SlideShare une entreprise Scribd logo
1  sur  34
Recommind Proprietary & Confidential 
Lawyer Competency in 
the Age of eDiscovery
ACEDS Membership Benefits 
Training, Resources and Networking for the 
E-Discovery Community 
Exclusive News and Analysis 
Weekly Web Seminars 
Podcasts 
On-Demand Training 
Networking 
Resources 
Jobs Board & Career Center 
bits + bytes Newsletter 
CEDS Certification 
And Much More! 
“ACEDS provides an excellent, much needed forum to train, network and stay current on critical 
information.” 
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale 
Join Today! aceds.org/join
ENTER 
‘SUMMIT20’
Recommind Proprietary & Confidential 
Speakers 
Hon. Patrick Walsh 
U.S. Magistrate Judge 
Central District of CA 
Philip Favro 
Senior Discovery Counsel 
Recommind, Inc. 
Craig Ball 
Attorney & Forensic 
Technologist 
Craig D. Ball P.C.
Recommind Proprietary & Confidential 
Agenda 
1 
2 
3 
4 
5 
The Need for Technological Competence in eDiscovery 
The Law in 2014 on the Preservation and Production of ESI 
Safeguarding Client Confidences, Attorney Work Product, and the 
Lawyer-Client Privilege 
Affirmative Duties of Counsel in eDiscovery 
Resources / Q & A
The Need for Technological 
Competence in eDiscovery 
Recommind Proprietary & Confidential
The eDiscovery Competency Landscape in 2014 
“The landscape of litigation has forever 
changed, and there is no going back to 
a paper-centric world. Too many 
lawyers are like farriers after the advent 
of the automobile, grossly--even 
stubbornly--unprepared to deal with 
electronic evidence.” 
Craig Ball, Ten Things that Trouble Judges about e-Discovery, EDDE J., Autumn 2010, at 2 
Recommind Proprietary & Confidential
20th-Century Methods Won’t Satisfy 21st-Century Challenges 
“The biggest problem I see with 
electronic discovery is that lawyers are 
using 20th-century technology—that is, 
obtaining all of the documents, 
organizing them in folders, and trying to 
read and digest them—to address 21st-century 
Recommind Proprietary & Confidential 
production.” 
Patrick Walsh, Rethinking Civil Litigation in Federal District Court, 40 Litig. 6, 7 (2013)
eDiscovery Competency Requires Lawyers to Understand 
Technology and to Consider Alternative Methods 
“Practitioners need to embrace 
21st-century technology and trust 
that it will provide them with the 
best chance of obtaining the most 
critical information at the lowest 
cost.” 
Patrick Walsh, Rethinking Civil Litigation in Federal District Court, 40 Litig. 6, 7 (2013). 
See also MODEL RULES OF PROF’L CONDUCT R. 1.1 cmt. 8 (2013) 
Recommind Proprietary & Confidential
The Law in 2014 on the 
Preservation and Production 
of ESI 
Recommind Proprietary & Confidential
The Current Law on Preservation and Production in Discovery 
• The duty to preserve “includes an obligation 
to identify, locate, and maintain, information 
that is relevant to specific, predictable, and 
identifiable litigation.” 
• “Parties may obtain discovery regarding any 
nonprivileged matter that is relevant to any 
party’s claim or defense . . . subject to the 
limitations imposed by Rule 26(b)(2)(C).” 
FED. R. CIV. P. 26(b)(1); Apple v. Samsung, 881 F. Supp. 2d 1132, 1136-37 (N.D. Cal. 2012) 
Recommind Proprietary & Confidential
What Potentially Relevant Information Must Be Preserved & Produced? 
• Mobile Device Data 
• Cloud Stored ESI 
• Social Network Materials 
• Email 
• Unstructured Data 
• Legacy Data 
• Database ESI 
• Paper Documents 
• Backup Tapes 
Recommind Proprietary & Confidential
Preservation & Production of Relevant Mobile Device Data 
“Every one of the custodians were asked 
the explicit question do they use these 
devices for personal use — for work-related 
