SlideShare a Scribd company logo
1 of 37
What Every Attorney Needs to Know
Regarding Document Retention,
Legal Holds and Spoliation
presented by
Andrew Pearce & Michael Curran
BoyarMiller
713.850.7766
apearce@boyarmiller.com
Flex Discovery
512.291.2910
mcurran@flexdiscovery.com
Increasing Amount of Electronic Data
• Amount of video uploaded to YouTube 48 hours
every minute
• Number of emails sent and received per day 112 emails
by the average corporate user
• Number of email accounts worldwide 3.46 million
• Numbers of users on Facebook by 800+ million
the end of 2011
• Number of photos hosted on Flickr 6 billion
• Estimated number of photos on Facebook 100 billion
by mid-2011
Spoliation Sanctions on the Rise
The Need for a Social Media Policy
Purposes of a social media policy include:
• Educate your workforce on the various
types of social media outlets
• Determine how social media can be used
to further your company's business
interests
• Establish guidelines for using social
media consistent with your company's
core values and/or code of conduct
The Need for a Document Retention Policy
• Maintain necessary documents for business use
• Preserve and protect critical records
• Maintain legal compliance
• Minimize potential spoliation risks in the context
of litigation
• Control and manage the costs of both record
retention and record destruction
• Ensure consistent application of both record
retention and record destruction
• Retention & Archival
– Maintain necessary documents for business use;
– 79% of companies in the U.S. have a document retention policy
• Legal Hold
– 53% of companies have a mechanism in place to suspend their organization’s document retention policy
– Almost one quarter (24%) of companies do not possess a legal hold tool
• Confidence & Defensibility
– 54% of companies believe that their ESI discovery strategy for responding to litigation or regulatory matters is
repeatable and defensible.
– IT (91%) is more confident than legal (73%) in the defensibility of their archiving platform
• ESI Discovery
– 52% of companies in the US have an ESI strategy for responding to litigation or investigatory matters
• Testing & Repeatability
– 38% of respondents have tested their policies
– 45% of respondents do not know if their policies have been tested
• Updates & Follow-Up
– 55% of companies either have not updated policies at all or do not know if updates have occurred
Figures according to: http://www.krollontrack.com/library/CMSWire_MarisaPeacock_100410.pdf
By the numbers…
Business Considerations
• Contractual obligations with customers or suppliers
• Keep the information necessary to run the business
• Delete the “unnecessary” information
• Consider storage options
– account for every format of record
– account for cost of storage
– account for cost of search and retrieval
Legal Considerations when Drafting an ESI Policy
• Sarbanes Oxley
• Health Information Privacy Act
• Health Insurance Portability and Accountability Act
• OSHA
• Litigation history
• Average retention period ranges from 3 to 7 years
Data Retention Policies Should
• State the purpose of the policy
• Define who is affected by the policy
• Identify what type of data and electronic systems are
covered by the policy
• Define key terms (especially legal and technical terminology)
• Describe the requirements in detail from the legal, business
and personal perspectives
• Outline the procedures for ensuring data is properly
retained
• Outline the procedures for ensuring data is properly
destroyed
Types of Data and Records to be Covered
• Electronically stored information includes:
– Emails
– Text Messages
– Other business related information generated, stored, or transmitted via a
personal computer, laptop, PDA, cellular phone, or other electronic voice
and data communications devices
• Electronically stored information also includes “embedded
data” or “embedded edits” and “meta-data”
Electronic Information Systems
What Companies Need to Know:
• The type of information that is created by
their computer systems
• How that information is stored
• Where the information is stored
• How long the information is stored
• How the information is accessed
• How the information is overwritten, deleted,
and destroyed during the normal operation
of the system
Measures to Take when Drafting an ESI Policy
• Inventory all electronic storage systems and gain an understanding of
where information is located and how it is stored and generated on the
various systems
• Implement retention and destruction policies for electronic records.
Implement procedures for placing a “litigation hold” on any electronic
records that may be relevant to litigation and discoverable in litigation
including notification procedures to ensure that ESI is not overwritten or
deleted (commonly called “Preservation Notices”)
• A Preservation Notice must be sent out to all employees
who may have or have access to relevant information
• Once a Preservation Notice is issued, document destruction
must cease for all classes of documents that may contain
