Preservation

eDiscovery Trends: SEC Orders Its Staff to Cease Document Destruction Pending Policy Review

 

The U.S. Securities and Exchange Commission ("SEC") recently ordered all of its enforcement staff attorneys to cease the destruction of documents from investigative files after criticism that the SEC wrongfully destroyed thousands of documents associated with high profile enforcement matters, including investigations into Wall Street banks.  The National Archives and Records Administration (NARA) and the SEC's inspector general are currently examining whether the organization's document destruction policy requires revision. This cease order comes in the wake of information provided by a SEC whistleblower, indicating that the SEC wrongfully destroyed thousands of documents from preliminary investigations referred to as “MUIs” (Matters Under Inquiry).

  • In the past, the SEC would destroy documents pertaining to “MUIs” that had been closed, including cases that never developed into formal investigations as well as those that had been decided.
  • Some of these destroyed documents pertained, either directly or peripherally, to what would later become high profile cases. Among them were documents relevant to the Madoff Ponzi scheme and several Wall Street bank fraud investigations.
  • Although private companies routinely destroy documents and files that are closed or no longer in use, the SEC is subject to federal laws and regulations that require federal agencies to retain more records than a private firm. The SEC has been criticized by members of Congress of violating these laws and avoiding its legal compliance burden, especially where destroyed documents could have proven crucial in later legal cases.
  • As a result, the present controversy has forced the SEC to work with NARA to reconsider its document retention policies and to suspend, for now, destruction of files and documents. Parties are still arguing whether a requirement to retain all documentation distracts resources from the SEC's main objective of preventing, discovering and penalizing those involved in securities fraud.

So, what do you think? Has the SEC failed in a serious way to meet compliance standards, or is this controversy placing undue emphasis on documents that are unlikely to ever be needed? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Horrors! Does This Scare You?

 

Today is Halloween.  While we could try to “scare” you with the traditional “frights”, we’re an eDiscovery blog, so it seems appropriate to try to “scare” you in a different way.  Does this scare you?

Although the court declined to re-open the case, it found that defendant had committed discovery abuses, including failing to disclose relevant evidence and failing to issue a litigation hold; therefore, the court ordered the defendant to pay plaintiff an additional $250,000 over the previously agreed settlement amount.  The court further ordered that defendant had thirty days to furnish a copy of the court’s Memorandum Opinion and Order “to every Plaintiff in every lawsuit it has had proceeding against it, or is currently proceeding against it, for the past two years” and issued an additional $500,000 sanction to be “extinguished” upon a showing of compliance.

What about this?

Even though many (but not all) of the documents were recovered (most from backup tape), the court rejected the defendant’s argument that “there can be no spoliation finding because many documents were recovered” and eventually produced, stating: "The fact that technology permits the undoing of spoliation does not change at all the fact that spoliation has occurred."

Or this?

Then, in January of this year, Judge Grimm entered an order awarding a total of $1,049,850.04 in “attorney’s fees and costs associated with all discovery that would not have been un[der]taken but for Defendants' spoliation, as well as the briefings and hearings regarding Plaintiff’s Motion for Sanctions.”

How about this?

The court concluded based on case history that “emails and text messages are documents and subject to the same requirements for authenticity as non-electronic documents generally” and found that the evidence that the defendant had authored these text messages was absent.

Scary, huh?  If the possibility of sanctions and changing court requirements keep you awake at night, then the folks at eDiscovery Daily will do our best to provide useful information and best practices to enable you to relax and sleep soundly, even on Halloween!

Of course, if you really want to get into the spirit of Halloween, click here.  This will really terrify you!

What do you think?  Is there a particular eDiscovery issue that scares you?  Please share your comments and let us know if you’d like more information on a particular topic.

Happy Halloween!

eDiscovery Case Law: Defendant Sanctioned for Abandonment and Sale of Server; Defendants' Counsel Unaware of Spoliation

An Illinois District Court ordered heavy sanctions against the defense for spoliation “willfully and in bad faith” of documents stored on a server, in a case revolving around damages sought for breach of loan agreements.

