SlideShare una empresa de Scribd logo
1 de 3
Metadata Strategies
   in Litigation:



What You Don’t See
 Might Hurt You
                                          By Albert Kassis


Introduction
   Under Amended Rules of Civil Procedure Rule 26(f), the discovery conference require-
ment must now encompass a discussion of electronic discovery. The Advisory Notes fur-
ther suggest that the parties should discuss whether and how metadata should be ex-
changed. This article discusses how metadata may be used after the hurdle of whether
there is a “particularized need” is established, as some courts require.

Benefits of Metadata
   Metadata have specific benefits to both sides litigating a matter. First, let’s discuss the
meaning of metadata, commonly defined as “data about data.” The Williams1 court de-
fined metadata as: “the history, tracking, or management of an electronic document.” 2


          Albert Kassis is National Director of Esquire Litigation Solutions, Hobart West. Esquire Litigation Solutions
          provides nationwide litigation support and technology-based document management solutions. He has
          advised in-house and outside counsel for Fortune 100 companies on electronic discovery issues. Mr. Kassis
          received his JD and BA from the University of Maryland. He is also a CPA
Metadata are created by the software program              Whether these fields may prove useful at trial or
                           in the background during normal operations. Al-
      Metadata can                                                                    at a deposition is determined by counsel. Viewing
                           though there are default fields captured by the pro-       this list of metadata in context can lead to correla-
     include records
                           gram, a user can also determine which metadata will        tions that may imply a number of potentially vital
          of changes,      be captured. When documents or e-mails are created         fact-specific activities.
           comments,       in the electronic environment, you can make certain           Let’s review a couple of examples. Whether some-
                           that some key fundamental attributes or e-artifacts
    dates and other                                                                   one had knowledge of a document can be material.
                           otherwise known as metadata are being captured.            Correlating one or more of the above metadata fields
   information. This
                               Metadata can include records of changes, com-          to prove document knowledge by an individual
    information can        ments, dates and other information. This informa-          could be beneficial to a case. Recalling particular
    sometimes spell        tion can sometimes spell the difference between win-       document metadata can also be used as a follow-up
                           ning and losing cases at trial or being forced to settle
       the difference                                                                 to questioning when someone disputes knowledge of
                           cases where there initially appeared to be little at       a paper-only version.
  between winning
                           risk. This metadata typically is not seen unless you          Additionally, particular knowledge of material
   and losing cases        purposefully look for it, so it is often overlooked un-    that was not in the finished document draft can be
     at trial or being     til there is litigation.                                   determined through examining changes tracked au-
                               Different programs and versions of those pro-
     forced to settle                                                                 tomatically by the software. Microsoft Word, for
                           grams will record different metadata, and the ability      instance, allows collaborators on the same docu-
         cases where
                           to retrieve metadata are not limited to one software       ment to view each other’s changes and make com-
        there initially    provider. Most of us are familiar with Windows ap-         ments. As this document goes back and forth with
     appeared to be        plications. Microsoft Word, for example, allows for        the “track changes” feature active, the software cap-
                           the tracking of the file size, type of file and date of
         little at risk.                                                              tures all changes. These changes become part of that
                           modification. Some of these data elements can be           document’s metadata.
                           easily found. In Word, one can select “File/Proper-           “Track changes” also has a hidden text option
                           ties” and see some of the hidden information about         which can keep these changes hidden when the per-
                           the document. The “General” tab displays the title,        son editing the document makes revisions. In this
                           location and history. Similarly, the “Statistics” tab      case both the original text and changes are tracked.
                           contains an assortment of document metrics includ-         Track changes metadata can reveal the timing of a
                           ing the number of lines, pages and words.                  particular document change, when it was made and
                               Metadata extraction from source documents, in-         even by whom. This may help in contract cases, for
                           cluding MS Office specific tags, Microsoft Outlook         example. One particular use would be a matter in-
                           e-mail specific tags, and Lotus Notes specific tags        volving a contract where intent was an issue.
                           are some other examples. Whether you are using a              Further, file path information can reveal where a
                           Microsoft application or Lotus Notes software, rest        document came from. This file path information can
                           assured that the software is creating metadata. Some
                                                                                      be used to track a document back to an individual’s
                           standard metadata available include:
                                                                                      folder. Also, the file path can be used as a mechanism
                                                                                      to track other relevant documents.
                           • Date Sent           • Modify Date
                                                                                         Consider other contexts in which metadata can
                           • Time Sent           • BCC                                be used. Metadata can establish a pattern to further
                                                                                      a prejudice or bias proclamation. Documents may
                           • Subject             • CC
                                                                                      be created by someone and then revised by someone
                                                                                      else. Let’s say an employee’s documents are being re-
                           • Filename            • File Print Date & Time
                                                                                      vised by a manager more often than documents of
                                                                                      other employees. While this in and of itself may not
                           • Author              • Phone Message
                                                                                      prove bias, a comparison of these actions connected
                           • Last Author         • Return Receipt                     to other circumstances may be useful. It may indicate
                                                                                      that this manager was not exerting the same level
                           • File Size           • Read Receipt
                                                                                      of oversight on other employees. The metadata may
                                                                                      substantiate other patterns of bias.
                           • File Date           • Bookmark
                                                                                         Despite the fact that your witness or deponent
                           • File Time                                                may not have changed the document, that person
                                                                                      may have printed it. Metadata in some programs is