relevant information
• Educate and train employees on policies relating to
electronic records and compliance with Preservation Notices
• Involve IT personnel in designing policies and training
employees to ensure that IT personnel understand the
objectives and consequences
Measures to Take when Drafting an ESI Policy
Legal Hold
Where Do Legal Holds Fit In?
Identification, Preservation and Collection
• Locating potential sources of ESI
• Various media types, names, dates, etc.
Identification
• Notices to opposing party and internally (litigation hold)
• Watch out for deletions
• Meet & Confer
Preservation
Collection
• Forensic Images
• Chain of Custody
• Step 1: Trigger Events
• Step 2: Analyze the Trigger Event
• Step 3: Define the Scope
• Step 4: Implementation
• Step 5: Enforcement
• Step 6: Modification
• Step 7: Monitor and Remove
“Seven Steps for Legal Holds of ESI and Other Documents”
(ARMA International 2009) by John Isaza and John Jablonski.
7 Step Program for Legal Holds
Trigger Events
• Zubulake v. UBS Warburg LLC, 220
F.R.D. 212, 217 (S.D.N.Y. 2003)
(“Zubulake IV”)
― Duty attaches “at the time that litigation was
reasonably anticipated.”
• Consider the Work Product Privilege
standard
• Rimkus Consulting Grp., Inc. v. Cammarata, 688 F.
Supp. 2d 598, 613 (S.D. Tex. 2010)
― Reasonableness and Proportionality
• Sedona factors include:
― Nature of the issues raised in the matter
― Experience in similar circumstances
― Amount in controversy
• Federal Rule 26 Committee Notes:
― Identification of sources of ESI as not reasonably accessible does not
relieve the duty to preserve
― Duty depends on the circumstances of each case
Scope of Preservation
Green v. Blitz U.S.A., Inc., 2011 WL
806011 (E.D. Tex. Mar. 1, 2011)
• Single, unqualified employee asked
for records
― As computer illiterate as they get
― No searches, no IT involvement, no legal
hold
• $250,000 added to settlement with
plaintiff
• $500,000 “purging” sanction
― Provide copy of order in all cases in last 2
years and next 5 years
What Not to Do
• Litigation Response Team
• Where is ESI located?
― Servers, backup tapes, laptops,
mobile devices
― Ignorance is no excuse
• Well thought out plans
minimize spoliation
• Proactive approach reduces
preservation costs
Prepare in Advance
Next ESI Steps After Legal Hold
Litigate
Case
Dismissed
Settle
Expectation
of Claim:
Legal Hold
Company
Sued
Lawsuit
Dropped
Identification
Preservation
Data
Created
& Retained
Processing,
Analysis,
Review
Meet and
Confer Trial
Settle
Production
Spoliation - Definition
Spoliation - the improper destruction of evidence relevant to a
case.
“Intentional spoliation of evidence relevant to a case raises a
presumption that the evidence would have been unfavorable to
the cause of the spoliator.”
However, the presumption may be rebutted if the alleged
spoliator shows that the “evidence in question was not
destroyed with fraudulent intent or purpose.”
Spoliation - Purpose
The purpose of the spoliation rule is to prevent a party from
subverting the “discovery process and the fair administration of
justice simply by destroying evidence of an adverse claim.”
Once a party is aware of a potential claim, that party incurs a
“duty to exercise reasonable care to preserve information
relevant to that claim.”
If a party breaches that duty by intentionally or negligently
failing to preserve relevant evidence, that party may be held
accountable for its loss.” Such accountability may be achieved
through sanctions or a spoliation instruction.
Fed. R. Civ. P. 34 - Comments
• The amendment to Rule 34(b) permits the requesting party to designate
the form or forms in which it wants electronically stored information
produced
• The form of production is more important to the exchange of electronically
stored information than of hard-copy materials
• Using current technology, for example, a party might be called upon to
produce word processing documents, e-mail messages, electronic
spreadsheets, different image or sound files, and material from databases.
Requiring that such diverse types of electronically stored information all be
produced in the same form could prove impossible, and even if possible
could increase the cost and burdens of producing and using the
information.
• The rule therefore provides that the requesting party may ask for different
forms of production for different types of electronically stored information
Fed. R. Civ. P. 26(b)(2)(B)
• A party need not provide discovery of electronically stored
information from sources that the party identifies as not
reasonably accessible because of undue burden
• Examples of data not reasonably accessible include:
– backup tapes intended for disaster recovery purposes
– legacy data that remains from obsolete systems and is unintelligible on
successor systems
– data that was deleted but remains in fragmented form
– databases designed to create particular information in certain ways and that
cannot readily create other types or forms of information
Tex. R. Civ. P. 196.4
• A requesting party must specifically identify the requested