In United Cent. Bank v. Kanan Fashions, Inc., No. 10 C 331, 2011 WL 4396856 (N.D. Ill. Sept. 21, 2011), the defendants were found to have hidden and sold (or fabricated the sale of) a server which was subject to discovery. The defendants also misled their own counsel about their discovery procedures with regard to its preservation obligations and the sale of this crucial server. Accordingly, a magistrate judge ruled in favor of sanctions against the defendants based almost entirely on recommendations made in United Cent. Bank v. Kanan Fashions, Inc., No. 10 CV 331, 2011 WL 4396912 (N.D. Ill. Mar. 31, 2011):

  • Although the defendants’ counsel reminded them several times of their obligation to preserve evidence, and the defendants claimed at all times that they were taking the necessary steps to ensure a smooth and correct discovery process, they misled their own attorneys. In fact, the defendants proceeded to sell a server that contained information relevant to the suit.
  • The circumstances associated with the sale were extensive, involving the defendants defaulting on a loan on the warehouse in which the server was stored. When they made plans for foreclosure on the warehouse, they also made arrangements that the bank would purchase the lease on the server, originally held by a different lender, without informing their defense lawyers.
  • When defense counsel learned of the foreclosure and these arrangements, the defendants maintained that they could get access to the server as needed for discovery.
  • Several months later, the court ordered the defendants to retrieve either the server or a forensic copy of its contents for discovery. It was only a few days later that the defendants informed their counsel and the court that the server had been sold by the bank to a business in Dubai.
  • All of the above took place after the defendants had been repeatedly informed of the need to preserve evidence for discovery, and of their obligations with regard to ESI.
  • The circumstances of the sale of the server were so unusual that the court concluded that the defendants had, themselves, had a hand in the sale of the server to Dubai and the removal of the server from the court’s reach.
  • The magistrate judge found that defendants were solely responsible for the spoliation, having deliberately misled the court, the plaintiffs, and the defendant’s own counsel.
  • Defendants were ordered to pay sanctions that include reimbursement of the plaintiff for all costs related to the Motion for Sanctions. Defendants are also “barred from introducing any evidence regarding the data on the warehouse server”. The jury is to be “informed of the Defendants’ abandoning of the server” and instructed that the spoliation of the server “may be considered evidence that the server contained evidence unfavorable to Defendants’ position.”
  • The plaintiff’s request for sanctions against the defense counsel was dismissed by the magistrate judge.

So, what do you think? Have you ever been involved in a case where a similar instance of spoliation took place? Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Trends: Opinions…Everybody Has One

 

With the number of presidential candidacy polls already being conducted with over a year(!) before the 2012 presidential election, it’s no surprise that just about everyone is willing to express an opinion on just about anything.  With that in mind, one of the best eDiscovery blogs out there, Ralph Losey’s e-Discovery Team blog, is currently conducting a confidential poll of its readers related to various eDiscovery topics.

Using Polldaddy.com, Ralph asks questions related to various eDiscovery topics, including confidentiality orders, privacy rights, eDiscovery certification and new Federal Rules for eDiscovery.  He even asks a polling question of his readers as to whether they like these polls!  Amazingly, 13 people (10.48%) so far have responded ‘no’ to that question, which makes me wonder why they would take the time to respond when they don’t like polls?  Hmmm…  😉

Each of the polling questions not only provides a button to vote, but also provides a link to view results.  If there’s an end date to the poll at some point, Ralph doesn’t indicate one, so it appears that the ‘polls’ are open indefinitely.  The questions each have ‘yes’ and ‘no’ selections, along with an ‘other’ (with space to put in a comment and usually a fourth qualifying option (for example, question #2 below provides a choice for ‘Most of the time, but not always’).

I don’t want to “steal anyone’s thunder” and report current results, but you can use the link above to check out current results for each of the questions.  I will say that it appears that most of the questions have at least 100 responses so far, with some having a clear majority opinion and others being much more evenly distributed in responses.  Here are the questions Ralph asks in his blog post (excepting the aforementioned question about liking polls):

  1. Should courts routinely enter umbrella confidentiality protective orders during the discovery phase of the case?
  2. Should the public have a right to see all information filed with a court?
  3. Should all information accepted into evidence in a trial be disclosed to the public?
  4. Should Plaintiffs in civil suits have a right to protect from public disclosure any of their confidential information that is directly relevant to their case?
  5. Should Defendants in civil suits have a right to protect from public disclosure their confidential information that is directly relevant to the case?
  6. Should corporations have the same privacy rights as individuals?
  7. Is lack of privacy a problem in the United States?
  8. Are you concerned about your employer's right to read your email?
  9. Would you like stronger U.S. privacy laws where no one can read your email and other personal communications without your permission? (multiple answers allowed)
  10. Would you like to see privacy protection on the Internet strengthened?
  11. Do you agree with Patrick Oot? (and his criticism of eDiscovery certification programs)
  12. Do you think there is a need for certification of expertise in the field of electronic discovery?*
  13. Do you think there is a need for extensive training programs in e-discovery law?
  14. Do we need to amend the Federal Rules of Civil Procedure again soon to address e-discovery issues?
  15. Do we need to amend the FRCP to add one or more new rules on preservation?
  16. Should the rules be amended to limit the scope of relevancy in discovery?

