint and cementing her status as the most famous “Judge Scheindlin” in New York (as opposed to “Judge Judy” Sheindlin, who spells her last name without a “c”).  Judge Scheindlin titled her 85-page opinion Zubulake Revisited: Six Years Later.  The

This case addresses preservation and spoliation requirements of the plaintiff and information which should have been preserved by the plaintiffs after the lawsuit was filed. Judge Scheindlin addresses in considerable detail, defining the levels of culpability — negligence, gross negligence, and willfulness in the electronic discovery context.

Issues that constituted negligence according to Judge Scheindlin’s opinion included:

  • Failure to obtain records from all employees (some of whom may have had only a passing encounter with the issues in the litigation), as opposed to key players;
  • Failure to take all appropriate measures to preserve ESI;
  • Failure to assess the accuracy and validity of selected search terms.

Issues that constituted gross negligence or willfulness according to Judge Scheindlin’s opinion included:

  • Failure to issue a written litigation hold;
  • Failure to collect information from key players;
  • Destruction of email or backup tapes after the duty to preserve has attached;
  • Failure to collect information from the files of former employees that remain in a party’s possession, custody, or control after the duty to preserve has attached.

The opinion also addresses 1) responsibility to establish the relevance of evidence that is lost as well as responsibility to prove that the absence of the missing material has caused prejudice to the innocent party, 2) a novel burden-shifting test in addressing burden of proof and severity of the sanction requested and 3) guidance on the important issue of preservation of backup tapes.

The result: spoliation sanctions against 13 plaintiffs based on their alleged failure to timely issue written litigation holds and to preserve certain evidence before the filing of the complaint.

Scheindlin based sanctions on the conduct and culpability of the spoliating party, regardless of the relevance of the documents destroyed, which has caused some to label the opinion as “draconian”.  In at least one case, Orbit One Communications Inc. v. Numerex Corp., 2010 WL 4615547 (S.D.N.Y. Oct. 26, 2010)., Magistrate Judge James C. Francis concluded that sanctions for spoliation must be based on the loss of at least some information relevant to the dispute.  It will be interesting to see how other cases refer to the Pension Committee case down the road.

So, what do you think?  Is this the most significant eDiscovery case of 2010?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Trends: Myth of SaaS Insecurity Finally Busted

Eleven years ago, when I first began talking to attorneys about hosting document collections online to manage the review and production process for discovery, the typical response that I got was “I would never consider putting my client’s documents online – it’s just not secure”.  Let’s face it – lawyers are not exactly early adopters of technology… 😉

These days, few folks seem to have that concern any more when it comes to putting sensitive data and documents online.  Many people bank online, buy items from Amazon and other “etailers”, share pictures and other personal information on Facebook, etc.  As for business data, SalesForce.com has become the top customer relationship management (CRM) application and many business users are using Google Docs to share documents with colleagues, as just two examples.

What do all of these applications have in common?  They are Software as a Service (SaaS) applications, delivering data and functionality via an online application.  As noted previously on this blog, a new IDC study forecasts the SaaS market to reach $40.5 billion by 2014, an annual growth rate of 25.3%.  Also by 2014, about 34% of all new business software purchases will be via SaaS applications, according to IDC.

SaaS review applications have also become increasingly popular in eDiscovery with several eDiscovery SaaS applications available that provide benefits including: no software to install, intuitive browser-based interfaces and ability to share the collection with your client, experts, and co-counsel without distributing anything more than a login.

As for security concerns, most litigators have come to accept that these systems are secure.  But, do they realize just how secure they are?

As an example, at Trial Solutions, the servers hosting data for our OnDemand® and FirstPass™ (powered by Venio FPR™) platforms are housed in a Tier 4 data center in Houston (which is where our headquarters is).  The security at this data center is military grade: 24 x 7 x 365 onsite security guards (I feel sorry for the folks who have to work this Saturday!), video surveillance, biometric and card key security required just to get into the building.  Not to mention a building that features concrete bollards, steel lined walls, bulletproof glass, and barbed wire fencing.  And, if you’re even able to get into the building, you then have to find the right server (in the right locked room) and break into the server security.  It’s like the movie Mission Impossible where Tom Cruise has to break into the CIA, except for the laser beams over the air vent (anyone who watches movies knows those can be easily thwarted by putting mirrors over them).  To replicate that level of security infrastructure would be cost prohibitive for even most large companies.

From the outside, SaaS applications secure data with login authentication and Secured Sockets Layer (SSL) encryption.  SSL encryption is like taking a piece of paper with text on it, scrambling the letters on that piece of paper and then tearing it up into many pieces and throwing the scraps into the wind.  To intercept a communication (one request to the server), you have to intercept all of the packets of a communication, then unscramble each packet individually and then reassemble them in the correct order.

