ig008 top 8 e-d fixes infographic_final

1
THE FIX Contact Exterro to learn how our e-discovery software solution can help solve these common e-discovery problems. www.EXTERRO.com © 2014, Exterro, Inc. All rights reserved. ID# IG008-1014 4145 SW Watson Ave., Suite 400 // Beaverton, OR 97005 1.877.EXTERRO // (p) 503.501.5100 // (f) 1.866.408.7310 // EXTERRO.COM “[B]y failing to retain any documentation, a defendant may lose its ability to credibly defend claims asserted against it, and it may open avenues of third party discovery which would have been closed had the defendant retained documents consistent with standard business practices, and thereby be considered a reliable source of the relevant discovery.” Peter Kiewit Sons, Inc. v. Wall Street Equity Group, Inc. (D. Neb. 2011). Lack of Document Retention Policy "[T]he failure to issue a written litigation hold in a timely manner amounts to gross negligence." Pension Committee of the University of Montreal Pension Plan v. Banc of America Securities, LLC (S.D.N.Y. 2010). No Wrien Legal Hold # 2 Court cited the defendants' failure to identify a key custodian with potentially relevant evidence or preserve his files as one of the sanctionable activities. In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., (S.D. Ill. 2013). Failing to Identify Key Custodians Poor Documentation Judge Paul Grimm states “Defendants neither identified the keywords selected nor the qualifications of the persons who selected them to design a proper search; they failed to demonstrate that there was quality assurance testing; and when their production was challenged by the plaintiff, they failed to carry their burden of explaining what they had done and why it was sufficient.” Victor Stanley, Inc. v. Creative Pipe, Inc., (D. Md. 2008). Forgoing Custodian Interviews A special master determined that defendant did not perform any investigation of likely electronically stored information (ESI) sources for any of the custodians. Small v. University Medical Center of Southern Nevada, (D.Nev. 2014). Inadequate Privilege Protection With respect to the so-called “clawback” provision under Federal Rule of Evidence 502(d), “such a provision will permit the parties to conduct and respond to discovery in an expeditious manner, without the need for time- consuming and costly pre-production privilege reviews, and at the same time preserve the parties' rights to assert the attorney-client privilege or work product immunity.” Rajala v. McGuire Woods, LLP (D. Kan. Jan. 2, 2013). Insufficient Authentication “[T]he record being proffered must be shown to continue to be an accurate representation of the record that originally was created. Hence, the focus is not on the circumstances of the creation of the record, but rather on the circumstances of the preservation of the record during the time it is in the file so as to assure that the document being proffered is the same as the document that originally was created.” Lorraine v. Markel American Insurance Co. (D. Md. 2007). # 3 open ae # 5 # 1 # 6 # 7 Along With Best Practices to Fix Them Top 8 E-Discovery Problems Track legal hold acknowledgments and target non-compliant employees for escalation to their supervisors. THE FIX To properly identify key custodians, (1) Interview custodians to find additional/other custodians who may have responsive information, and (2) Integrate HR systems with legal hold software to keep an updated custodian list so key custodians are not missed. Establish and enforce a document retention policy that integrates with a legal hold system, enabling the suspension and resumption of the policy when the related matter has concluded. Document Retention Policy Legal Hold System THE FIX “The Court finds both defendants failed to ensure that the auto delete feature of their employee cell phones, company owned and personal, was disengaged for the purpose of preserving text messages and, as such, this allowed countless records to be destroyed.” In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., (S.D. Ill. 2013). Ignoring Mobile Devices # 8 THE FIX Develop and enforce workplace policies for all user and company-issued mobile devices. Consider investing in specialized technologies that allow for the easy extraction of mobile device data. THE FIX If admitting computer stored records, plan to authenticate the record by the most rigorous standard that may be applied. THE FIX Document all e-discovery activities in “judge friendly” reports. In addition to documenting what actions were taken and when, be sure to also capture why certain decisions were made. # 4 THE FIX Once litigation becomes likely, immediately issue custodians questionnaires to identify data sources that may have responsive ESI. THE FIX Pursue a 502(d) court order for all federal matters and use analytics to categorize and label likely privileged information. -OR- 502(d)

Upload: amber-bytheway

Post on 18-Aug-2015

20 views

Category:

