eDiscovery

eDiscovery Cautionary Tales: Inadvertent Disclosure Leaves Naked Short Selling Practices Exposed

 

While traveling back from Los Angeles for LegalTech West Coast 2012 (LTWC) this week, I saw an interesting story on the Above the Law blog (with references to The Economist, DeepCapture and Rolling Stone) regarding a litigation blunder committed by a major law firm on behalf of a major client, inadvertently disclosing an unredacted version of a sensitive document.

The California office of Morgan Lewis handling high-profile litigation for Goldman Sachs accidentally released an unredacted version of a document that the firm and its clients have spent years trying to keep secret.   Overstock.com sued Goldman Sachs (as well as Merrill Lynch and also other banks now no longer involved in the case), claiming that the banks caused its stock to fall through the practice of “naked” short selling (which is selling stock you don’t have and didn’t borrow, creating an artificial supply of stock shares).  The suit was dismissed by a California judge, who ruled that not enough of the alleged wrongdoing happened in the state.  According to The Economist:

“That was how things stood until the end of last week, when the defendants’ lawyers sent their opposition to a plaintiffs’ motion to the other parties in the case. One of the exhibits attached to this, presumably inadvertently, was an unredacted version of an earlier filing by Overstock, opposing the defendants’ motion to seal papers. Within this exhibit is an intriguing six-page section, “Facts Defendants Improperly Seek to Seal” (pages 14-20 of this), containing excerpts of e-mails written by Goldman and Merrill employees.”

According to DeepCapture, the responsible lawyer is alleged to be Joseph Floren, a partner at Morgan Lewis.  Ironically, Goldman and its attorneys have spent a significant amount of time (which means significant money) to keep this information sealed only to have this “blunder” release it publicly.

Matt Taibbi of Rolling Stone provides a commentary regarding information contained in the filing (language warning!), as follows:

“Now, however, through the magic of this unredacted document, the public will be able to see for itself what the banks’ attitudes are not just toward the “mythical” practice of naked short selling (hint: they volubly confess to the activity, in writing), but toward regulations and laws in general.

“Fuck the compliance area – procedures, schmecedures,” chirps Peter Melz, former president of Merrill Lynch Professional Clearing Corp. (a.k.a. Merrill Pro), when a subordinate worries about the company failing to comply with the rules governing short sales.

We also find out here how Wall Street professionals manipulated public opinion by buying off and/or intimidating experts in their respective fields. In one email made public in this document, a lobbyist for SIFMA, the Securities Industry and Financial Markets Association, tells a Goldman executive how to engage an expert who otherwise would go work for “our more powerful enemies,” i.e. would work with Overstock on the company’s lawsuit.”

A copy of the unredacted filing is located here.  Needless to say, clear naming of files as to whether they are redacted or unredacted, along with a thorough quality check, could have prevented this mistake.  I’ll leave it up to you to decide whether the mistake represents a form of karma in exposing these corporate practices.  🙂

So, what do you think?  What procedures do you have in place for avoiding inadvertent disclosures?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Daily will take a break for Memorial Day weekend.  See you on Tuesday!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: Wednesday LTWC 2012 Sessions

 

As noted yesterday, LegalTech West Coast 2012 (LTWC) is happening this week and eDiscoveryDaily is here to report about the latest eDiscovery trends being discussed at the show.  There’s still time to check out the show if you’re in the Los Angeles area with a number of sessions (both paid and free) available and 69 exhibitors providing information on their products and services, including (shameless plug warning!) my company, CloudNine Discovery, which just announced yesterday release of Version 11 of our linear review application, OnDemand®, and will be exhibiting at booth #216 along with our partners, First Digital Solutions.  Come by and say hi!

Perform a “find” on today’s LTNY conference schedule for “discovery” and you’ll get 21 hits.  More eDiscovery sessions happening!  Here are some of the sessions in the main conference tracks:

10:30 – 12:00 AM:

Information Governance and Information Management

With the volume of electronically stored information (ESI) growing exponentially and the challenges surrounding managing it, protecting it, and developing effective policies are essential. Social media, email, IMs, web pages, mobile devices and the cloud have made a big job even bigger. How much or how little should you collect? How aggressive should you be? How can you be certain your approach and results are defensible?