information and also specify the form in which that data
should be produced
• Unless otherwise ordered, the responding party need only
produce data that is reasonably available in the ordinary
course of business in reasonably usable form
• For any electronic data requiring extraordinary steps for
retrieval or production, the court should enter a cost-
shifting order directing the requesting party to pay the
reasonable expenses
Fed. R. Civ. P. 34 – Comments (cont’d)
• A party that responds to a discovery request by simply producing
electronically stored information in a form of its choice, without
identifying that form in advance of the production in the response
required by Rule 34(b), runs a risk that the requesting party can show
that the produced form is not reasonably usable and that it is entitled to
production of some or all of the information in an additional form
• Under some circumstances, the responding party may need to provide
some reasonable amount of technical support, information on
application software, or other reasonable assistance to enable the
requesting party to use the information
• If the responding party ordinarily maintains the information it is
producing in a way that makes it searchable by electronic means, the
information should not be produced in a form that removes or
significantly degrades this feature
Spoliation – Court Considerations
• Whether a duty existed to preserve the evidence
• Whether the evidence was negligently or intentionally
spoliated
• Whether the spoliation prejudiced the other party's case
Whether a Duty Existed
A party knows or reasonably should know that there is a
substantial chance that a claim will be filed and that evidence in
its possession will be material and relevant to that claim.
The Texas Supreme Court has made clear that actual notice of
the potential for litigation is not required; instead, “common
sense dictates that a party may reasonably anticipate suit being
filed….before the plaintiff manifests an intent to sue.”
Spoliation - Evidence
Whether Evidence was negligently or intentionally spoliated?
• A spoliator can defend against an allegation of negligent or
intentional destruction of evidence by providing other
explanations for the destruction (such as the destruction
was beyond the spoliator’s control or done in the ordinary
course of business)
• BUT, if the duty to preserve evidence arises before the
destruction, such defenses will not excuse the spoliation
Spoliation - Prejudice
Whether the spoliation prejudiced the other party’s case? Texas courts
analyze a variety of issues, including:
• The relevancy of the missing evidence
• The harmful effect of the evidence
• The availability of other evidence to take the place of the missing
information”
The most important factor for a court to consider is “the destroyed
evidence's relevancy,” but a court should also consider “whether the
destroyed evidence was cumulative of other competent evidence that a
party can use in place of the destroyed evidence, and whether the destroyed
evidence supports key issues in the case.”
Spoliation – Prejudice (cont’d)
The mere fact that evidence was destroyed is some evidence of its relevance,
and when dealing with intentional destruction of evidence, a court should
find the destructed evidence was relevant and harmful to the spoliator’s case
absent evidence to the contrary.
If the trial court finds the existence of a duty, a breach and a prejudice to the
other party, it must then “consider what remedy is warranted by the
circumstances of the case” and, in doing so, is “accorded broad discretion.”
In sum, a party is entitled to a remedy when the spoliation hinders is ability
to present its case or defense.
What a Requesting Party Must Show
• It requested the missing evidence and pursued a court order
to compel its production
• The missing evidence is relevant
• There is no other evidence available to replace the missing
evidence
• The missing evidence supports key issues in the case
What is the Appropriate Sanction?
• The court has broad discretion in determining the
appropriate sanction or in issuing a spoliation presumption
instruction
• The most severe sanction—dismissing the action or
rendering a default judgment against the spoliator—is
warranted when the spoliator’s conduct was egregious, the
prejudice to the non-spoliator was great, and imposing a
lesser sanction would be ineffective to cure the prejudice
Form of a Spoliation Instruction
A spoliation instruction can be given in one of two forms,
depending on the severity of prejudice resulting from the
destruction:
• A rebuttable presumption that the spoliator has either
negligently or intentionally destroyed evidence and,
therefore, the jury should presume the destroyed evidence
was unfavorable to the spoliator
• An adverse presumption that the evidence would have been
unfavorable to the spoliator
Questions?
presented by
Andrew Pearce & Michael Curran
BoyarMiller
713.850.7766
apearce@boyarmiller.com
Flex Discovery
512.291.2910
mcurran@flexdiscovery.com

