SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
e-Discovery

Data Retention and Other Useful
       Discussion Topics
Document Retention Policy
• Document retention means many things to many people depending on
  their business.
        • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices)
        • HIPPA
• Can be mandated based on industry by either federal, or state
  jurisdictions, sometimes both.
• Basically if you are not mandated to retain your documents, draft and
  adhere to your own document retention policy. This will make any
  electronic discovery process much more efficient.
• Adhering to your own document retention policy ensures your ethical
  practices regarding data deletion if involved in litigation.
• An effective data retention policy should:
        • Reduce “data artifacts”
        • Reduce the amount of production and review: if involved in electronic discovery
        • Properly store and delete company relevant data based on requirements set by the
          organization or mandating authority.
        • Address all relative data and storage options utilized by the company, pc hard disks,
          servers, mobile devices, tapes, archives, off-site storage
Electronic Discovery
• Electronic discovery (or e-discovery) refers to discovery in civil litigation
  which deals with information in electronic format also referred to as
  Electronically Stored Information (ESI). Electronic information is different
  from paper information because of its intangible form, volume, transience
  and persistence. Also, electronic information is usually accompanied by
  metadata, which is not present in paper documents. However, paper
  documents can be scanned into electronic format and then manually
  coded with metadata. The preservation of metadata from electronic
  documents creates special challenges to prevent spoliation.

• Electronic discovery was the subject of amendments to the Federal Rules
  of Civil Procedure, effective December 1, 2006.[1] shows the changes, the
  complete Rules, where in particular rules 16 and 26 are of interest to
  electronic discovery.

* source http://en.wikipedia.org/wiki/Electronic_discovery
Federal Rules of Civil Procedure
                Related to e-Discovery
Rule 16. Pretrial Conferences; Scheduling; Management
(a) Purposes of a Pretrial Conference.
      (3) discouraging wasteful pretrial activities;
(b) Scheduling
      (3) Contents of the Order.
              (A) Required Contents. The scheduling order must limit the time to join other parties, amend the
                  pleadings, complete discovery, and file motions.
              (B) Permitted Contents. The scheduling order may:
                  (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1);
                  (ii) modify the extent of discovery;
                  (iii) provide for disclosure or discovery of electronically stored information;
(c) Attendance and Matters for Consideration at a Pretrial Conference.
       (2) Matters for Consideration
              (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule
                  26 and Rules 29 through 37;




* Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
Federal Rules of Civil Procedure
             Related to e-Discovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(a)   Required Disclosures
      (1) Initial Disclosures
           (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court,
           a party must, without awaiting a discovery request, provide to the other parties:
                (ii) a copy — or a description by category and location — of all documents, electronically stored information, and
                tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or
                defenses, unless the use would be solely for impeachment;
(b) Discovery Scope and Limits.
       (2) Limitations on Frequency and Extent
           (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of
           electronically stored information from sources that the party identifies as not reasonably accessible
           because of undue burden or cost. On motion to compel discovery or for a protective order, the party from
           whom discovery is sought must show that the information is not reasonably accessible because of undue
           burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if
           the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may
           specify conditions for the discovery.
           (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery
           otherwise allowed by these rules or by local rule if it determines that:
                (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is
                more convenient, less burdensome, or less expensive;
                (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or
                (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case,
                the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the
                importance of the discovery in resolving the issues.
Federal Rules of Civil Procedure
                Related to eDiscovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(b) Discovery Scope and Limits
      (3) Trial Preparation: Materials.
           (A) Documents and Tangible Things.
           (B) Protection Against Disclosure.
           (C) Previous Statement.
        (5) Claiming Privilege or Protecting Trial- Preparation Materials.
             (B)Information Produced.
(c) Protective Orders
      (1) In General
      (2) Ordering Discovery
(d) Timing and Sequence of Discovery
      (1) Timing
      (2) Sequence
(e) Supplementation of Disclosures and Responses.
      (1) In General
      (2) Expert Witness.
(f) Conference of the Parties; Planning for Discovery
      (3) Discovery Plan.