Speakers are: Richard E. Davis, JD, e-Discovery Solutions Architect & Founder, Litigation Logistics, LLC; Jack Halprin, Head of eDiscovery, Google; Dawson Horn, III, Senior Litigation Counsel, Tyco International and David Yerich, Director, eDiscovery, UHG Legal Department, United Health Group.

The GARP® Principles and eDiscovery

Attendees will hear from experts on the GARP Principles and eDiscovery as well as:

  • Understand the importance of proactive records management through the eight GARP® Principles
  • Revisit the GARP® Principles and learn how their role is magnified by recent case law
  • Learn what to do before eDiscovery: how GARP® precedes and complements the EDRM

Speakers are: Gordon J. Calhoun, Esq., Lewis Brisbois Bisgaard &, Smith LLP; Lorrie DeCoursey, Former Law Firm Administrator and John J. Isaza, Esq., Partner, Rimon P.C.  Moderator: David Baskin, Vice President of Product Management, Recommind.

1:30 – 3:00 PM:

Practical Handbook for Conducting International eDiscovery – Tips and Tricks

This session will present a truly international view on how to conduct global eDiscovery from a practical perspective, including developing proactive global document retention policies and assuring multi-jurisdictional compliance, best practices of global data preservation and collection, successful data migration across jurisdictions, navigating unique cultural and procedural challenges in various global regions, handling multi-lingual data sets as well as strategic positioning of hosting data centers.

Speakers are: Monique Altheim, Esq., CIPP, The Law Office of Monique Altheim; George I. Rudoy, Founder & CEO, Integrated Legal Technology, LLC and David Yerich, Director, eDiscovery, UHG Legal Department, United Health Group.

Litigation Preparedness Through Effective Data Governance

Be prepared. This panel will go through the benefits of data governance in your litigation preparedness and discuss benefits such as:

  • Auto-classification of legacy and newly created content
  • What is email management and is it ready for prime-time?
  • Review the court's findings on the complexities of ESI, including metadata, native formats, back-up tapes, mobile devices, and legacy technology
  • Key questions to ask before outsourcing ESI to the cloud

Speakers are: Lorrie DeCoursey, Former Law Firm Administrator; John J. Isaza, Esq., Partner, Rimon P.C. and Ayelette Robinson, Director – Knowledge Technology, Littler Mendelson.  Moderator: Derek Schueren, GM, Information Access and Governance, Recommind.

3:30 – 5:00 PM:

Managed and Accelerated Review

As costs for review soar and volumes of data multiply at an almost exponential rate, traditional linear review seems to be giving way to new technologies that will enable faster, better, more defensible eDiscovery results. How can you be assured that this new approach will catch everything that needs to be captured? Will human review become obsolete? What do you need to ask when considering this new technology? How should it be incorporated into your overall litigation strategy?

Speakers are: Matthew Miller, Manager, Fraud Investigation & Dispute Services, Ernst & Young; Robert Miller, Founder, Rise Advisory Group, LLC; Former Discovery Counsel, BP; David Sun, Discovery Project Manager, Google.

eDiscovery Circa 2015: Will Aggressive Preservation/Collection and Predictive Coding be Commonplace?

Who's holding back on Predictive Coding, clients or outside counsel? This session will discuss if aggressive preservation/collection of predictive coding will become commonplace as well as:

  • How aggressive should clients be with preservation/collection?
  • How to use effective searching, sampling, and targeting tools and techniques to not over-collect

Speakers are: Gordon J. Calhoun, Esq., Lewis Brisbois Bisgaard &, Smith LLP; Lorrie DeCoursey, Former Law Firm Administrator and Greg Chan, Senior Regional Litigation Technology Manager, Bingham McCutchen LLP.  Moderator: David Baskin, Vice President of Product Management, Recommind.