20 £ EDRM
able to capture that information. An attorney can            Let’s consider activity around the document.
                                                         Typically when meetings are scheduled or calen-
determine when a particular file was printed, and
                                                         dared, relevant meeting documents are appended
by whom. Additionally, the specific printer that
                                                         or attached to the actual invite. Having an “in-
was used in many instances can also be tracked.
                                                         vite” appear within a deponent’s or witness’s cal-
Correlations associated with these data points can
                                                         endar may provide document knowledge. At times
be made. If a printer is only assigned to a local
                                                         one may delete documents from folders and even
user and if in fact a document is tracked to that
                                                         delete e-mails containing those documents. Calen-
printer, the correlation between the printing of
                                                         dar invites containing these appended documents
a document and that person’s knowledge of the
                                                         might be overlooked and therefore remain long
document may be more easily made.
                                                         after. Looking for calendaring events in the course
   If the knowledge of a document, its contents or
                                                         of discovery may yield useful information. Meta-
existence are not critical, possibly the date of their
                                                         data correlating an invite event to an individual
creation may be of relevance. For example, wheth-
                                                         can be mined for relevant documents.
er a witness or deponent feels an event is critical
                                                             Metadata can also help with timelines. Dates
or not can have certain implications. If metadata
                                                         associated with both e-mails and document activi-
were able to reveal that an electronic document
                                                         ties can provide date guideposts that are useful.
was created right after an event, and the two are
                                                         This usefulness falls outside the content of the e-
closely time-linked, that timing may be useful. A
                                                         mail or document. Occasionally timelines can re-
skillful attorney may be able to draw out a “self-
                                                         veal document or e-mail gaps for the purpose of
perceived” criticalness on the part of the witness
                                                         arguing an incomplete production in discovery.
or deponent. It would be clear that if an event
happened in the morning and someone created a
                                                         Tripping Up a Deponent
document about the event shortly thereafter, the
                                                            Counsel should also be leery of how metadata
perceived urgency because of the close approxi-
                                                         can trip up a deponent. Some examples include:
mation may be easier to prove, even more so if
the document were not created but were modified          •     Excel spreadsheets may display the name of
                                                               an author who is not the deponent.
in close proximity to an event. Similarly, a lack of
timing connection may help to disprove the lack          •     Electronic documents may contain critical
of criticalness as well. Equally as useful is if meta-         formulas that cannot be explained by the wit-
data show the document was created well before                 ness or deponent despite the fact they are ad-
the subject event took place.                                  dressing data within the document.
    At times the content of a document is not as rel-    •     E-mails in electronic form should contain
evant as the fact that the document was sent and               specific addresses as opposed to just a name
then received. Use of e-mail as a delivery mecha-              with no domain address. This may be an issue
nism provides an easily-tracked trail of footprints.           with common names in large corporations.
If a deponent or witness used e-mail as a vehicle
for sending an electronic document to a recipient,       Conclusion
the actual delivery and relationship of both sender         Overall, metadata and its uses will continue
and recipient may be easier to prove.                    to evolve as software changes. Service providers
    Tracking a “path” of a document allows one           have the arduous task of accommodating software
to see if your witness or deponent was part of the       and e-mail changes to ensure any captured meta-
e-mail string, as either sender or recipient directly    data are extracted and made available for review.
or blind copied. A recipient may later forward a         Counsel will continue to utilize metadata in de-
document. Occasionally a sender of an e-mail will        positions and trial where the captured data can
ask for an electronic “read” notification. This no-      prove or disprove an argument.
tification can take on several forms. In its simplest
form when a recipient receives an e-mail and opens
                                                         1. Williams v. Spring/United Mgt. Col, 230 F.R.D. 640 (D.
it for viewing even in preview mode an electronic
                                                            Kan. 2005).
message will go back to sender indicating that the
message was “read.” Whether it was indeed actu-          2. Williams v. Spring/United Mgt. Col, 230 F.R.D. 640, 646
ally read word for word is another matter.                   (D. Kan. 2005).