use, and they disavowed it, some 
multiple times. . . . several high priority 
custodians [later confirmed though] that 
they used their personal mobile devices 
for work-related purposes.” 
Small v. University Medical Center of Southern Nevada., Case No. 2:13-cv-00298- 
APG-PAL, *25 (D. Nev. Aug. 18, 2014) 
Recommind Proprietary & Confidential
Preservation & Production of Relevant Cloud Stored Data 
“Tellermate knew from the outset that its 
termination of the Browns was premised on 
their allegedly inadequate sales performance, 
making the performance of other sales 
managers or representatives crucial evidence 
in the case . . . . it should have been obvious 
from the outset that failing to preserve the 
integrity of [the salesforce.com] information 
would threaten the fairness of the judicial 
proceedings.” 
Brown v. Tellermate Holdings Ltd., Case No. 2:11-cv-1122 (S.D. Ohio July 1, 2014) 
Recommind Proprietary & Confidential
Regardless of Data Type, Overly Broad Requests are Improper 
“Plaintiffs argue they are entitled to 
inspect and image the cell phones of the 
individual defendants under the broad 
scope of discovery . . . the Court finds that 
the request as framed is overly broad and 
too intrusive for this stage of discovery.” 
Bakhit v. Safety Markings, Inc., No. 3:13-CV-1049 (JCH) (D. Conn., June 23, 2014) 
Recommind Proprietary & Confidential
What Search Methodologies are Acceptable in Discovery? 
Manual review, keywords, visualization, concept 
search, data clustering, predictive coding, etc. may be 
employed so long as productions made with these 
methodologies satisfy the discovery touchstones of: 
• Relevance 
• Proportionality 
• Reasonableness 
Fed. R. Civ. P. 26(b)(1); 26(b)(2)(3); 26(g)(1); Victor Stanley, Inc. v. Creative 
Pipe, Inc., 269 F.R.D. 497 (D. Md. 2010) 
Recommind Proprietary & Confidential
Safeguarding Client 
Confidences, Attorney 
Work Product, and the 
Lawyer-Client Privilege 
Recommind Proprietary & Confidential
Preserving Client Confidences and Secrets 
It is the duty of an attorney to . . . 
maintain inviolate the confidence, 
and at every peril to himself or 
herself to preserve the secrets, of 
his or her client. 
Recommind Proprietary & Confidential 
Cal Bus & Prof Code § 6068(e)(1)
Preventing Unauthorized Disclosures 
(c) A lawyer shall make 
reasonable efforts to 
prevent the inadvertent or 
unauthorized disclosure of, 
or unauthorized access to, 
information relating to the 
representation of a client. 
When transmitting a 
communication that includes 
information relating to the 
representation of a client, the 
lawyer must take reasonable 
precautions to prevent the 
information from coming into 
the hands of unintended 
recipients. 
MODEL RULES OF PROF’L CONDUCT R. 1.6 MODEL RULES OF PROF’L CONDUCT R. 1.6, cmt. 19 
Recommind Proprietary & Confidential
No Obligation to Disclose Non-Responsive Documents 
“The Steering Committee wants the 
whole seed set Biomet used for the 
algorithm's initial training. That 
request reaches well beyond the 
scope of any permissible discovery 
by seeking irrelevant or privileged 
documents used to tell the 
algorithm what not to find.” 
In re Biomet M2a Magnum Hip Implant Products Liability Litig. (Biomet II), 
No. 3:12-MD-2391, (N.D. Ind. Apr. 18, 2013) 
Recommind Proprietary & Confidential
The Attorney Work Product Doctrine 
• “Ordinarily, a party may not discover 
documents and tangible things that are 
prepared in anticipation of litigation or for 
trial by or for another party or its 
representative.” 
• “[Courts] must protect against disclosure 
of the mental impressions, conclusions, 
opinions, or legal theories of a party's 
attorney or other representative 