In addition to these, there are other eDiscovery-related sessions today.  For a complete description for all sessions today, click here.

So, what do you think?  Are you planning to attend LTWC this year?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: Welcome to LegalTech West Coast 2012!

 

Today is the start of LegalTech® West Coast 2012 (LTWC) and eDiscoveryDaily is here to report about the latest eDiscovery trends being discussed at the show.  Over the next two days, we will provide a description each day of some of the sessions related to eDiscovery to give you a sense of the topics being covered.  If you’re in the Los Angeles area, come check out the show – there are a number of sessions (both paid and free) available and 69 exhibitors providing information on their products and services, including (shameless plug warning!) my company, CloudNine Discovery, which just announced today release of Version 11 of our linear review application, OnDemand®, and will be exhibiting at booth #216 along with our partners, First Digital Solutions.  Come by and say hi!

Perform a “find” on today’s LTNY conference schedule for “discovery” and you’ll get 19 hits.  So, there is plenty to talk about!  Sessions in the main conference tracks include:

10:30 AM – 12:00 PM:

A "Stormy" Subject…Exploring Cloud-Based eDiscovery

Can your organization better manage costs and increase control over discovery by bringing eDiscovery tools in-house or in-firm? What are the advantages and drawbacks of eDiscovery in the cloud? In this session, the panel will:

  • Explore insourcing v. outsourcing market trends
  • Discuss the pros and cons inherent in cloud/SaaS v. on premises e-discovery software solutions
  • Examine challenges when collecting and preserving discoverable data stored in the cloud

Speakers are: Scott Sachs, eDiscovery Attorney, Atkinson Andelson and Adam Sand, Associate General Counsel, Ancestry.com.  Moderator: Wayne Wong, Managing Consultant, Kroll Ontrack.

1:30 – 3:00 PM:

Under Fire: Defending and Challenging Technology-Assisted Review

Intelligent Review? Predictive Coding? Smart review? Whatever you call it, amidst growing data volumes and dwindling resources, traditional linear document review is quickly going the way of the dinosaur. In this session, the panel will:

  • Explore the "what", "why", and "how" behind  technology-assisted review
  • Discuss cutting-edge opinions from the bench
  • Provide you with tips to help overcome your organization's objections to using intelligent review technology

Speakers are: Tom Werner, Associate, Irell & Manella, LLP; Jeffrey Fowler, Partner, O'Melveny & Myers, LLP and Pallab Chakraborty, Director of eDiscovery, Oracle.  Moderator: Andrea Gibson, Product Director, Kroll Ontrack.

3:30 – 5:00 PM:

Exploring Hot eDiscovery Trends: FRCP Amendments, Social Media, and Emerging Case Law

eDiscovery evolves at the speed of light. If your organization is standing still, you are losing ground. In this session, the panel will:

  • Explore how eDiscovery evolved in 2011, with a look into how it will continue to change in the remainder of 2012
  • Analyze whether potential amendments to the Federal Rules of Civil Procedure are even possible, and what the amendments might entail discuss "hot" trends impacting eDiscovery such as social media.

Panelists are: Ron S. Best, EDD Staff Attorney & Director, Litigation Systems, Munger, Tolles & Olson, LLP and Eric Chan, Associate, O'Melveny & Myers, LLP.  Moderator: Joel Vogel, Vice President, Discovery Products and Services, Kroll Ontrack.

In addition to these, there are other eDiscovery-related sessions today.  For a complete description for all sessions today, click here.

So, what do you think?  Are you planning to attend LTWC this year?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Another Case with Inadmissible Text Messages

 

Yesterday, we discussed a case – Commonwealth v. Koch, No. 1669-MDA-2010, 2011 Pa. Super. LEXIS 2716 (Sept. 16, 2011) – where a Pennsylvania Superior Court ruled text messages inadmissible, declaring that parties seeking to introduce electronic materials, such as cell phone text messages and email, must be prepared to substantiate their claim of authorship with “circumstantial evidence” that corroborates the sender's identity.  That case is now being appealed to the state Supreme Court.  Today, we have another case – Rodriguez v. Nevada, No. 56413, 2012 WL 1136437 (Nev. Apr. 5, 2012) – where text messages were ruled inadmissible.