                                                                                                                      SUMMER 2008 £ 21

Más contenido relacionado

Destacado

Financialproblems aristocracygroup
Financialproblems aristocracygroupFinancialproblems aristocracygroup
Financialproblems aristocracygroupJennifer hc
 
Email Risk, by Albert Kassis
Email Risk, by Albert KassisEmail Risk, by Albert Kassis
Email Risk, by Albert KassisAlbert Kassis
 
Audio Discovery by Albert Kassis
 Audio  Discovery by Albert Kassis  Audio  Discovery by Albert Kassis
Audio Discovery by Albert Kassis Albert Kassis
 
Presentación fin de curso 2ºa
Presentación fin de curso 2ºaPresentación fin de curso 2ºa
Presentación fin de curso 2ºavenyvive
 
#GivingTuesday - Vancouver MeetUp
#GivingTuesday - Vancouver MeetUp#GivingTuesday - Vancouver MeetUp
#GivingTuesday - Vancouver MeetUpBrady Josephson
 
QR Code Vortrag beim WebMontag Frankfurt
QR Code Vortrag beim WebMontag Frankfurt QR Code Vortrag beim WebMontag Frankfurt
QR Code Vortrag beim WebMontag Frankfurt Qr Art
 
Rinoplastica Roma | Chirurgo Plastico Raffaele Rauso
Rinoplastica Roma | Chirurgo Plastico Raffaele RausoRinoplastica Roma | Chirurgo Plastico Raffaele Rauso
Rinoplastica Roma | Chirurgo Plastico Raffaele RausoRaffaele Rauso
 
Game Changer Bistro
Game Changer BistroGame Changer Bistro
Game Changer BistroIris Klein
 
Extreme Makeover: Web Site Edition (OPLIN)
Extreme Makeover: Web Site Edition (OPLIN)Extreme Makeover: Web Site Edition (OPLIN)
Extreme Makeover: Web Site Edition (OPLIN)Laura Solomon
 
Emergency Fixes for Library Web Sites (OPLIN)
Emergency Fixes for Library Web Sites (OPLIN)Emergency Fixes for Library Web Sites (OPLIN)
Emergency Fixes for Library Web Sites (OPLIN)Laura Solomon
 

Destacado (18)

Financialproblems aristocracygroup
Financialproblems aristocracygroupFinancialproblems aristocracygroup
Financialproblems aristocracygroup
 
Email Risk, by Albert Kassis
Email Risk, by Albert KassisEmail Risk, by Albert Kassis
Email Risk, by Albert Kassis
 
Audio Discovery by Albert Kassis
 Audio  Discovery by Albert Kassis  Audio  Discovery by Albert Kassis
Audio Discovery by Albert Kassis
 
Presentación fin de curso 2ºa
Presentación fin de curso 2ºaPresentación fin de curso 2ºa
Presentación fin de curso 2ºa
 
Img 130122133611
Img 130122133611Img 130122133611
Img 130122133611
 
#GivingTuesday - Vancouver MeetUp
#GivingTuesday - Vancouver MeetUp#GivingTuesday - Vancouver MeetUp
#GivingTuesday - Vancouver MeetUp
 
Diapositiva
DiapositivaDiapositiva
Diapositiva
 
Stalin tenicota
Stalin tenicotaStalin tenicota
Stalin tenicota
 
Arbol AA
Arbol AAArbol AA
Arbol AA
 
Arbol AA
Arbol AAArbol AA
Arbol AA
 
Iyana Bio
Iyana BioIyana Bio
Iyana Bio
 
Balanço Financeiro FPF
Balanço Financeiro FPFBalanço Financeiro FPF
Balanço Financeiro FPF
 
ital3072 saggio
ital3072 saggioital3072 saggio
ital3072 saggio
 
QR Code Vortrag beim WebMontag Frankfurt
QR Code Vortrag beim WebMontag Frankfurt QR Code Vortrag beim WebMontag Frankfurt
QR Code Vortrag beim WebMontag Frankfurt
 