Documents


0 download

TRANSCRIPT

THE FIX

Contact Exterro to learn how our e-discovery software solution can help solve these common e-discovery problems.

www.EXTERRO.com

© 2014, Exterro, Inc. All rights reserved. ID# IG008-10144145 SW Watson Ave., Suite 400 // Beaverton, OR 970051.877.EXTERRO // (p) 503.501.5100 // (f) 1.866.408.7310 // EXTERRO.COM

“[B]y failing to retain any documentation, a defendant may

lose its ability to credibly defend claims asserted against

it, and it may open avenues of third party discovery which

would have been closed had the defendant retained

documents consistent with standard business practices,

and thereby be considered a reliable source of the

relevant discovery.”

Peter Kiewit Sons, Inc. v. Wall Street Equity Group, Inc. (D. Neb. 2011).

Lack of Document Retention Policy

"[T]he failure to issue a written litigation hold in a timely

manner amounts to gross negligence."

Pension Committee of the University of Montreal Pension Plan v. Banc of America Securities, LLC (S.D.N.Y. 2010).

No Written Legal Hold#2

Court cited the defendants' failure to identify a key

custodian with potentially relevant evidence or preserve

his files as one of the sanctionable activities.

In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., (S.D. Ill. 2013).

Failing to Identify Key Custodians

Poor DocumentationJudge Paul Grimm states “Defendants neither identified

the keywords selected nor the qualifications of the persons

who selected them to design a proper search; they failed

to demonstrate that there was quality assurance testing;

and when their production was challenged by the plaintiff,

they failed to carry their burden of explaining what they

had done and why it was sufficient.”

Victor Stanley, Inc. v. Creative Pipe, Inc., (D. Md. 2008).

Forgoing Custodian InterviewsA special master determined that defendant did not

perform any investigation of likely electronically stored

information (ESI) sources for any of the custodians.

Small v. University Medical Center of Southern Nevada, (D.Nev. 2014).

Inadequate Privilege ProtectionWith respect to the so-called “clawback” provision under

Federal Rule of Evidence 502(d), “such a provision will

permit the parties to conduct and respond to discovery

in an expeditious manner, without the need for time-

consuming and costly pre-production privilege reviews,

and at the same time preserve the parties' rights to assert

the attorney-client privilege or work product immunity.”

Rajala v. McGuire Woods, LLP (D. Kan. Jan. 2, 2013).

Insufficient Authentication“[T]he record being proffered must be shown to continue

to be an accurate representation of the record that

originally was created. Hence, the focus is not on the

circumstances of the creation of the record, but rather

on the circumstances of the preservation of the record

during the time it is in the file so as to assure that the

document being proffered is the same as the document

that originally was created.”

Lorraine v. Markel American Insurance Co. (D. Md. 2007).

#3

openaccess

#5

#1

#6

#7

Along With Best Pract ices to F ix ThemTop 8 E-Discovery Problems

Track legal hold acknowledgments and target non-compliant employees for escalation

to their supervisors.

THE FIX

To properly identify key custodians, (1) Interview custodians to find additional/other custodians

who may have responsive information, and (2) Integrate HR systems with legal hold software to keep an updated custodian

list so key custodians are not missed.

Establish and enforce a document retention policy that integrates with a legal hold system,

enabling the suspension and resumption of the policy when the related matter has concluded.

Document Retention Policy

Legal Hold System

THE FIX

“The Court finds both defendants failed to ensure that

the auto delete feature of their employee cell phones,

company owned and personal, was disengaged for the

purpose of preserving text messages and, as such, this

allowed countless records to be destroyed.”

In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., (S.D. Ill. 2013).

Ignoring Mobile Devices#8 THE FIX

Develop and enforce workplace policies for all user and company-issued mobile devices. Consider investing in specialized technologies that allow

for the easy extraction of mobile device data.

THE FIX

If admitting computer stored records, plan to authenticate the record by the most rigorous

standard that may be applied.

THE FIX

Document all e-discovery activities in “judge friendly” reports. In addition to documenting

what actions were taken and when, be sure to also capture why certain decisions were made.

#4 THE FIX

Once litigation becomes likely, immediately issue custodians questionnaires to identify data

sources that may have responsive ESI.

THE FIX

Pursue a 502(d) court order for all federal matters and use analytics to categorize and label likely privileged information.

-OR-

502(d)