In this case, the Nevada Supreme Court found that a lower court abused its discretion in admitting text messages because the State failed to provide sufficient evidence corroborating the identity of the sender. The defendant, Kevin Rodriguez, was found guilty in trial court of multiple counts associated with an attack of a woman in her home. On appeal, he argued that the trial court erred in overruling an objection to the admission of 12 text messages because the state failed to authenticate the messages and the messages constituted inadmissible hearsay.

Citing Commonwealth v. Koch, among other cases, the Nevada Supreme Court found that it is necessary that the identity of the author of the text message be established through corroborating evidence presented. In this case, the state did establish that the victim’s cell phone was stolen during the attack, and that the defendant was in possession of the cell phone prior to being arrested.

The court noted that “Text messages offer new analytical challenges when courts consider their admissibility.  However, those challenges do not require a deviation from basic evidentiary rules applied when determining authentication and hearsay.”  Further noting that “establishing the identity of the author of a text message through the use of corroborating evidence is critical to satisfying the authentication requirement for admissibility", the court concluded that when there has been an objection to admissibility of a text message, “the proponent of the evidence must explain the purpose for which the text message is being offered and provide sufficient direct or circumstantial corroborating evidence of authorship in order to authenticate the text message as a condition precedent to its admission”.

Since the state did not offer any corroborating evidence that the defendant authored 10 of the 12 text messages, those messages were ruled as inadmissible.  The other two messages were deemed admissible and not considered to be hearsay because in those instances, the state was able to present bus surveillance video of the defendant participating in using the phone at the time those two messages were sent. Despite the erroneous admission of the other 10 text messages, however, the Nevada Supreme Court held that the error was harmless as there was a considerable amount of other evidence pointing to the guilt of the defendant.

So, what do you think?  Should text messages be ruled inadmissible without corroborating evidence?  Will cases like this significantly reduce the use of text messages as evidence in litigation?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Inadmissibility of Text Messages Being Appealed

 

Last October, we covered a case – Commonwealth v. Koch, No. 1669-MDA-2010, 2011 Pa. Super. LEXIS 2716 (Sept. 16, 2011) – where a Pennsylvania Superior Court ruled text messages inadmissible, declaring that parties seeking to introduce electronic materials, such as cell phone text messages and email, must be prepared to substantiate their claim of authorship with “circumstantial evidence” that corroborates the sender's identity.  That case, where Amy N. Koch was originally convicted at trial on drug charges (partially due to text messages found on her cell phone), is now being appealed to the state Supreme Court.

This article from The Legal Intelligencer regarding the case, notes the following:

“The justices limited the appeal to two issues, leaving the language used by the state intact.

First, the justices will examine whether the text messages “were not offered for their truth” and were therefore admissible. The state questioned whether the Superior Court, in reversing a Cumberland County judge’s decision to admit the texts, had ruled against its own previous holding in another case and thusly created “uncertainty in the law.”

The high court is also tasked with reviewing the case in terms of Pa.R.E. 901, on “Requirement of Authentication or Identification.” According to the Tuesday allocatur grant, prosecutors asked the court to examine whether the Superior Court panel “misapprehended” Rule 901, again going against its own jurisprudence and again creating “uncertainty.”

Despite a victory before the intermediate appellate court, Koch’s attorney called the justice’s decision to take up the case “good news.”

For Camp Hill, Pa., attorney Michael O. Palermo Jr., the challenge represents a chance for the high court to set precedent against electronic documents “blindly coming into evidence.”

“I have a problem with that and I hope the Supreme Court does too,” Palermo told The Legal following the grant of allocatur.”