Rinoplastica Roma | Chirurgo Plastico Raffaele Rauso
Rinoplastica Roma | Chirurgo Plastico Raffaele RausoRinoplastica Roma | Chirurgo Plastico Raffaele Rauso
Rinoplastica Roma | Chirurgo Plastico Raffaele Rauso
 
Game Changer Bistro
Game Changer BistroGame Changer Bistro
Game Changer Bistro
 
Extreme Makeover: Web Site Edition (OPLIN)
Extreme Makeover: Web Site Edition (OPLIN)Extreme Makeover: Web Site Edition (OPLIN)
Extreme Makeover: Web Site Edition (OPLIN)
 
Emergency Fixes for Library Web Sites (OPLIN)
Emergency Fixes for Library Web Sites (OPLIN)Emergency Fixes for Library Web Sites (OPLIN)
Emergency Fixes for Library Web Sites (OPLIN)
 

Similar a Metadata Strategies by Albert Kassis

Ten Ways For DBA's To Save Time
Ten Ways For DBA's To Save TimeTen Ways For DBA's To Save Time
Ten Ways For DBA's To Save TimeMichael Findling
 
Cibm work shop 2chapter six
Cibm  work shop 2chapter sixCibm  work shop 2chapter six
Cibm work shop 2chapter sixShaheen Khan
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
Introduction to Database Log Analysis
Introduction to Database Log AnalysisIntroduction to Database Log Analysis
Introduction to Database Log AnalysisAnton Chuvakin
 
Metadata as a Service
 Metadata as a Service Metadata as a Service
Metadata as a ServiceITC Infotech
 
The Metadata Secret in Your Data
The Metadata Secret in Your DataThe Metadata Secret in Your Data
The Metadata Secret in Your DataEverteam
 
Jane report mam she
Jane report mam she Jane report mam she
Jane report mam she Janecatalla04
 
Document Types Explained: Structured, Semi-Structured and Unstructured
Document Types Explained: Structured, Semi-Structured and UnstructuredDocument Types Explained: Structured, Semi-Structured and Unstructured
Document Types Explained: Structured, Semi-Structured and UnstructuredInfrrd
 
Document Management Techniques & Technologies
Document Management Techniques & TechnologiesDocument Management Techniques & Technologies
Document Management Techniques & TechnologiesGihan Wikramanayake
 
Key aspects of big data storage and its architecture
Key aspects of big data storage and its architectureKey aspects of big data storage and its architecture
Key aspects of big data storage and its architectureRahul Chaturvedi
 
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...projjal ghosh
 
Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!projjal ghosh
 
Papyrus Digital Asset Management
Papyrus Digital Asset ManagementPapyrus Digital Asset Management
Papyrus Digital Asset Managementmjpucher
 
How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...Anar Godjaev
 
Disclosing Private Information from Metadata, hidden info and lost data
Disclosing Private Information from  Metadata, hidden info and lost data Disclosing Private Information from  Metadata, hidden info and lost data
Disclosing Private Information from Metadata, hidden info and lost data Chema Alonso
 

Similar a Metadata Strategies by Albert Kassis (20)

Ten Ways For DBA's To Save Time
Ten Ways For DBA's To Save TimeTen Ways For DBA's To Save Time
Ten Ways For DBA's To Save Time
 
Ten Ways For DBA's To Save Time
Ten Ways For DBA's To Save TimeTen Ways For DBA's To Save Time
Ten Ways For DBA's To Save Time
 
Cibm work shop 2chapter six
Cibm  work shop 2chapter sixCibm  work shop 2chapter six
Cibm work shop 2chapter six
 
Technology Tips Using Acrobat 9 In The Law Office
Technology Tips   Using Acrobat 9 In The Law OfficeTechnology Tips   Using Acrobat 9 In The Law Office
Technology Tips Using Acrobat 9 In The Law Office
 
Google File System
Google File SystemGoogle File System
Google File System
 
Introduction to Database Log Analysis
Introduction to Database Log AnalysisIntroduction to Database Log Analysis
Introduction to Database Log Analysis
 
Metadata as a Service
 Metadata as a Service Metadata as a Service
Metadata as a Service
 
Organising and Documenting Data
Organising and Documenting DataOrganising and Documenting Data
Organising and Documenting Data
 
The Metadata Secret in Your Data
The Metadata Secret in Your DataThe Metadata Secret in Your Data
The Metadata Secret in Your Data
 
191
191191
191
 
Jane report mam she
Jane report mam she Jane report mam she
Jane report mam she
 
Document Types Explained: Structured, Semi-Structured and Unstructured
Document Types Explained: Structured, Semi-Structured and UnstructuredDocument Types Explained: Structured, Semi-Structured and Unstructured
Document Types Explained: Structured, Semi-Structured and Unstructured
 
Document Management Techniques & Technologies
Document Management Techniques & TechnologiesDocument Management Techniques & Technologies
Document Management Techniques & Technologies
 
Key aspects of big data storage and its architecture
Key aspects of big data storage and its architectureKey aspects of big data storage and its architecture
Key aspects of big data storage and its architecture
 
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
 
Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!
 