concerning the litigation.” 
Recommind Proprietary & Confidential 
FED. R. CIV. P. 26(b)(3)
Seed Sets and other Document Compilations May Reflect a 
Lawyer’s Conclusions, Opinions, & Legal Theories 
“In cases that involve reams of documents and 
extensive document discovery, the selection and 
compilation of documents is often more crucial 
than legal research. . . . We believe [counsel’s] 
selective review of [her clients’] numerous 
documents was based on her professional 
judgment of the issues and defenses involved in 
this case.” 
Shelton v. American Motors Corp., 805 F.2d 1323, 1329 (8th Cir. 1986) 
Recommind Proprietary & Confidential
Basic Elements of the Lawyer-Client Privilege 
• A confidential communication 
• Between the client and the lawyer 
• Made for the purpose of obtaining 
a legal opinion or advice 
Recommind Proprietary & Confidential
Text and Social Media Messages Generally Lack Confidentiality 
• Text and social media messages – 
including ostensibly private messages – 
may be accessed and monitored by third 
parties under the governing terms of 
service 
• “[I]f you have an idea or information that 
you would like to keep confidential . . . do 
not post it to any LinkedIn Group, into 
your Network Updates, or elsewhere on 
LinkedIn.” 
Inviting Scrutiny: How Technologies 
are Eroding the Attorney-Client 
Privilege, 20 Rich. J.L. & Tech. 2 (2014) 
Recommind Proprietary & Confidential
Cloud Providers May Lack Confidentiality 
• Providers of cloud computing services often have 
access and monitoring rights to a company’s cloud 
hosted data 
• Those rights may extend to third party companies 
that analyze customer data to help improve the 
provider’s level of service 
• Memorialized in service level agreements, those 
rights may very well destroy the confidentiality 
required to keep counsel’s discussions privileged 
Inviting Scrutiny: How Technologies are Eroding the Attorney-Client Privilege, 20 Rich. 
J.L. & Tech. 2 (2014) 
Recommind Proprietary & Confidential
Recommind Proprietary & Confidential 
Affirmative Duties of 
Counsel in eDiscovery
Affirmative Duties of Counsel in eDiscovery 
1. In-house counsel should gauge retained 
counsel’s eDiscovery competency on legal 
issues, technology, process, and strategy 
2. Retained counsel should ensure that it has 
access to and understanding of the client’s 
information retention policies and practices 
3. Retained counsel should confirm that the 
client has an effective litigation hold process 
and take steps to remedy any deficiencies 
Recommind Proprietary & Confidential
Recommind Proprietary & Confidential 
Resources
Recommind Proprietary & Confidential 
Resources 
Hon. Patrick J. Walsh, 
Rethinking Civil Litigation in Federal District Court, 
40 LITIG. 6, 7 (2013) 
Craig D. Ball, 
Ten Things that Trouble Judges about e-Discovery, 
EDDE J., Autumn 2010, at 2
Recommind Proprietary & Confidential 
Resources 
The Security Nat’l Bank of Sioux City, Iowa v. Abbott 
Laboratories, No. C 11-4017-MWB (W.D. Iowa July 28, 2014).
Recommind Proprietary & Confidential 
Resources 
Guidelines Regarding the Use of Predictive 
Coding 
http://www.ctrlinitiative.com/home/resources/ 
Model Stipulation and Order re Use of 
Predictive Coding 
http://www.ctrlinitiative.com/home/resources/
RESOURCES 
http://www.recommind.com/mind-over-matters 
Recommind Proprietary & Confidential
Q & A 
Recommind Proprietary & Confidential 33
Recommind Proprietary & Confidential 34 
Thank you!! 
Judge Patrick J. Walsh 
United States District Court 
Central District of California 
Craig Ball 
Craig D. Ball, P.C. 
(512) 514-0182 
craig@ball.net 
@CraigBall 
Philip J. Favro 
Recommind, Inc. 
(650) 714-9134 
phil.favro@recommind.com 
@philipfavro