*I have a ‘bone to pick’ with one of the potential responses to question 12 (Yes, but only State Bar Associations should do it) as it implies that the only people who need certification are attorneys and other legal practitioners, when technologists and consultants need it too.

I encourage you to check out the post, vote and view current results.  Even if you don’t like polls.  😉

So, what do you think?  Can we learn anything from polls like this?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Case Law: Defendant Ordered to Re-Post Infringing Photograph to Facebook Profile

A New Jersey court ordered the defendant to re-post a photograph displaying infringing trade dress to his Facebook profile for a brief period of time to allow the plaintiff to print copies, in a case involving trademark infringement.

In Katiroll Co., Inc. v. Kati Roll & Platters, Inc., No. 10-3620 (GEB), 2011 WL 3583408 (D.N.J. Aug. 3, 2011), the plaintiff argued for sanctions after the defendant pulled down infringing materials from his Facebook page and altered his Facebook profile photo, removing a profile picture that included the distinctive trade dress at issue in this case. The court ultimately decided against sanctions, but did order the defendant to re-post the photo in question, as follows.

  • The court first set out to establish whether or not the defendant’s actions could be considered as spoliation, citing the standard of review for the four criteria in spoliation. The four criteria include the party’s control over the evidence, apparent suppression or withholding of evidence, relevance of the destroyed evidence, and that it be “reasonably foreseeable” that the evidence would be required for discovery at a current or later date.
  • The altered profile photograph was deemed by the court to be relevant, and under the control of the defendant. However, whether that evidence was suppressed or withheld, and whether it was foreseeable that it would be required as part of discovery, remained at issue.
  • The plaintiff argued that the defendant should be sanctioned for failing “to preserve his Facebook pages in their original state” and “wanted PDFs of these pages prior to their being taken down”, but the court maintained that because these infringing pages had been removed at the plaintiff’s earlier request, it “would be unjust” to sanction the defendant for those actions.
  • The court also noted that Facebook profile photos are changed as often as weekly by those who use the site regularly, and that the defendant could not have known that changing his photo would have been an issue. “It would not have been immediately clear that changing his profile picture would undermine discoverable evidence,” the court maintained.
  • As result, the court declined to order sanctions against the defendant. Instead, the defendant was ordered to re-post the Facebook profile photo in question “for a brief time,” including the trade dress at issue (as they “ha[d] not been destroyed” and were “attached in several PDFs” to the court), so that the plaintiff might print whatever photos and Facebook pages it wishes. Afterward, the defendant was told to replace the photo again with a non-infringing image.

So, what do you think? Was the court’s decision fair, or should the defendant have been sanctioned for spoliation? Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Trends: A Site Designed to Facilitate Meet and Confer Conferences

 

The past two days, we discussed the basics of the Rule 26(f) “meet and confer” conference and details regarding the topics to discuss during that conference.  Hopefully, you found that review informative.

Now, as noted in a recent Law Technology News article by Sean Doherty, there’s a web application to facilitate the process to prepare for and conduct the Rule 26(f) conference.

MeetandConfer.com, provided by 26F LLC, was created to help attorneys prepare for court mandated “meet and confer” meetings.  The application is designed for law firms and corporate clients to help them determine the content, scope, and extent of ESI associated with the case.  There are four modules to coordinate the process, as follows:

  • Manage Enterprise Information: Enables users to map out organizational information, allowing all parties to understand where potentially relevant ESI is located, policies and practices associated with the ESI, and who is responsible for the ESI.  This module also enables various aspects of the organization to be documented, including backup policies and disaster recovery plans.
  • Matter Scoping: Enables users to track the various matters, and, for each matter, it enables users to track custodians and generate surveys to gather information about the locations of potentially responsive ESI.
  • Meet and Confer: Allows attorneys to define essential ESI needs for both parties while projecting a budget to identify, collect and process the data.  This module also provides a mechanism for computer-aided video conferencing (which can be facilitated by an independent mediator) to actually conduct the conference.
  • System Administration: Supports the creation of clients and users and establish rights for each user group.

Sean’s article mentioned above goes into more detail into each module, reflecting his “hands on” experience in “test driving” the application.  MeetandConfer.com is offering a free one month trial to “qualified” users (i.e., attorneys and judges), with the monthly rate of $149 per user to be billed after the free trial.