More Related Content

What's hot

Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...Rabelani Dagada
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationat MicroFocus Italy ❖✔
 
Electronic Records Management An Overview
Electronic Records Management An OverviewElectronic Records Management An Overview
Electronic Records Management An OverviewKen Matthews
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 

What's hot (18)

Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformation
 
Electronic Records Management An Overview
Electronic Records Management An OverviewElectronic Records Management An Overview
Electronic Records Management An Overview
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
S719a
S719aS719a
S719a
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Pricavy issues
Pricavy issuesPricavy issues
Pricavy issues
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 

Similar to What Every Attorney Needs to Know About Document Retention

BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeBoyarMiller
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller
 
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayThe Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayRob Robinson
 
HNBA Boston - eDiscovery
HNBA Boston - eDiscoveryHNBA Boston - eDiscovery
HNBA Boston - eDiscoveryAbel Cruz
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations Swarupa Rani Sahu
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
E Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersE Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersFred Travis
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentBill Lisse
 
ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation Robbie Hilson
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 

Similar to What Every Attorney Needs to Know About Document Retention (20)

BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
 
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayThe Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
The Litigation Hold – Systems, Processes and Challenges | Daniel S. Day
 
HNBA Boston - eDiscovery
HNBA Boston - eDiscoveryHNBA Boston - eDiscovery
HNBA Boston - eDiscovery
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations
 
Hiring and firing in the digital age
Hiring and firing in the digital ageHiring and firing in the digital age
Hiring and firing in the digital age
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
E Discovery Risks for Risk Managers
E Discovery Risks for Risk ManagersE Discovery Risks for Risk Managers
E Discovery Risks for Risk Managers
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 

More from BoyarMiller

Key Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldKey Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldBoyarMiller
 
Women's Event Takeaways
Women's Event TakeawaysWomen's Event Takeaways
Women's Event TakeawaysBoyarMiller
 
2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuideBoyarMiller
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller
 
Information & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesInformation & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesBoyarMiller
 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideBoyarMiller
 
Acc oct 22 2019 presentation
Acc oct 22 2019 presentationAcc oct 22 2019 presentation
Acc oct 22 2019 presentationBoyarMiller
 
Acc oct 8 2019 presentation
Acc oct 8 2019 presentationAcc oct 8 2019 presentation
Acc oct 8 2019 presentationBoyarMiller
 
ALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesBoyarMiller
 
BoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller
 
2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs2019 Information & Insights For Entrepreneurs
2019 Information & Insights For EntrepreneursBoyarMiller
 
BoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller
 
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller
 
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller
 
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation""Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation"BoyarMiller
 
BoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller
 
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo WorldBoyarMiller
 
BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller
 
#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online WorldBoyarMiller
 

More from BoyarMiller (20)

Key Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldKey Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI World
 
Women's Event Takeaways
Women's Event TakeawaysWomen's Event Takeaways
Women's Event Takeaways
 
2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptx
 
Information & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesInformation & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and Employees
 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguide
 
Acc oct 22 2019 presentation
Acc oct 22 2019 presentationAcc oct 22 2019 presentation
Acc oct 22 2019 presentation
 
Acc oct 8 2019 presentation
Acc oct 8 2019 presentationAcc oct 8 2019 presentation
Acc oct 8 2019 presentation
 
ALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of Leases
 
BoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBook
 
2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs
 
BoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of Employment
 
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
 
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
 
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation""Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
 
BoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appeal
 
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
 
BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018
 
#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World
 

Recently uploaded

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 

Recently uploaded (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 

What Every Attorney Needs to Know About Document Retention

  • 1. What Every Attorney Needs to Know Regarding Document Retention, Legal Holds and Spoliation presented by Andrew Pearce & Michael Curran BoyarMiller 713.850.7766 apearce@boyarmiller.com Flex Discovery 512.291.2910 mcurran@flexdiscovery.com
  • 2. Increasing Amount of Electronic Data • Amount of video uploaded to YouTube 48 hours every minute • Number of emails sent and received per day 112 emails by the average corporate user • Number of email accounts worldwide 3.46 million • Numbers of users on Facebook by 800+ million the end of 2011 • Number of photos hosted on Flickr 6 billion • Estimated number of photos on Facebook 100 billion by mid-2011
  • 4. The Need for a Social Media Policy Purposes of a social media policy include: • Educate your workforce on the various types of social media outlets • Determine how social media can be used to further your company's business interests • Establish guidelines for using social media consistent with your company's core values and/or code of conduct
  • 5. The Need for a Document Retention Policy • Maintain necessary documents for business use • Preserve and protect critical records • Maintain legal compliance • Minimize potential spoliation risks in the context of litigation • Control and manage the costs of both record retention and record destruction • Ensure consistent application of both record retention and record destruction
  • 6. • Retention & Archival – Maintain necessary documents for business use; – 79% of companies in the U.S. have a document retention policy • Legal Hold – 53% of companies have a mechanism in place to suspend their organization’s document retention policy – Almost one quarter (24%) of companies do not possess a legal hold tool • Confidence & Defensibility – 54% of companies believe that their ESI discovery strategy for responding to litigation or regulatory matters is repeatable and defensible. – IT (91%) is more confident than legal (73%) in the defensibility of their archiving platform • ESI Discovery – 52% of companies in the US have an ESI strategy for responding to litigation or investigatory matters • Testing & Repeatability – 38% of respondents have tested their policies – 45% of respondents do not know if their policies have been tested • Updates & Follow-Up – 55% of companies either have not updated policies at all or do not know if updates have occurred Figures according to: http://www.krollontrack.com/library/CMSWire_MarisaPeacock_100410.pdf By the numbers…
  • 7. Business Considerations • Contractual obligations with customers or suppliers • Keep the information necessary to run the business • Delete the “unnecessary” information • Consider storage options – account for every format of record – account for cost of storage – account for cost of search and retrieval
  • 8. Legal Considerations when Drafting an ESI Policy • Sarbanes Oxley • Health Information Privacy Act • Health Insurance Portability and Accountability Act • OSHA • Litigation history • Average retention period ranges from 3 to 7 years
  • 9. Data Retention Policies Should • State the purpose of the policy • Define who is affected by the policy • Identify what type of data and electronic systems are covered by the policy • Define key terms (especially legal and technical terminology) • Describe the requirements in detail from the legal, business and personal perspectives • Outline the procedures for ensuring data is properly retained • Outline the procedures for ensuring data is properly destroyed
  • 10. Types of Data and Records to be Covered • Electronically stored information includes: – Emails – Text Messages – Other business related information generated, stored, or transmitted via a personal computer, laptop, PDA, cellular phone, or other electronic voice and data communications devices • Electronically stored information also includes “embedded data” or “embedded edits” and “meta-data”
  • 11. Electronic Information Systems What Companies Need to Know: • The type of information that is created by their computer systems • How that information is stored • Where the information is stored • How long the information is stored • How the information is accessed • How the information is overwritten, deleted, and destroyed during the normal operation of the system
  • 12. Measures to Take when Drafting an ESI Policy • Inventory all electronic storage systems and gain an understanding of where information is located and how it is stored and generated on the various systems • Implement retention and destruction policies for electronic records. Implement procedures for placing a “litigation hold” on any electronic records that may be relevant to litigation and discoverable in litigation including notification procedures to ensure that ESI is not overwritten or deleted (commonly called “Preservation Notices”)