Contenu connexe

Tendances

CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
Compute Forensics
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Rob Robinson
 

Tendances (20)

Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop
 
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
 
Understanding and Protecting Distributed Ledger Technology - Knobbe Practice ...
Understanding and Protecting Distributed Ledger Technology - Knobbe Practice ...Understanding and Protecting Distributed Ledger Technology - Knobbe Practice ...
Understanding and Protecting Distributed Ledger Technology - Knobbe Practice ...
 
Privacy in the Age of Big Data
Privacy in the Age of Big DataPrivacy in the Age of Big Data
Privacy in the Age of Big Data
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
Building a High Value Patent Portfolio: Where Strength Meets Quality
Building a High Value Patent Portfolio: Where Strength Meets QualityBuilding a High Value Patent Portfolio: Where Strength Meets Quality
Building a High Value Patent Portfolio: Where Strength Meets Quality
 
Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 Final
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Cloud security - Publication
Cloud security - Publication Cloud security - Publication
Cloud security - Publication
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
 
Distributed ledger technical research in central bank of brazil
Distributed ledger technical research in central bank of brazilDistributed ledger technical research in central bank of brazil
Distributed ledger technical research in central bank of brazil
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 

En vedette

5 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/25 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/2
Fabio Fumarola
 

En vedette (9)

Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
5 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/25 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/2
 
Ejemplo trabajo de adquisiciones, tema outsourcing 2012
Ejemplo trabajo de adquisiciones, tema outsourcing 2012Ejemplo trabajo de adquisiciones, tema outsourcing 2012
Ejemplo trabajo de adquisiciones, tema outsourcing 2012
 
bloedbad van munchen
bloedbad van munchenbloedbad van munchen
bloedbad van munchen
 
Lebron leadership skills
Lebron leadership skillsLebron leadership skills
Lebron leadership skills
 
You're losing money, and don't even know it: How to maximize your law firm ga...
You're losing money, and don't even know it: How to maximize your law firm ga...You're losing money, and don't even know it: How to maximize your law firm ga...
You're losing money, and don't even know it: How to maximize your law firm ga...
 
Editing small movie sequence
Editing small movie sequence Editing small movie sequence
Editing small movie sequence
 
Проект Закону України та постанови Кабінету Міністрів України по дерегуляції
Проект Закону України та постанови Кабінету Міністрів України по дерегуляціїПроект Закону України та постанови Кабінету Міністрів України по дерегуляції
Проект Закону України та постанови Кабінету Міністрів України по дерегуляції
 
Soc12
Soc12Soc12
Soc12
 

Similaire à Lawyer competency in the age of e-discovery

Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11
Eric Rudich, Ph.D.
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
Dan Michaluk
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
rlhicksjr
 

Similaire à Lawyer competency in the age of e-discovery (20)

ACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast SlidesACEDS-Recommind 1-28-15 Webcast Slides
ACEDS-Recommind 1-28-15 Webcast Slides
 
Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border Disputes
 
Ethics and our Electronic Toys
Ethics and our Electronic Toys Ethics and our Electronic Toys
Ethics and our Electronic Toys
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
OCBA Cloud 9: Cloud Computing and Ethics for Florida Attorneys
OCBA Cloud 9: Cloud Computing and Ethics for Florida AttorneysOCBA Cloud 9: Cloud Computing and Ethics for Florida Attorneys
OCBA Cloud 9: Cloud Computing and Ethics for Florida Attorneys
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
 