So, what do you think?  Was the Superior court right in ruling against the admission of these text messages as evidence? Will the State Supreme Court uphold the decision to rule the text messages as inadmissible?  If they do, will that decision create more eDiscovery problems than it solves?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Court Denies Criminal Defendant’s Attempt to Quash Twitter Subpoena

 

In People v. Harris, 2011NY080152 (N.Y. Crim. Ct. Apr. 20, 2012), Criminal Court Judge Matthew A. Sciarrino, Jr. ruled that the defendant lacked standing to move to quash the prosecution’s subpoena served upon Twitter, a third-party in the case, for records of the defendant’s Twitter account. The defendant was a protester arrested during a march on the Brooklyn Bridge as part of the Occupy Wall Street movement, and in prosecuting the case, the prosecution sought his Twitter records for the time period relevant to the defendant’s involvement in the march.

In denying the defendant’s motion to quash, Judge Sciarrino analogized a subpoena issued to a third-party online social networking service like Twitter to one issued against a bank for a bank customer’s account information. The judge noted that in such bank cases a customer has “no proprietary or possessory interests” in his bank records, as they are the business records of the bank. Similarly, here, when the defendant signed up for Twitter, he agreed to certain terms, including a license that he granted to Twitter to “use, display and distribute” his Tweets. “Twitter’s license to use the defendant’s Tweets means that the Tweets the defendant posted were not his,” and therefore he had no proprietary interest in the Tweets.

Judge Sciarrino also acknowledged that although the defendant’s belief that he had a privacy interest in his own Tweets was “understandable,” it was “without merit.” The court pointed out that the “very nature and purpose” of Twitter is to help its users share information instantaneously with the world. Although a user may believe the Fourth Amendment should provide him online the same protection he would receive in his physical home, he is mistaken: Twitter users "may think that the same 'home' principle may be applied to their Twitter account. When in reality the user is sending information to the third party, Twitter. At the same time the user is also granting a license for Twitter to distribute that information to anyone, any way and for any reason it chooses."

Judge Sciarrino also denied the defendant’s motion to intervene in proceedings to quash the prosecution’s subpoena. It also found that the court is “compelled to evaluate the subpoena under federal laws governing internet communications,” that is, the Stored Communications Act; as such, the subpoena was proper because the defendant had a required hearing and notice, the information sought was relevant and material to the case, and the subpoena was not overly broad in its request.

So, what do you think?  Did the judge make the right call or should the defendant have been able to quash the subpoena?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: EDRM and Statistical Sampling

 

I’ve been proud to be a member of The Electronic Discovery Reference Model (EDRM) for the past six years (all but the first year) and I’m always keen to report on activities and accomplishments of the various working groups within EDRM.  Since this blog was founded, we’ve reported on 1) the unveiling of the EDRM Data Set, which has become a standard for useful eDiscovery test and demo data, 2) the EDRM Metrics Privilege Survey (which I helped draft), to collect typical volumes and percentages of privileged documents throughout the industry, 3) Model Code of Conduct which focuses on the ethical duties of eDiscovery service providers, and 4) the collaboration between EDRM and ARMA and subsequent joint Information Governance white paper.  EDRM’s latest announcement yesterday is a new guide, Statistical Sampling Applied to Electronic Discovery, which is now available for review and comment. 

As EDRM notes in their announcement, “The purpose of the guide is to provide guidance regarding the use of statistical sampling in e-discovery contexts. Most of the material is definitional and conceptual, and is intended for a broad audience. The later material and the accompanying spreadsheet provide additional information, particularly technical information, to people in e-discovery roles who become responsible for developing further expertise in this area.”