*source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
Electronically Stored Information (ESI)
•        Electronically stored information, for the purpose of the Federal Rules of Civil
         Procedure (FRCP) is information created, manipulated, communicated, stored, and
         best utilized in digital form, requiring the use of computer hardware and software.
         The term has become a legally defined phrase as the U.S. government determined
         for the purposes of the FRCP rules of 2006 that promulgating procedures for
         maintenance and discovery for electronically stored information was necessary. [1]

•        Types of ESI
         (1)Native Files (Office documents ect…)
         (2)Logical Data (RAM)




[1]source:   http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure)
[2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
e-Discovery as Experienced
The process as experienced:
• Requesting attorney/party issues legal hold (usually broad), or requests financial impact
    information for the legal hold they are about to request.
• Responding attorney/party rebuts request as too broad or implements legal hold on electronic
    information to the specified requirements of the request.
• Parties conference and discovery requirements are mandated.
• Responding party performs discovery on the data specified in the time frame required.
• Information/documents produced from the discovery are given to counsel to review for privileged
    information.
• Non-privileged information is given to requesting party in the specified required formats.

Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing
    their discovery requirements.

•   Typically this is a “data hunt” by the complainant counsel to discover what types of data are
    available, any data retention policies that exist, and in what formats the data is in.
•   This may even get into “known” information such as if the IT personnel is aware of any data
    destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has
    assisted any specific employees in question with data deletion.
Legal Hold
•   With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley
    cases, and the Supreme Court analyzing how document retention policies are
    enforced, corporate practices around the retention/ destruction of electronically
    stored information (ESI) have never been more important.
•   The “legal hold” operates at the intersection of litigation and corporate retention
    practices, and it has emerged as an almost-obligatory component of a company's
    response to notice or reasonable anticipation of litigation. The basis of this
    obligation is the common law duty against spoilation; that is, the duty to avoid the
    loss of, destruction of, or failure to preserve information that may be relevant to
    pending or potential proceedings.
•   In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the
    documents in your desk drawers or file cabinets. But modern businesses generate
    massive amounts of digital information, which is created and stored in an ever-
    expanding number of devices and locations, and which can be destroyed without
    any affirmative action. As a result, effective legal hold practices involve significantly
    more than merely issuing an internal letter and sitting back until the official
    discover process begins.

* source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
The Sedona Conference®
     Best Practices Recommendations & Principles for
       Addressing Electronic Document Production
1.   Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state
     equivalents. Organizations must properly preserve electronically stored information that can
     reasonably be anticipated to be relevant to litigation.
2.   When balancing the cost, burden, and need for electronically stored information, courts and
     parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its
     state equivalents, which require consideration of the technological feasibility and realistic costs of
     preserving, retrieving, reviewing, and producing electronically stored information, as well as the
     nature of the litigation and the amount in controversy
3.   Parties should confer early in discovery regarding the preservation and production of
     electronically stored information when these matters are at issue in the litigation and seek to
     agree on the scope of each party’s rights and responsibilities
4.   Discovery requests for electronically stored information should be as clear as possible, while
     responses and objections to discovery should disclose the scope and limits of the production
5.   The obligation to preserve electronically stored information requires reasonable and good faith
     efforts to retain information that may be relevant to pending or threatened litigation. However, it
     is unreasonable to expect parties to take every conceivable step to preserve all potentially
     relevant electronically stored information
6.   Responding parties are best situated to evaluate the procedures, methodologies, and
     technologies appropriate for preserving and producing their own electronically stored
     information
7.   The requesting party has the burden on a motion to compel to show that the responding party’s
     steps to preserve and produce relevant electronically stored information were inadequate
The Sedona Conference®
      Best Practices Recommendations & Principles for
        Addressing Electronic Document Production
8.    The primary source of electronically stored information for production should be active data and information.
      Resort to disaster recovery backup tapes and other sources of electronically stored information that are not
      reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs
      and burdens of retrieving and processing the electronically stored information from such sources, including the
      disruption of business and information management activities
9.    Absent a showing of special need and relevance, a responding party should not be required to preserve, review,
      or produce deleted, shadowed, fragmented, or residual electronically stored information
10.   A responding party should follow reasonable procedures to protect privileges and objections in connection with
      the production of electronically stored information
11.    A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored
      information by using electronic tools and processes, such as data sampling, searching, or the use of selection
      criteria, to identify data reasonably likely to contain relevant information
12.   Absent party agreement or court order specifying the form or forms of production, production should be made
      in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into
      account the need to produce reasonably accessible metadata that will enable the receiving party to have the
      same ability to access, search, and display the information as the producing party where appropriate or
      necessary in light of the nature of the information and the needs of the case
13.   Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing
      electronically stored information should be borne by the responding party, unless the information sought is not
      reasonably available to the responding party in the ordinary course of business. If the information sought is not
      reasonably available to the responding party in the ordinary course of business, then, absent special
      circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to
      the requesting party
14.   Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear
      duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a
      reasonable probability that the loss of the evidence has materially prejudiced the adverse party
Discussion Points
• Legal professionals don’t fully understand information
  technology and the extent of their requests. How does
  this impact IT/IS?
• Using cost-shifting as an effective tool to reducing e-
  Discovery requests.
• Why would my company need a data retention policy?
• Is data governance important to managing litigious
  corporate data?
• Ethical, practical, and efficient data retention
      • Does it exist?
      • Who’s managing it?