Plus de Logikcull.com

Plus de Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 

Lawyer competency in the age of e-discovery

  • 1. Recommind Proprietary & Confidential Lawyer Competency in the Age of eDiscovery
  • 2. ACEDS Membership Benefits Training, Resources and Networking for the E-Discovery Community Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More! “ACEDS provides an excellent, much needed forum to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale Join Today! aceds.org/join
  • 4. Recommind Proprietary & Confidential Speakers Hon. Patrick Walsh U.S. Magistrate Judge Central District of CA Philip Favro Senior Discovery Counsel Recommind, Inc. Craig Ball Attorney & Forensic Technologist Craig D. Ball P.C.
  • 5. Recommind Proprietary & Confidential Agenda 1 2 3 4 5 The Need for Technological Competence in eDiscovery The Law in 2014 on the Preservation and Production of ESI Safeguarding Client Confidences, Attorney Work Product, and the Lawyer-Client Privilege Affirmative Duties of Counsel in eDiscovery Resources / Q & A
  • 6. The Need for Technological Competence in eDiscovery Recommind Proprietary & Confidential
  • 7. The eDiscovery Competency Landscape in 2014 “The landscape of litigation has forever changed, and there is no going back to a paper-centric world. Too many lawyers are like farriers after the advent of the automobile, grossly--even stubbornly--unprepared to deal with electronic evidence.” Craig Ball, Ten Things that Trouble Judges about e-Discovery, EDDE J., Autumn 2010, at 2 Recommind Proprietary & Confidential
  • 8. 20th-Century Methods Won’t Satisfy 21st-Century Challenges “The biggest problem I see with electronic discovery is that lawyers are using 20th-century technology—that is, obtaining all of the documents, organizing them in folders, and trying to read and digest them—to address 21st-century Recommind Proprietary & Confidential production.” Patrick Walsh, Rethinking Civil Litigation in Federal District Court, 40 Litig. 6, 7 (2013)
  • 9. eDiscovery Competency Requires Lawyers to Understand Technology and to Consider Alternative Methods “Practitioners need to embrace 21st-century technology and trust that it will provide them with the best chance of obtaining the most critical information at the lowest cost.” Patrick Walsh, Rethinking Civil Litigation in Federal District Court, 40 Litig. 6, 7 (2013). See also MODEL RULES OF PROF’L CONDUCT R. 1.1 cmt. 8 (2013) Recommind Proprietary & Confidential
  • 10. The Law in 2014 on the Preservation and Production of ESI Recommind Proprietary & Confidential
  • 11. The Current Law on Preservation and Production in Discovery • The duty to preserve “includes an obligation to identify, locate, and maintain, information that is relevant to specific, predictable, and identifiable litigation.” • “Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense . . . subject to the limitations imposed by Rule 26(b)(2)(C).” FED. R. CIV. P. 26(b)(1); Apple v. Samsung, 881 F. Supp. 2d 1132, 1136-37 (N.D. Cal. 2012) Recommind Proprietary & Confidential
  • 12. What Potentially Relevant Information Must Be Preserved & Produced? • Mobile Device Data • Cloud Stored ESI • Social Network Materials • Email • Unstructured Data • Legacy Data • Database ESI • Paper Documents • Backup Tapes Recommind Proprietary & Confidential
  • 13. Preservation & Production of Relevant Mobile Device Data “Every one of the custodians were asked the explicit question do they use these devices for personal use — for work-related use, and they disavowed it, some multiple times. . . . several high priority custodians [later confirmed though] that they used their personal mobile devices for work-related purposes.” Small v. University Medical Center of Southern Nevada., Case No. 2:13-cv-00298- APG-PAL, *25 (D. Nev. Aug. 18, 2014) Recommind Proprietary & Confidential
  • 14. Preservation & Production of Relevant Cloud Stored Data “Tellermate knew from the outset that its termination of the Browns was premised on their allegedly inadequate sales performance, making the performance of other sales managers or representatives crucial evidence in the case . . . . it should have been obvious from the outset that failing to preserve the integrity of [the salesforce.com] information would threaten the fairness of the judicial proceedings.” Brown v. Tellermate Holdings Ltd., Case No. 2:11-cv-1122 (S.D. Ohio July 1, 2014) Recommind Proprietary & Confidential
  • 15. Regardless of Data Type, Overly Broad Requests are Improper “Plaintiffs argue they are entitled to inspect and image the cell phones of the individual defendants under the broad scope of discovery . . . the Court finds that the request as framed is overly broad and too intrusive for this stage of discovery.” Bakhit v. Safety Markings, Inc., No. 3:13-CV-1049 (JCH) (D. Conn., June 23, 2014) Recommind Proprietary & Confidential
  • 16. What Search Methodologies are Acceptable in Discovery? Manual review, keywords, visualization, concept search, data clustering, predictive coding, etc. may be employed so long as productions made with these methodologies satisfy the discovery touchstones of: • Relevance • Proportionality • Reasonableness Fed. R. Civ. P. 26(b)(1); 26(b)(2)(3); 26(g)(1); Victor Stanley, Inc. v. Creative Pipe, Inc., 269 F.R.D. 497 (D. Md. 2010) Recommind Proprietary & Confidential