So, what do you think? Would an application like this make it easier to fully prepare for “meet and confer” conferences? Would you consider using such an application?  Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Rules: ESI Topics of the "Meet and Confer"

 

Yesterday, we talked about the basics of the Rule 26(f) “meet and confer” conference, Today, let’s go into more detail about the topics that are typically covered during the “meet and confer”, and why.

The "meet and confer" conference focuses on the exchange of information regarding discovery and the creation of a comprehensive plan that will govern the sharing and privilege of ESI. Accordingly, the requirements of this meeting specify discussion of the following topics:

  • Initial Disclosures: This exchange may be specific and detailed or very basic, depending on the needs of the case and the attorney's agendas. Proposed changes to the requirements, timing, or form of these disclosures may be discussed.
  • Topics on which Discovery may be Needed: It may be easy to agree on subjects for which discovery is necessary, or it may require prolonged discussion to reach an accord. In some instances, time and expense can be saved by beginning with a single area and later expanding discovery to include other topics, if necessary. Known as "phased discovery", this can be a very effective choice, as long as it is conducted in a way that does not require duplication of effort in later phases.
  • Format of Production of ESI: Although the actual discovery process may be conducted over weeks or even months after the conference, it's important to agree now on the format of production to prevent parties from accidentally converting files into a type that will later prove to be inconvenient or result in loss of data. This is especially important if one party has a request for a particular format.
  • Privilege, Inadvertent Disclosure, and Protective Orders: Although we all strive to prevent disclosure of privileged information, it's important to discuss in advance the possible implications and a process for dealing with such an eventuality, if it should occur.
  • Potential Deviations from Discovery Rules Requirements: In some cases, opposing attorneys will agree that they can accomplish discovery in fewer depositions than specified by Federal Rules or local rules. If so, this discussion and any related proposals should be part of the "meet and confer" conference so they can be incorporated into the discovery plan.
  • Any Other Orders or Concerns about Discovery: From discovery agreements to questions or requests, almost any topic related to eDiscovery can be part of the "meet and confer" conference.

To get the most out of the "meet and confer," and to save time and expense, most attorneys will prepare an extensive agenda of the topics for discussion in advance of the meeting itself. Although there are many other topics that may be included in the conference, this list covers key requirements of the Rule 26(f) "meet and confer" conference and the discovery plan to be created there.

So, what do you think? Did you learn something that you didn’t already know about the Rule 26(f) "meet and confer" conference?  If so, then we accomplished our goal! Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Rules: What's Really Required for the "Meet and Confer"?

 

Almost any litigation professional who works with eDiscovery is aware of the Rule 26(f) "meet and confer" conference, but many don't fully understand its parameters and how it affects ESI. What exactly is the "meet and confer" and what are some of its implications in regard to eDiscovery?

What is the "Meet and Confer"?

The "meet and confer" conference is now a requirement in Federal cases as of the rules changes of 2006 to the Federal Rules of Civil Procedure. In addition to Rule 26(f) for Federal cases, an increasing number of states now have (or are contemplating) a similar rule.  It provides an opportunity for the parties in a lawsuit to discuss discovery and create a plan for the sharing of information during and before trial.

The goal of the "meet and confer" rules is to provide a basis for an open exchange of information and a productive dialogue about discovery-related topics. Even in the antagonistic world of litigation, it is possible to reach an accord on the details of discovery by conforming to the requirements of these rules and of the discovery process.

What are the Parameters of the "Meet and Confer"?

Rule 26(f) states that attorneys must meet and discuss "any issues about preserving discoverable information" as well as developing a "discovery plan." It also specifies that:

  • Attorneys must already be aware of the location and nature of their own clients' computer systems and discoverable documents, and must be prepared to ask questions about their opponents' ESI, electronic systems, and data preservation actions.
  • In order to be fully prepared for this conference, an attorney needs to know as much as possible about the location, volume, and logistical challenges that surround the collection of ESI, as well as the client's preferences regarding privilege, protective orders, and document review.
  • The more informed the attorneys are on each of these counts, the more capable they will be to address relevant issues, streamline the discovery process, and minimize eDiscovery costs.
  • Attorneys may exchange either in-depth or limited information about the legal holds process.
  • The result of the "meet and confer" conference is to establish a comprehensive discovery plan and lay the groundwork for the discovery aspects of the rest of the proceeding.

Tomorrow, I’ll go into more details about the specific topics to be covered at the Rule 26(f) conference.  Oh, the anticipation!