The Guide is comprised of six sections, as follows:

  1. Introduction: Includes basic concepts and definitions, alludes to mathematical techniques to be discussed in more detail in subsequent sections, identifies potential eDiscovery situations where sampling techniques may be useful and identifies areas not covered in this initial guide.
  2. Estimating Proportions within a Binary Population: Provides some common sense observations as to why sampling is useful, along with a straightforward explanation of statistical terminology and the interdependence of sample size, margin of error/confidence range and confidence level.
  3. Guidelines and Considerations: Provides guidelines for effective statistical sampling, such as cull prior to sampling, account for family relationships, simple vs. stratified random sampling and use of sampling in machine learning, among others.
  4. Additional Guidance on Statistical Theory: Covers mathematical concepts such as binomial distribution, hypergeometric distribution, and normal distribution.  Bring your mental “slide-rule”!
  5. Examples Using the Accompanying Excel Spreadsheet: Describes an attached workbook (EDRM Statistics Examples 20120427.xlsm) that contains six sheets that include a notes section as well as basic, observed and population normal approximation models and basic and observed binomial methods to assist in learning these different sampling methods.
  6. Validation Study: References a Daegis article that provides an empirical study of sampling in the eDiscovery context.  In addition to that article, consider reading our previous posts on determining an appropriate sample size to test your search, how to generate a random selection and a practical example to test your search using sampling.

Comments can be posted at any of the EDRM Statistical Sampling pages, or emailed to the group at mail@edrm.net.  As a big proponent of statistical sampling as an effective and cost-effective method for verifying results, I’m very interested to see where this guide goes and how people will use it.  BTW, EDRM’s Annual Kickoff Meeting is next week (May 16 and 17) in St. Paul, MN – it’s not too late to become a member and help shape the future of eDiscovery with other industry leaders!

So, what do you think?  Do you perform statistical sampling to verify results within your eDiscovery process?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: No Race Tires on This Vehicle, Taxation of eDiscovery Costs Granted

 

The trend for defendants requesting plaintiffs to be responsible for eDiscovery costs when they lose is continuing.  Sometimes that request is granted, at least partially, as in this case and this case.  In another case, taxation of eDiscovery costs was initially granted, but then reversed due to the parties' agreement to split the costs.  Then, there’s the case of Race Tires America, Inc. v. Hoosier Racing Tire CorporationLast May, the winning defendants were awarded $367,000 as reimbursement for eDiscovery costs.  (Hoosier Daddy!)  But, then in March of this year, an appellate court reversed all but $30,370 of those costs, implementing a narrow interpretation of 28 U.S.C. § 1920(4) for assigning those costs.  Now, a new case addresses the issue of taxation of costs once again.

In the case In re Online DVD Rental Antitrust Litig., No. M 09-2029 PJH, (N.D. Cal. Apr. 20, 2012), a federal court recently broadly interpreted the language in the federal statute governing the taxation of costs, 28 U.S.C. § 1920(4).

In this class action involving claims that Netflix had reached an agreement with Walmart to divide the market for sales and online rentals of DVDs, Netflix won summary judgment and filed a motion seeking to recover its costs, including those relating to eDiscovery. After the clerk awarded the costs, the plaintiff subscribers filed a motion with the court seeking review of the award.

In denying the plaintiffs’ request to limit the costs, the court rejected the Third Circuit’s narrow view of 28 U.S.C. § 1920(4) as expressed in its recent decision in the Race Tires America, Inc. v. Hoosier Racing Tire Corp. case, which vacated the district court’s approval of many eDiscovery costs. Although the court noted the Third Circuit’s “well-reasoned opinion,” the California court concluded that “in the absence of directly analogous Ninth Circuit authority, and in view of the court’s prior order in connection with the Blockbuster subscriber plaintiffs’ motion for review of the clerk's taxation of costs, broad construction of section 1920 with respect to electronic discovery production costs—under the facts of this case—is appropriate.” Ultimately, the court awarded the defendants slightly more than $700,000 in costs.

So, what do you think?  Will this ruling isolate the Race Tires case as an anomaly?  Will our monthly Netflix subscription rates go down?  (Probably not.)  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: Deidre Paknad on CGOC’s Information Lifecycle Governance Leader Reference Guide

 

Yesterday, we talked about the Information Lifecycle Governance Leader Reference Guide from the Compliance, Governance and Oversight Council (CGOC).  The guide provides a program for operationalizing an effective defensive disposal program for expired data, which is an increasingly important issue for many organizations as organizational data doubles every 18-24 months.

