SlideShare uma empresa Scribd logo
1 de 37
Not Just Another E-Discovery Presentation January 26, 2010 Carla Ashley Sarah Brehm
Where are we now?
Where have we come from?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is ESI?
What has changed?
Not a new concept ,[object Object],[object Object],[object Object]
A new example… text messages ,[object Object],[object Object],[object Object],[object Object],[object Object]
2009 Trends ,[object Object],[object Object],[object Object],[object Object],[object Object]
2009 Case Law Overview
Preservation & Spoliation
State & Federal Statutes
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Louisiana Code of Civil Procedure
[object Object],[object Object],[object Object],[object Object],Electronic Warrants
Federal Rule of Civil Procedure 26 ,[object Object],[object Object]
Federal Law: Rules 26, 16, and Form 35 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Federal Claw-Back ,[object Object],[object Object],[object Object]
Email Waiver ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rules 34 & 37 ,[object Object],[object Object],[object Object]
When does duty to preserve begin? ,[object Object],[object Object]
2-Tier Analysis ,[object Object],[object Object],[object Object],[object Object]
Reasonably accessible? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Courts Expect ,[object Object],[object Object],[object Object],[object Object],[object Object]
This Rule Has Teeth ,[object Object],[object Object],[object Object],[object Object]
Recent Cases – Sanctions ,[object Object],[object Object],[object Object],[object Object]
When dismissal may be warranted ,[object Object],[object Object]
Bad Boys ,[object Object],[object Object],[object Object]
Pesky little clause ,[object Object],[object Object],[object Object]
Attorneys Sanctioned ,[object Object],[object Object],[object Object],[object Object]
Ediscovery Expert Ordered ,[object Object],[object Object],[object Object]
Justify Your Methods -  Maggette ,[object Object],[object Object],[object Object]
The Death Penalty ,[object Object],[object Object],[object Object]
Blank is Suspicious ,[object Object],[object Object],[object Object]
Adverse Inferences ,[object Object],[object Object],[object Object],[object Object]
more  Keithley ,[object Object],[object Object]
Good Faith – Lessons from  Qualcomm ,[object Object],[object Object]
Ethical Implications ,[object Object],[object Object]
Parting thoughts ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Data Quality Technical Architecture
Data Quality Technical ArchitectureData Quality Technical Architecture
Data Quality Technical ArchitectureHarshendu Desai
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data ManagementAhmed Alorage
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big DataRavinder Kamboj
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imagingMarco Alamanni
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security ManagementAhmed Alorage
 
‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management ‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management Ahmed Alorage
 
Chapter 5: Data Development
Chapter 5: Data Development Chapter 5: Data Development
Chapter 5: Data Development Ahmed Alorage
 
Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Zach Gardner
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 

Mais procurados (20)

Data Quality Technical Architecture
Data Quality Technical ArchitectureData Quality Technical Architecture
Data Quality Technical Architecture
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big Data
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
03 data mining : data warehouse
03 data mining : data warehouse03 data mining : data warehouse
03 data mining : data warehouse
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
 
What is Data Science
What is Data ScienceWhat is Data Science
What is Data Science
 
‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management ‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management
 
Chapter 5: Data Development
Chapter 5: Data Development Chapter 5: Data Development
Chapter 5: Data Development
 
Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
Nist.sp.800 61r2
Nist.sp.800 61r2Nist.sp.800 61r2
Nist.sp.800 61r2
 
E Discovery
E DiscoveryE Discovery
E Discovery
 

Semelhante a EDiscovery Presentation

E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competencejcassd619
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008John Jablonski
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?WileyReinLLP
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizurerlhicksjr
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsJohn Jablonski
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 

Semelhante a EDiscovery Presentation (20)

Daniel day
Daniel dayDaniel day
Daniel day
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?Go Ask Alice: The End of Computer-Implemented U.S. Patents?
Go Ask Alice: The End of Computer-Implemented U.S. Patents?
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal Holds
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 

EDiscovery Presentation

Notas do Editor

  1. Corporate technologies – in recent study conducted by Kroll, only 50% of companies have updated their ESI discovery policies to include commonly utilized corporate technologies such as mobile devices, social networking sites, virtualization and IM (as of 2006, 81% of corporate executives were connected through mobile devices all the time and 76% of Fortune 100 companies are using social media platforms aka twitter – twitter top social media platform as of 8/3/09 www.mashable.com). Even the president stays connected - Barack Obama is first president to have PDA (wonder if he’s ever butt-dialed anyone)
  2. Many companies have document retention policies, but much less are ready to implement a discovery plan once discovery begins (conflicting priorities between legal dept. and IT), corporations trying to handle more cases with fewer resources, pressure to decrease costs while at the same time minimizing risks
  3. 1354- Reasonably accessible – undue burden or cost (insert from paper), for motion to compel BOP on person from whom production is sought (not requesting party), if they show it’s not reasonably accessible, then BOP shifts to requesting party to show good cause why production should be ordered – court may specify conditions, including allocation of cost 1424 – absolute prohibition on attorney opinion work product (CTA expand) 1425 – not discoverable absent showing of exceptional circumstances that impractical to obtain from other sources- DOES NOT preclude discovery of facts or data expert relied upon (if document contains both – can redact) 1460 – when business recs consist of ESI – you can produce as regularly maintained, or have option for inspection when burden on the same for each party 1461 – 2007 changes to 1461 and 1462 – requesting party, within scope of 1422 and 1425 can now inspect and copy the product of a computer (such as paper printout or copy on disc), no initial right to inspect computer (unless the producing party chooses to or under 1462E a court compels production) 1462(E) – specifying form (native format – metadata included – be careful what you wish for) when ESI production insufficient or not in compliance, file motion to compel – court may allow inspect, copy, test, and sample the designated ESI within scope of 1422 and 1425 1471 – good faith requirement (sanctions can’t be imposed when ESI has been lost due to routine, good faith operation of an electronic information system absent exceptional circumstances) 1551 – similar to F.R.C.P. 26 meet and confer – issues related to ESI, including forms of production – may order non-complying party to pay costs