So, what do you think? Do you have any experience with Rule 26(f) conferences that went awry or cases where having a Rule 26(f) conference would have helped? Please share any comments you might have or if you'd like to know more about a particular topic.

eDiscovery Case Law: Sanctions for Spoliation, Even When Much of the Data Was Restored

A Virginia court recently ordered sanctions against the defendant in a case of deliberate spoliation of electronic discovery documents.

In E.I. Du Pont De Nemours & Co. v. Kolon Indus., Inc., No. 3:09cv58, 2011 WL 2966862 (E.D. Va. July 21, 2011), the defendant was found to have committed spoliation “in bad faith” in a manner that constituted a “violation of duty… to the Court and the judicial process,” as follows:

  • The defendant, Kolon Industries Inc., was charged with misappropriation of trade secrets, conspiracy, information theft, and other allegations.
  • Within two days of receiving the plaintiff’s February 4, 2009 complaint, the defendant issued a litigation hold to upper-level employees. Several days after that, on February 10, a second hold notice was sent to all employees in English – even though most of Kolon’s staff members did not speak English.
  • Subsequently, many of the defendant’s key employees were found to have deleted files and emails that may have been relevant for discovery. After extensive investigation, the plaintiff’s expert discovered that the defendant had demonstrably deleted at least “17,811 files and email items” that should have been preserved for discovery.
  • The court determined that employees had deleted ESI “in bad faith,” conducting intentional spoliation and alteration of relevant evidence in direct contravention of the demands of discovery.
  • Even though many (but not all) of the documents were recovered (most from backup tape), the court rejected the defendant’s argument that “there can be no spoliation finding because many documents were recovered” and eventually produced, stating: “The fact that technology permits the undoing of spoliation does not change at all the fact that spoliation has occurred.”
  • Accordingly, the court leveled sanctions against the defendant, ordering it to pay the plaintiff’s legal fees, costs and expenses on this motion, and ordered an adverse inference instruction to the jury.  However, the court found that default judgment requested by the plaintiff was not appropriate, citing defendant’s attempts to place two litigation holds and the “good fortune that many deleted items were recoverable because of the preservation of Kolon’s backup tapes.”

So, what do you think? Were the sanctions appropriate, or should recovery of much of the deleted data have spared the defendant in this case? Have you ever been involved in a case where deleted electronic documents were recovered and sanctions avoided? Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Best Practices: When Collecting, Image is Not Always Everything

 

There was a commercial in the early 1990s for Canon cameras in which tennis player Andre Agassi uttered the quote that would haunt him for most of his early career – “Image is everything.”  The quote haunted him because, as a young player, he was considered to be more style than substance and unable to “win the big one” – a reputation that he ultimately overcame.

When it comes to eDiscovery preservation and collection, there are times when “Image is everything”, as in a forensic “image” of the media is necessary to preserve all potentially responsive ESI.  This is especially true when one party is suspected of deleting ESI to avoid producing it in Discovery.  For example, a forensic copy of a hard drive will include every byte of data on that drive, including data in unallocated space and file slack – these are locations on the drive that may contain data that was once actively used, but is now available to be overwritten after that data was “deleted”.

However, forensic imaging of media is usually not necessary for Discovery purposes. When it is necessary, the parties (usually in coordination with the court) must establish a protocol for how that inspection will take place. This protocol must be conducted in a manner that is verifiable and is usually conducted by an experienced professional, trained to collect data in a forensically sound manner and qualified to testify in court to that process if required.

For most cases, collection involves straightforward copying of the active targeted ESI as it exists on the producing party’s system.  However, to maintain the integrity of the metadata, not just any means of copying will do.  Copying files with “drag and drop” using Windows Explorer may get the files from one place to another, but key metadata (such as file creation date, which reflects the date of the copy, NOT the original) may be changed.

Fortunately when doing a targeted collection, there are several applications that, if used correctly, will copy files quickly and effectively while preserving the metadata.  Here are a few:

  • SafeCopy 2: Easy to use file copy utility created by Pinpoint Labs specifically for eDiscovery.
  • Robocopy: Microsoft utility for copying files from one location to another.
  • Upcopy: An “intelligent” file copy utility specifically suited for eDiscovery.

Also, FTK® Imager is an imaging and forensic image preview tool that is a free download and part of AccessData’s Forensic Toolkit®.  FTK® Imager also has the option to forensically acquire specific files using the custom content image option.

With any of these utilities, you can support the targeted collection needs for most cases.

So, what do you think? Have you used any of these utilities for eDiscovery collection?  Please share any comments you might have or if you'd like to know more about a particular topic.