  • 13. • A Preservation Notice must be sent out to all employees who may have or have access to relevant information • Once a Preservation Notice is issued, document destruction must cease for all classes of documents that may contain relevant information • Educate and train employees on policies relating to electronic records and compliance with Preservation Notices • Involve IT personnel in designing policies and training employees to ensure that IT personnel understand the objectives and consequences Measures to Take when Drafting an ESI Policy
  • 15. Where Do Legal Holds Fit In?
  • 16. Identification, Preservation and Collection • Locating potential sources of ESI • Various media types, names, dates, etc. Identification • Notices to opposing party and internally (litigation hold) • Watch out for deletions • Meet & Confer Preservation Collection • Forensic Images • Chain of Custody
  • 17. • Step 1: Trigger Events • Step 2: Analyze the Trigger Event • Step 3: Define the Scope • Step 4: Implementation • Step 5: Enforcement • Step 6: Modification • Step 7: Monitor and Remove “Seven Steps for Legal Holds of ESI and Other Documents” (ARMA International 2009) by John Isaza and John Jablonski. 7 Step Program for Legal Holds
  • 18. Trigger Events • Zubulake v. UBS Warburg LLC, 220 F.R.D. 212, 217 (S.D.N.Y. 2003) (“Zubulake IV”) ― Duty attaches “at the time that litigation was reasonably anticipated.” • Consider the Work Product Privilege standard
  • 19. • Rimkus Consulting Grp., Inc. v. Cammarata, 688 F. Supp. 2d 598, 613 (S.D. Tex. 2010) ― Reasonableness and Proportionality • Sedona factors include: ― Nature of the issues raised in the matter ― Experience in similar circumstances ― Amount in controversy • Federal Rule 26 Committee Notes: ― Identification of sources of ESI as not reasonably accessible does not relieve the duty to preserve ― Duty depends on the circumstances of each case Scope of Preservation
  • 20. Green v. Blitz U.S.A., Inc., 2011 WL 806011 (E.D. Tex. Mar. 1, 2011) • Single, unqualified employee asked for records ― As computer illiterate as they get ― No searches, no IT involvement, no legal hold • $250,000 added to settlement with plaintiff • $500,000 “purging” sanction ― Provide copy of order in all cases in last 2 years and next 5 years What Not to Do
  • 21. • Litigation Response Team • Where is ESI located? ― Servers, backup tapes, laptops, mobile devices ― Ignorance is no excuse • Well thought out plans minimize spoliation • Proactive approach reduces preservation costs Prepare in Advance
  • 22. Next ESI Steps After Legal Hold Litigate Case Dismissed Settle Expectation of Claim: Legal Hold Company Sued Lawsuit Dropped Identification Preservation Data Created & Retained Processing, Analysis, Review Meet and Confer Trial Settle Production
  • 23. Spoliation - Definition Spoliation - the improper destruction of evidence relevant to a case. “Intentional spoliation of evidence relevant to a case raises a presumption that the evidence would have been unfavorable to the cause of the spoliator.” However, the presumption may be rebutted if the alleged spoliator shows that the “evidence in question was not destroyed with fraudulent intent or purpose.”
  • 24. Spoliation - Purpose The purpose of the spoliation rule is to prevent a party from subverting the “discovery process and the fair administration of justice simply by destroying evidence of an adverse claim.” Once a party is aware of a potential claim, that party incurs a “duty to exercise reasonable care to preserve information relevant to that claim.” If a party breaches that duty by intentionally or negligently failing to preserve relevant evidence, that party may be held accountable for its loss.” Such accountability may be achieved through sanctions or a spoliation instruction.
  • 25. Fed. R. Civ. P. 34 - Comments • The amendment to Rule 34(b) permits the requesting party to designate the form or forms in which it wants electronically stored information produced • The form of production is more important to the exchange of electronically stored information than of hard-copy materials • Using current technology, for example, a party might be called upon to produce word processing documents, e-mail messages, electronic spreadsheets, different image or sound files, and material from databases. Requiring that such diverse types of electronically stored information all be produced in the same form could prove impossible, and even if possible could increase the cost and burdens of producing and using the information. • The rule therefore provides that the requesting party may ask for different forms of production for different types of electronically stored information
  • 26. Fed. R. Civ. P. 26(b)(2)(B) • A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden • Examples of data not reasonably accessible include: – backup tapes intended for disaster recovery purposes – legacy data that remains from obsolete systems and is unintelligible on successor systems – data that was deleted but remains in fragmented form – databases designed to create particular information in certain ways and that cannot readily create other types or forms of information