Conversely, desktop review application data could be one stolen laptop away from being compromised.  No wonder why nobody talks about security concerns anymore with SaaS applications.

So, what do you think?  How secure is your document collection?  Please share any comments you might have or if you’d like to know more about a particular topic.

Happy Holidays from all of us at Trial Solutions and eDiscovery Daily!

eDiscovery Project Management: Effectively Manage your Time

 

Of all the project management techniques and activities we’ve discussed in the past weeks in this blog series, this is the one that gives many people the most trouble.   There is no set of rules I can list that’s going to work well for everyone.  I can, however, give you some tips to consider that may improve your time management skills: 

  • Be organized.  Use tools like calendars, to-do lists, email alarms and project management software to keep on top of all of the balls you need to keep in the air.
  • When possible, follow a routine and work from a plan.  Start each day with your door closed for 15 minutes to plan your day.  Set reasonable goals for the day and include time to respond to emails, return phone calls, review status reports, and to deal with the inevitable, unexpected situations that arise.
  • Delegate whenever you can.  For every thing you have to do determine if it can be delegated, to whom, and if that person can take it on.  If you delegate a task, define it well, give clear instructions, get agreement, make due-dates clear, and define authority levels (let the person to whom you are delegating know what they can make decisions on and what they need to come to you with).
  • Keep track of what you are doing.  I always maintain a project diary where I document my activity.
  • Effectively facilitate meetings.  Don’t let meetings for which you are responsible run over the scheduled time.  Prepare an agenda and distribute it.  Start the meeting on time.  Up front, state the purpose of the meeting and describe the goals.  Don’t let the discussion get off track.
  • Use standard materials and templates, such as project planning meeting agendas and reports, questionnaires to collect case information, technology surveys, requests for proposals, and status reports.

Managing your time effectively is critical, and it will set a good example for your staff.  When I feel overwhelmed, I find that stepping back, prioritizing tasks and adjusting my to-do list helps.  Always keep the big picture in mind when you caught up in chaos, and don’t sweat the small stuff

What do you think?  Do you have good tips for managing your time?  Please share any comments you might have or tell us if you’d like to know more about a topic.

eDiscovery Trends: Social Media in Litigation

Yesterday, we introduced the Virtual LegalTech online educational session Facing the Legal Dangers of Social Media and discussed what factors a social media governance policy should address.  To get background information regarding the session, including information about the speakers (Harry Valetk, Daniel Goldman and Michael Lackey), click here.

The session also addressed social media in litigation, discussing several considerations about social media, including whether it’s discoverable, how it’s being used in litigation, how to request it, how to preserve it, and how to produce it.  Between wall postings, status updates, personal photos, etc., there’s a lot of content out there and it’s just as discoverable as any other source of ESI – depending on its relevance to the case and the burden to collect, review and produce.  The relevance of privacy settings may be a factor in the discoverability of this information as at least one case, Crispin v. Christian Audigier, Inc.,(C.D. Cal. May 26, 2010), held that private email messaging on Facebook, MySpace and Media Temple was protected as private.

So, how is social media content being used in litigation?  Here are some examples:

  • Show Physical Health: A person claiming to be sick or injured at work who has photos on their Facebook profile showing them participating in strenuous recreation activities;
  • Discrimination and Harassment: Statements made online which can be considered discriminatory or harassing or if the person “likes” certain groups with “hate” agendas;
  • False Product Claims: Statements online about a product that are not true or verifiable;
  • Verify or Refute Alibis: Social media content (photos, location tracking, etc.) can verify or refute alibis provided by suspects in criminal cases;
  • Pre-Sentencing Reports: Social media content can support or refute claims of remorse – in one case, the convicted defendant was sentenced more harshly because of statements made online that refuted his statements of remorse in the courtroom;
  • Info Gathering: With so much information available online, you can gather information about opposing parties, witnesses, attorneys, judges, or even jurors.  In some cases, attorneys have paid firms to ensure that positive information will bubble to the top when jurors “Google” those attorneys.  And, in Ohio, at least, judges may not only have Facebook friends, but those friends can include attorneys appearing before them (interesting…).

If possible, request the social media content from your opponent as the third-party provider will probably fight having to provide the content, usually citing the Stored Communications Act.  As noted previously on this blog, Facebook and Twitter have guidelines for requesting data – through subpoena and law enforcement agencies.

Social media content is generally stored by third-party Software as a Service (SaaS) providers (Facebook and Twitter are examples of SaaS providers), so it’s important to be prepared to address several key eDiscovery issues to proactively prepare to be able to preserve and produce the data for litigation purposes, just as you would with any SaaS provider.

So, what do you think?  Has your organization been involved in litigation where social media content was requested?  Please share any comments you might have or if you’d like to know more about a particular topic.