Papyrus Digital Asset Management
Papyrus Digital Asset ManagementPapyrus Digital Asset Management
Papyrus Digital Asset Management
 
How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...
 
Disclosing Private Information from Metadata, hidden info and lost data
Disclosing Private Information from  Metadata, hidden info and lost data Disclosing Private Information from  Metadata, hidden info and lost data
Disclosing Private Information from Metadata, hidden info and lost data
 
Gfs论文
Gfs论文Gfs论文
Gfs论文
 

Metadata Strategies by Albert Kassis

  • 1. Metadata Strategies in Litigation: What You Don’t See Might Hurt You By Albert Kassis Introduction Under Amended Rules of Civil Procedure Rule 26(f), the discovery conference require- ment must now encompass a discussion of electronic discovery. The Advisory Notes fur- ther suggest that the parties should discuss whether and how metadata should be ex- changed. This article discusses how metadata may be used after the hurdle of whether there is a “particularized need” is established, as some courts require. Benefits of Metadata Metadata have specific benefits to both sides litigating a matter. First, let’s discuss the meaning of metadata, commonly defined as “data about data.” The Williams1 court de- fined metadata as: “the history, tracking, or management of an electronic document.” 2 Albert Kassis is National Director of Esquire Litigation Solutions, Hobart West. Esquire Litigation Solutions provides nationwide litigation support and technology-based document management solutions. He has advised in-house and outside counsel for Fortune 100 companies on electronic discovery issues. Mr. Kassis received his JD and BA from the University of Maryland. He is also a CPA
  • 2. Metadata are created by the software program Whether these fields may prove useful at trial or in the background during normal operations. Al- Metadata can at a deposition is determined by counsel. Viewing though there are default fields captured by the pro- this list of metadata in context can lead to correla- include records gram, a user can also determine which metadata will tions that may imply a number of potentially vital of changes, be captured. When documents or e-mails are created fact-specific activities. comments, in the electronic environment, you can make certain Let’s review a couple of examples. Whether some- that some key fundamental attributes or e-artifacts dates and other one had knowledge of a document can be material. otherwise known as metadata are being captured. Correlating one or more of the above metadata fields information. This Metadata can include records of changes, com- to prove document knowledge by an individual information can ments, dates and other information. This informa- could be beneficial to a case. Recalling particular sometimes spell tion can sometimes spell the difference between win- document metadata can also be used as a follow-up ning and losing cases at trial or being forced to settle the difference to questioning when someone disputes knowledge of cases where there initially appeared to be little at a paper-only version. between winning risk. This metadata typically is not seen unless you Additionally, particular knowledge of material and losing cases purposefully look for it, so it is often overlooked un- that was not in the finished document draft can be at trial or being til there is litigation. determined through examining changes tracked au- Different programs and versions of those pro- forced to settle tomatically by the software. Microsoft Word, for grams will record different metadata, and the ability instance, allows collaborators on the same docu- cases where to retrieve metadata are not limited to one software ment to view each other’s changes and make com- there initially provider. Most of us are familiar with Windows ap- ments. As this document goes back and forth with appeared to be plications. Microsoft Word, for example, allows for the “track changes” feature active, the software cap- the tracking of the file size, type of file and date of little at risk. tures all changes. These changes become part of that modification. Some of these data elements can be document’s metadata. easily found. In Word, one can select “File/Proper- “Track changes” also has a hidden text option ties” and see some of the hidden information about which can keep these changes hidden when the per- the document. The “General” tab displays the title, son editing the document makes revisions. In this location and history. Similarly, the “Statistics” tab case both the original text and changes are tracked. contains an assortment of document metrics includ- Track changes metadata can reveal the timing of a ing the number of lines, pages and words. particular document change, when it was made and Metadata extraction from source documents, in- even by whom. This may help in contract cases, for cluding MS Office specific tags, Microsoft Outlook example. One particular use would be a matter in- e-mail specific tags, and Lotus Notes specific tags volving a contract where intent was an issue. are some other examples. Whether you are using a Further, file path information can reveal where a Microsoft application or Lotus Notes software, rest document came from. This file path information can assured that the software is creating metadata. Some be used to track a document back to an individual’s standard metadata available include: folder. Also, the file path can be used as a mechanism to track other relevant