Deidre Paknad, Director of Information Lifecycle Governance (ILG) Solutions for IBM, is a well-known thought leader in the legal and information governance domain and one of the authors of the guide, as well as the founder of CGOC (and also a previous thought leader interviewee on this blog).  Deidre has also been a member of several Sedona Conference working groups since 2005 and has co-chaired the EDRM IGRM project since 2010.  I recently interviewed Deidre and asked her some questions regarding the goals for the guide, the target audience and how it fits in with other information governance initiatives in the industry.

Who is the target audience for this guide in terms of job functions and/or size of organization?

The guide is for companies and their Information Governance leaders who are looking to transform legal, records and IT practices to drive substantial cost savings and risk reduction.  It is for business leaders or stakeholders such as the Chief Information Officer (CIO), General Counsel (GC) and records managers who are looking for program models to define, operationalize and improve processes that enable defensible disposal of unnecessary data. The goal is to curb storage growth and lower costs associated with IT, eDiscovery and processing, to not only save money but also lower organizational risk going forward. Based on insight from 1700+ CGOC corporate practitioners, it is apparent that organizations with extensive preservation requirements due to litigation and regulation requirements who retain large amounts of data are in need of such a leadership guide.

Are there any success stories or examples of organizations using the principles described in this guide that you can provide?

Yes. We just had a very successful summit in February with more than 100 corporate practitioners (the proceedings documentation from the CGOC web site are available here).  Anthony Perkins of BNY Mellon provided the keynote speech regarding the high cost of information and how IT organizations are responding.  BNY Mellon and several others are setting new benchmarks and advancing ILG practices for defensible disposal that have become strategic enterprise initiatives.  Scott Bancroft of Novartis International also shared their experience in how they structured an effective governance program.  In the panel discussion, practitioners (such as Jason R. Baron of the National Archives and Records Administration, Eckhard Herych of Novartis and Mark Tabs and Thomas Zingale of UBS) shared their own experience and leadership on assessing process maturity to drive process improvement.  From those proceedings, you can see how Legal, RIM, IT and program office leaders (i.e., members of our target audience) share their experience to modernize their practices and collectively transform their enterprise processes for cost saving and risk reduction.

As this guide references the Information Governance Reference Model (IGRM) – which, of course, is a part of the Electronic Discovery Reference Model (EDRM) – how does this guide and the efforts of CGOC fit in with the EDRM-ARMA initiative?

We established CGOC in 2004 and it has grown to a community of over 1700 experts in retention, legal holds, discovery, and privacy exclusively for corporate practitioners. Its charter is to create a forum in which Legal, IT, RIM, Privacy and compliance executives can get the insight, interaction, and information they need to make good business decisions. CGOC fills the critical practitioners’ gap between ARMA and The Sedona Conference, providing the ability to move from theory to efficient practices. CGOC also provides educational seminars, benchmarking surveys, group workshops, an annual Summit and retreat, white papers by expert faculty, a professional networking website, and regional working groups to corporate litigation, discovery, privacy, records management and program office leaders and practitioners.  Membership in the forum is free to qualified executives.

What are your expectations/goals/hopes that you envision for how the guide is used and adopted?

In the fall of 2010, CGOC issued its Information Governance Benchmark Report, which presented findings from their first survey of legal, records management (RIM) and IT practitioners in Global 1000 companies. The report confirmed that CGOC members viewed defensible disposal as the most essential outcome of a good governance program  but revealed challenges with funding and cross organizational cooperation that impeded program launch or effectiveness. The ILG Guide now simply provides members with a construct for how to operationalize an effective program and overcome these barriers. By leveraging the guide, program leaders can clearly see the sixteen processes to coalesce Legal, RIM, Business, Privacy and IT processes to lower cost and risk. The impacts to the enterprise (and resulting costs) are high when legal, records and IT don't work in concert, and the cost of doing nothing is even higher.  Organizations can improve information economics by operationalizing their information lifecycle governance program using this guide, resulting in significant cost savings and reduced risk going forward.  We are excited to be able to provide such a guide to our member organizations.