  • 27. Tex. R. Civ. P. 196.4 • A requesting party must specifically identify the requested information and also specify the form in which that data should be produced • Unless otherwise ordered, the responding party need only produce data that is reasonably available in the ordinary course of business in reasonably usable form • For any electronic data requiring extraordinary steps for retrieval or production, the court should enter a cost- shifting order directing the requesting party to pay the reasonable expenses
  • 28. Fed. R. Civ. P. 34 – Comments (cont’d) • A party that responds to a discovery request by simply producing electronically stored information in a form of its choice, without identifying that form in advance of the production in the response required by Rule 34(b), runs a risk that the requesting party can show that the produced form is not reasonably usable and that it is entitled to production of some or all of the information in an additional form • Under some circumstances, the responding party may need to provide some reasonable amount of technical support, information on application software, or other reasonable assistance to enable the requesting party to use the information • If the responding party ordinarily maintains the information it is producing in a way that makes it searchable by electronic means, the information should not be produced in a form that removes or significantly degrades this feature
  • 29. Spoliation – Court Considerations • Whether a duty existed to preserve the evidence • Whether the evidence was negligently or intentionally spoliated • Whether the spoliation prejudiced the other party's case
  • 30. Whether a Duty Existed A party knows or reasonably should know that there is a substantial chance that a claim will be filed and that evidence in its possession will be material and relevant to that claim. The Texas Supreme Court has made clear that actual notice of the potential for litigation is not required; instead, “common sense dictates that a party may reasonably anticipate suit being filed….before the plaintiff manifests an intent to sue.”
  • 31. Spoliation - Evidence Whether Evidence was negligently or intentionally spoliated? • A spoliator can defend against an allegation of negligent or intentional destruction of evidence by providing other explanations for the destruction (such as the destruction was beyond the spoliator’s control or done in the ordinary course of business) • BUT, if the duty to preserve evidence arises before the destruction, such defenses will not excuse the spoliation
  • 32. Spoliation - Prejudice Whether the spoliation prejudiced the other party’s case? Texas courts analyze a variety of issues, including: • The relevancy of the missing evidence • The harmful effect of the evidence • The availability of other evidence to take the place of the missing information” The most important factor for a court to consider is “the destroyed evidence's relevancy,” but a court should also consider “whether the destroyed evidence was cumulative of other competent evidence that a party can use in place of the destroyed evidence, and whether the destroyed evidence supports key issues in the case.”
  • 33. Spoliation – Prejudice (cont’d) The mere fact that evidence was destroyed is some evidence of its relevance, and when dealing with intentional destruction of evidence, a court should find the destructed evidence was relevant and harmful to the spoliator’s case absent evidence to the contrary. If the trial court finds the existence of a duty, a breach and a prejudice to the other party, it must then “consider what remedy is warranted by the circumstances of the case” and, in doing so, is “accorded broad discretion.” In sum, a party is entitled to a remedy when the spoliation hinders is ability to present its case or defense.
  • 34. What a Requesting Party Must Show • It requested the missing evidence and pursued a court order to compel its production • The missing evidence is relevant • There is no other evidence available to replace the missing evidence • The missing evidence supports key issues in the case
  • 35. What is the Appropriate Sanction? • The court has broad discretion in determining the appropriate sanction or in issuing a spoliation presumption instruction • The most severe sanction—dismissing the action or rendering a default judgment against the spoliator—is warranted when the spoliator’s conduct was egregious, the prejudice to the non-spoliator was great, and imposing a lesser sanction would be ineffective to cure the prejudice
  • 36. Form of a Spoliation Instruction A spoliation instruction can be given in one of two forms, depending on the severity of prejudice resulting from the destruction: • A rebuttable presumption that the spoliator has either negligently or intentionally destroyed evidence and, therefore, the jury should presume the destroyed evidence was unfavorable to the spoliator • An adverse presumption that the evidence would have been unfavorable to the spoliator
  • 37. Questions? presented by Andrew Pearce & Michael Curran BoyarMiller 713.850.7766 apearce@boyarmiller.com Flex Discovery 512.291.2910 mcurran@flexdiscovery.com