documents. • Date Sent • Modify Date Consider other contexts in which metadata can • Time Sent • BCC be used. Metadata can establish a pattern to further a prejudice or bias proclamation. Documents may • Subject • CC be created by someone and then revised by someone else. Let’s say an employee’s documents are being re- • Filename • File Print Date & Time vised by a manager more often than documents of other employees. While this in and of itself may not • Author • Phone Message prove bias, a comparison of these actions connected • Last Author • Return Receipt to other circumstances may be useful. It may indicate that this manager was not exerting the same level • File Size • Read Receipt of oversight on other employees. The metadata may substantiate other patterns of bias. • File Date • Bookmark Despite the fact that your witness or deponent • File Time may not have changed the document, that person may have printed it. Metadata in some programs is 20 £ EDRM
  • 3. able to capture that information. An attorney can Let’s consider activity around the document. Typically when meetings are scheduled or calen- determine when a particular file was printed, and dared, relevant meeting documents are appended by whom. Additionally, the specific printer that or attached to the actual invite. Having an “in- was used in many instances can also be tracked. vite” appear within a deponent’s or witness’s cal- Correlations associated with these data points can endar may provide document knowledge. At times be made. If a printer is only assigned to a local one may delete documents from folders and even user and if in fact a document is tracked to that delete e-mails containing those documents. Calen- printer, the correlation between the printing of dar invites containing these appended documents a document and that person’s knowledge of the might be overlooked and therefore remain long document may be more easily made. after. Looking for calendaring events in the course If the knowledge of a document, its contents or of discovery may yield useful information. Meta- existence are not critical, possibly the date of their data correlating an invite event to an individual creation may be of relevance. For example, wheth- can be mined for relevant documents. er a witness or deponent feels an event is critical Metadata can also help with timelines. Dates or not can have certain implications. If metadata associated with both e-mails and document activi- were able to reveal that an electronic document ties can provide date guideposts that are useful. was created right after an event, and the two are This usefulness falls outside the content of the e- closely time-linked, that timing may be useful. A mail or document. Occasionally timelines can re- skillful attorney may be able to draw out a “self- veal document or e-mail gaps for the purpose of perceived” criticalness on the part of the witness arguing an incomplete production in discovery. or deponent. It would be clear that if an event happened in the morning and someone created a Tripping Up a Deponent document about the event shortly thereafter, the Counsel should also be leery of how metadata perceived urgency because of the close approxi- can trip up a deponent. Some examples include: mation may be easier to prove, even more so if the document were not created but were modified • Excel spreadsheets may display the name of an author who is not the deponent. in close proximity to an event. Similarly, a lack of timing connection may help to disprove the lack • Electronic documents may contain critical of criticalness as well. Equally as useful is if meta- formulas that cannot be explained by the wit- data show the document was created well before ness or deponent despite the fact they are ad- the subject event took place. dressing data within the document. At times the content of a document is not as rel- • E-mails in electronic form should contain evant as the fact that the document was sent and specific addresses as opposed to just a name then received. Use of e-mail as a delivery mecha- with no domain address. This may be an issue nism provides an easily-tracked trail of footprints. with common names in large corporations. If a deponent or witness used e-mail as a vehicle for sending an electronic document to a recipient, Conclusion the actual delivery and relationship of both sender Overall, metadata and its uses will continue and recipient may be easier to prove. to evolve as software changes. Service providers Tracking a “path” of a document allows one have the arduous task of accommodating software to see if your witness or deponent was part of the and e-mail changes to ensure any captured meta- e-mail string, as either sender or recipient directly data are extracted and made available for review. or blind copied. A recipient may later forward a Counsel will continue to utilize metadata in de- document. Occasionally a sender of an e-mail will positions and trial where the captured data can ask for an electronic “read” notification. This no- prove or disprove an argument. tification can take on several forms. In its simplest form when a recipient receives an e-mail and opens 1. Williams v. Spring/United Mgt. Col, 230 F.R.D. 640 (D. it for viewing even in preview mode an electronic Kan. 2005). message will go back to sender indicating that the message was “read.” Whether it was indeed actu- 2. Williams v. Spring/United Mgt. Col, 230 F.R.D. 640, 646 ally read word for word is another matter. (D. Kan. 2005). SUMMER 2008 £ 21