Más contenido relacionado

La actualidad más candente

Digital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDigital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDineshPrasad64
 
Confidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISDConfidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISDAtlantic Training, LLC.
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Vulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsVulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsBim Akinfenwa
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 

La actualidad más candente (20)

Digital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDigital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptx
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Confidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISDConfidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISD
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Vulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsVulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIs
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Spoofing
SpoofingSpoofing
Spoofing
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 

Similar a E Discovery

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Seth Row
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeBoyarMiller
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer WorkshopJohn Jablonski
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 

Similar a E Discovery (20)

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
 
Daniel day
Daniel dayDaniel day
Daniel day
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 

Más de James Sutter

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214James Sutter
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014James Sutter
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David MannJames Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013James Sutter
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOTJames Sutter
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13James Sutter
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjtJames Sutter
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costsJames Sutter
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentationJames Sutter
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12James Sutter
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012 James Sutter
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12James Sutter
 

Más de James Sutter (20)

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David Mann
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjt
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costs
 
CIO Branding
CIO BrandingCIO Branding
CIO Branding
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentation
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12
 
CIO Value Issue
CIO Value IssueCIO Value Issue
CIO Value Issue
 

Último

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

E Discovery

  • 1. e-Discovery Data Retention and Other Useful Discussion Topics
  • 2. Document Retention Policy • Document retention means many things to many people depending on their business. • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices) • HIPPA • Can be mandated based on industry by either federal, or state jurisdictions, sometimes both. • Basically if you are not mandated to retain your documents, draft and adhere to your own document retention policy. This will make any electronic discovery process much more efficient. • Adhering to your own document retention policy ensures your ethical practices regarding data deletion if involved in litigation. • An effective data retention policy should: • Reduce “data artifacts” • Reduce the amount of production and review: if involved in electronic discovery • Properly store and delete company relevant data based on requirements set by the organization or mandating authority. • Address all relative data and storage options utilized by the company, pc hard disks, servers, mobile devices, tapes, archives, off-site storage
  • 3. Electronic Discovery • Electronic discovery (or e-discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). Electronic information is different from paper information because of its intangible form, volume, transience and persistence. Also, electronic information is usually accompanied by metadata, which is not present in paper documents. However, paper documents can be scanned into electronic format and then manually coded with metadata. The preservation of metadata from electronic documents creates special challenges to prevent spoliation. • Electronic discovery was the subject of amendments to the Federal Rules of Civil Procedure, effective December 1, 2006.[1] shows the changes, the complete Rules, where in particular rules 16 and 26 are of interest to electronic discovery. * source http://en.wikipedia.org/wiki/Electronic_discovery
  • 4. Federal Rules of Civil Procedure Related to e-Discovery Rule 16. Pretrial Conferences; Scheduling; Management (a) Purposes of a Pretrial Conference. (3) discouraging wasteful pretrial activities; (b) Scheduling (3) Contents of the Order. (A) Required Contents. The scheduling order must limit the time to join other parties, amend the pleadings, complete discovery, and file motions. (B) Permitted Contents. The scheduling order may: (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1); (ii) modify the extent of discovery; (iii) provide for disclosure or discovery of electronically stored information; (c) Attendance and Matters for Consideration at a Pretrial Conference. (2) Matters for Consideration (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule 26 and Rules 29 through 37; * Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
  • 5. Federal Rules of Civil Procedure Related to e-Discovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (a) Required Disclosures (1) Initial Disclosures (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court, a party must, without awaiting a discovery request, provide to the other parties: (ii) a copy — or a description by category and location — of all documents, electronically stored information, and tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or defenses, unless the use would be solely for impeachment; (b) Discovery Scope and Limits. (2) Limitations on Frequency and Extent (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for the discovery. (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery otherwise allowed by these rules or by local rule if it determines that: (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.
  • 6. Federal Rules of Civil Procedure Related to eDiscovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (b) Discovery Scope and Limits (3) Trial Preparation: Materials. (A) Documents and Tangible Things. (B) Protection Against Disclosure. (C) Previous Statement. (5) Claiming Privilege or Protecting Trial- Preparation Materials. (B)Information Produced. (c) Protective Orders (1) In General (2) Ordering Discovery (d) Timing and Sequence of Discovery (1) Timing (2) Sequence (e) Supplementation of Disclosures and Responses. (1) In General (2) Expert Witness. (f) Conference of the Parties; Planning for Discovery (3) Discovery Plan. *source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