Thanks, Deidre, for participating in the interview!

And to the readers, as always, please share any comments you might have or if you’d like to know more about a particular topic!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: CGOC’s Information Lifecycle Governance Leader Reference Guide

With all of the recent attention on technology-assisted review and current case law related to that subject, it’s sometimes easy to forget that most sanctions are issued because of failure to preserve potentially responsive data.  A sound Information Governance (aka Records Management) policy is the first step to enabling organizations to meet their preservation obligations by getting control of the data up front.  Organizations such as EDRM and ARMA have focused on Information Governance and have even collaborated on a January report on Information Governance.  Another organization focused on Information Governance is the Compliance, Governance and Oversight Council (CGOC).  In the fall of 2010, CGOC issued its Information Governance Benchmark Report, which presented findings from their first survey of legal, records management (RIM) and IT practitioners in Global 1000 companies.  Recently, CGOC developed a new guide for helping organizations with succeed in improving information and eDiscovery economics.

For most organizations, information volume doubles every 18-24 months and 90% of the data in the world has been created in the last two years. In a typical company in 2011, storing that data consumed about 10% of the IT budget. At a growth rate of 40% (even as storage unit costs decline), storing this data will consume over 20% of the typical IT budget by 2014.  Accumulating, storing and litigating data without value is simply no longer an economically viable proposition.  The 36 page Information Lifecycle Governance Leader Reference Guide (written by Deidre Paknad and Rani Hublou) provides a program for operationalizing an eff­ective defensive disposal program for expired data and overcome the barriers to do so.  It can be downloaded here from the CGOC site (if you don’t have a user account, you’ll have to create one, but it’s free).  The guide shows how to:

  • Define the economic and business objectives of an information governance program to quantify savings and ensure appropriate funding for change;
  • Establish a program strategy;
  • Structure an organization that aligns functional silos to ensure savings and business objectives are achieved;
  • Identify and improve the business processes for defensible disposal and risk reduction; and
  • Audit these processes to ensure systemic, sustainable change.

Aside from the Introduction and Conclusion, the guide is divided into five parts, as follows:

  • Defining Program Strategy: The focus is simple – to dispose of unnecessary data and keep only the data that has business utility or is subject to legal hold or regulatory record keeping requirements.
  • Setting Quantifiable Cost and Risk Reduction Goals: Setting goals with primary focus on how to lower storage and infrastructure costs from defensible disposal, lower risk through improved governance instrumentation and lower eDiscovery costs through governance instrumentation and lower enterprise data volume.  This section provides a particularly useful eDiscovery Cost Reduction section (page 13) that demonstrates the potential cost savings due to defensible disposal of unnecessary data and a Risk Reduction section (page 14) that provides a risk matrix to assess the risk level of each data process.
  • Operationalizing the Strategy: Putting the plan into place involves defining business objectives for the program and means for measuring achievement, defining processes and practices to achieve the objectives, establish accountability for outcomes and defining staff and instrumentation required to work the plan.
  • Program Leadership: For any program to be successful, you need buy in at the top.  That includes an Executive Committee (including the CIO, CFO, General Counsel), a Senior Advisory Group comprised of line of business leaders (division executives) to provide the staff­ and support needed to achieve the defined goals, a plan for achievement measurement and accountability and an execution timeline.
  • Process Maturity and Management: Each process should be assessed as to its level of maturity (from Level 1-ad hoc to Level 4-automated and cross-functional).  The effort required in each department to achieve the objectives should be clearly mapped out and an audit process should be established for confirming that the governance programs meet objectives and raising issues when there are issues.

All in all, the guide provides an excellent approach for organizations to address implementation of an information lifecycle governance program and illustrates the benefits and cost savings for doing so.  With organizational data doubling every 18-24 months, information governance costs for many organizations will skyrocket without an effective plan to manage the explosion of data.

So, what do you think?  Has your organization implemented an effective information governance program?  Does it have any of the components outlined in the CGOC guide?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.