  • 17. Safeguarding Client Confidences, Attorney Work Product, and the Lawyer-Client Privilege Recommind Proprietary & Confidential
  • 18. Preserving Client Confidences and Secrets It is the duty of an attorney to . . . maintain inviolate the confidence, and at every peril to himself or herself to preserve the secrets, of his or her client. Recommind Proprietary & Confidential Cal Bus & Prof Code § 6068(e)(1)
  • 19. Preventing Unauthorized Disclosures (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. When transmitting a communication that includes information relating to the representation of a client, the lawyer must take reasonable precautions to prevent the information from coming into the hands of unintended recipients. MODEL RULES OF PROF’L CONDUCT R. 1.6 MODEL RULES OF PROF’L CONDUCT R. 1.6, cmt. 19 Recommind Proprietary & Confidential
  • 20. No Obligation to Disclose Non-Responsive Documents “The Steering Committee wants the whole seed set Biomet used for the algorithm's initial training. That request reaches well beyond the scope of any permissible discovery by seeking irrelevant or privileged documents used to tell the algorithm what not to find.” In re Biomet M2a Magnum Hip Implant Products Liability Litig. (Biomet II), No. 3:12-MD-2391, (N.D. Ind. Apr. 18, 2013) Recommind Proprietary & Confidential
  • 21. The Attorney Work Product Doctrine • “Ordinarily, a party may not discover documents and tangible things that are prepared in anticipation of litigation or for trial by or for another party or its representative.” • “[Courts] must protect against disclosure of the mental impressions, conclusions, opinions, or legal theories of a party's attorney or other representative concerning the litigation.” Recommind Proprietary & Confidential FED. R. CIV. P. 26(b)(3)
  • 22. Seed Sets and other Document Compilations May Reflect a Lawyer’s Conclusions, Opinions, & Legal Theories “In cases that involve reams of documents and extensive document discovery, the selection and compilation of documents is often more crucial than legal research. . . . We believe [counsel’s] selective review of [her clients’] numerous documents was based on her professional judgment of the issues and defenses involved in this case.” Shelton v. American Motors Corp., 805 F.2d 1323, 1329 (8th Cir. 1986) Recommind Proprietary & Confidential
  • 23. Basic Elements of the Lawyer-Client Privilege • A confidential communication • Between the client and the lawyer • Made for the purpose of obtaining a legal opinion or advice Recommind Proprietary & Confidential
  • 24. Text and Social Media Messages Generally Lack Confidentiality • Text and social media messages – including ostensibly private messages – may be accessed and monitored by third parties under the governing terms of service • “[I]f you have an idea or information that you would like to keep confidential . . . do not post it to any LinkedIn Group, into your Network Updates, or elsewhere on LinkedIn.” Inviting Scrutiny: How Technologies are Eroding the Attorney-Client Privilege, 20 Rich. J.L. & Tech. 2 (2014) Recommind Proprietary & Confidential
  • 25. Cloud Providers May Lack Confidentiality • Providers of cloud computing services often have access and monitoring rights to a company’s cloud hosted data • Those rights may extend to third party companies that analyze customer data to help improve the provider’s level of service • Memorialized in service level agreements, those rights may very well destroy the confidentiality required to keep counsel’s discussions privileged Inviting Scrutiny: How Technologies are Eroding the Attorney-Client Privilege, 20 Rich. J.L. & Tech. 2 (2014) Recommind Proprietary & Confidential
  • 26. Recommind Proprietary & Confidential Affirmative Duties of Counsel in eDiscovery
  • 27. Affirmative Duties of Counsel in eDiscovery 1. In-house counsel should gauge retained counsel’s eDiscovery competency on legal issues, technology, process, and strategy 2. Retained counsel should ensure that it has access to and understanding of the client’s information retention policies and practices 3. Retained counsel should confirm that the client has an effective litigation hold process and take steps to remedy any deficiencies Recommind Proprietary & Confidential
  • 28. Recommind Proprietary & Confidential Resources
  • 29. Recommind Proprietary & Confidential Resources Hon. Patrick J. Walsh, Rethinking Civil Litigation in Federal District Court, 40 LITIG. 6, 7 (2013) Craig D. Ball, Ten Things that Trouble Judges about e-Discovery, EDDE J., Autumn 2010, at 2
  • 30. Recommind Proprietary & Confidential Resources The Security Nat’l Bank of Sioux City, Iowa v. Abbott Laboratories, No. C 11-4017-MWB (W.D. Iowa July 28, 2014).
  • 31. Recommind Proprietary & Confidential Resources Guidelines Regarding the Use of Predictive Coding http://www.ctrlinitiative.com/home/resources/ Model Stipulation and Order re Use of Predictive Coding http://www.ctrlinitiative.com/home/resources/
  • 33. Q & A Recommind Proprietary & Confidential 33
  • 34. Recommind Proprietary & Confidential 34 Thank you!! Judge Patrick J. Walsh United States District Court Central District of California Craig Ball Craig D. Ball, P.C. (512) 514-0182 craig@ball.net @CraigBall Philip J. Favro Recommind, Inc. (650) 714-9134 phil.favro@recommind.com @philipfavro