  • 7. Electronically Stored Information (ESI) • Electronically stored information, for the purpose of the Federal Rules of Civil Procedure (FRCP) is information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software. The term has become a legally defined phrase as the U.S. government determined for the purposes of the FRCP rules of 2006 that promulgating procedures for maintenance and discovery for electronically stored information was necessary. [1] • Types of ESI (1)Native Files (Office documents ect…) (2)Logical Data (RAM) [1]source: http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure) [2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
  • 8. e-Discovery as Experienced The process as experienced: • Requesting attorney/party issues legal hold (usually broad), or requests financial impact information for the legal hold they are about to request. • Responding attorney/party rebuts request as too broad or implements legal hold on electronic information to the specified requirements of the request. • Parties conference and discovery requirements are mandated. • Responding party performs discovery on the data specified in the time frame required. • Information/documents produced from the discovery are given to counsel to review for privileged information. • Non-privileged information is given to requesting party in the specified required formats. Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing their discovery requirements. • Typically this is a “data hunt” by the complainant counsel to discover what types of data are available, any data retention policies that exist, and in what formats the data is in. • This may even get into “known” information such as if the IT personnel is aware of any data destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has assisted any specific employees in question with data deletion.
  • 9. Legal Hold • With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley cases, and the Supreme Court analyzing how document retention policies are enforced, corporate practices around the retention/ destruction of electronically stored information (ESI) have never been more important. • The “legal hold” operates at the intersection of litigation and corporate retention practices, and it has emerged as an almost-obligatory component of a company's response to notice or reasonable anticipation of litigation. The basis of this obligation is the common law duty against spoilation; that is, the duty to avoid the loss of, destruction of, or failure to preserve information that may be relevant to pending or potential proceedings. • In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the documents in your desk drawers or file cabinets. But modern businesses generate massive amounts of digital information, which is created and stored in an ever- expanding number of devices and locations, and which can be destroyed without any affirmative action. As a result, effective legal hold practices involve significantly more than merely issuing an internal letter and sitting back until the official discover process begins. * source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
  • 10. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 1. Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state equivalents. Organizations must properly preserve electronically stored information that can reasonably be anticipated to be relevant to litigation. 2. When balancing the cost, burden, and need for electronically stored information, courts and parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its state equivalents, which require consideration of the technological feasibility and realistic costs of preserving, retrieving, reviewing, and producing electronically stored information, as well as the nature of the litigation and the amount in controversy 3. Parties should confer early in discovery regarding the preservation and production of electronically stored information when these matters are at issue in the litigation and seek to agree on the scope of each party’s rights and responsibilities 4. Discovery requests for electronically stored information should be as clear as possible, while responses and objections to discovery should disclose the scope and limits of the production 5. The obligation to preserve electronically stored information requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation. However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant electronically stored information 6. Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information 7. The requesting party has the burden on a motion to compel to show that the responding party’s steps to preserve and produce relevant electronically stored information were inadequate
  • 11. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 8. The primary source of electronically stored information for production should be active data and information. Resort to disaster recovery backup tapes and other sources of electronically stored information that are not reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs and burdens of retrieving and processing the electronically stored information from such sources, including the disruption of business and information management activities 9. Absent a showing of special need and relevance, a responding party should not be required to preserve, review, or produce deleted, shadowed, fragmented, or residual electronically stored information 10. A responding party should follow reasonable procedures to protect privileges and objections in connection with the production of electronically stored information 11. A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored information by using electronic tools and processes, such as data sampling, searching, or the use of selection criteria, to identify data reasonably likely to contain relevant information 12. Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and the needs of the case 13. Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing electronically stored information should be borne by the responding party, unless the information sought is not reasonably available to the responding party in the ordinary course of business. If the information sought is not reasonably available to the responding party in the ordinary course of business, then, absent special circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to the requesting party 14. Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a reasonable probability that the loss of the evidence has materially prejudiced the adverse party
  • 12. Discussion Points • Legal professionals don’t fully understand information technology and the extent of their requests. How does this impact IT/IS? • Using cost-shifting as an effective tool to reducing e- Discovery requests. • Why would my company need a data retention policy? • Is data governance important to managing litigious corporate data? • Ethical, practical, and efficient data retention • Does it exist? • Who’s managing it?