SlideShare uma empresa Scribd logo
1 de 93
Keeping Inviolate Clients’
    Secrets in the Age of
Electronic Communications,
    Websites, and Emails
       A Game of E-Discovery Jeopardy

    Suzanne D. Meehle
       Innes & Meehle, P.L.
      730 Maitland Avenue
Altamonte Springs, Florida 32701
      Phone 407-792-6503
        Fax 407-792-6504
Email suzanne@innesmeehle.com
WHO ARE YOU?
                                            AND WHY SHOULD
                                             I LISTEN TO YOU
                                                 ANYWAY?
Hi! I’m Suzanne.

I grew up in Huntsville, Alabama - home of Werner Von Braun’s rocket program - and moved to Central Florida
in 1999. I graduated magna cum laude from the University of Alabama in Huntsville with a Bachelor of Arts in
English in 1991. Despite my liberal arts background, I stumbled into a 10+ year as a systems engineer working
for a number of start-up software and heath care technology firms as well as running my own consulting
business. In plain English,I was a computer network and database “geek,” and I really understand computer
systems: networks, operating systems, databases, data warehouses, email servers, ... you get the idea.

I went on to obtain a Juris Doctor from Barry University School of Law, graduating cum laude in 2003. I
previously worked as an associate with ShuffieldLowman, where I specialized in corporate transactions and
intellectual property.  Because of my background, I also became the “go to” person when e-discovery issues
reared their ugly heads in our litigation department. Most of the time, I happily worked on the side of litigation
avoidance, but I have drafted my share of litigation hold letters and given plenty of lectures to my clients about
preservation of electronic evidence. Oh, and in December 2008, I received my certification in e-discovery from
Kroll Ontrack.

And if that doesn’t convince you, there’s always the chocolate.
RULES
• At the top of the screen you will see the
  selected topic or category. (Sorry! You don’t
  get to choose the category.)

• An answer will appear on the screen before
  you.

• Raise your hand quickly if you know the
  response and wait to be called.

• Remember    that your response must be in
  the form of a question.
Oath Text
Oath Text
This duty is imposed on Florida lawyers by the
Oath of the Florida Bar regarding client
communications.
Oath Text
This duty is imposed on Florida lawyers by the
Oath of the Florida Bar regarding client
communications.
What is maintaining confidentiality and
preserving inviolate the secrets of client
communications?
Oath Text
Oath Text
These days, client communications include all of
these.
Oath Text
These days, client communications include all of
these.

What are electronic communications between
client and attorney, including text (SMS)
messages, email messages, instant messages
(IMs), fax messages, and voice mail.
GENERAL ETHICS
GENERAL ETHICS
Florida lawyers must abide by this code of
ethics and responsibility.
GENERAL ETHICS
Florida lawyers must abide by this code of
ethics and responsibility.

What are the Rules Regulating The Florida
Bar (or more specifically, Section 4 - The
Rules of Professional Conduct)?
GENERAL CONFIDENTIALITY
GENERAL CONFIDENTIALITY
This duty is imposed on Florida lawyers
regarding client communications.
GENERAL CONFIDENTIALITY
This duty is imposed on Florida lawyers
regarding client communications.
What is protecting the confidences of all clients
and abiding all statutes or rules now in effect or
hereafter to be enacted controlling privileged
communications?
ELECTRONIC
COMMUNICATION
ELECTRONIC
       COMMUNICATION
The Rules regard electronically stored client
communication as this.
ELECTRONIC
        COMMUNICATION
The Rules regard electronically stored client
communication as this.
What is privileged?

(Yeah - it’s obvious, but give it a minute to sink
in. That means that those emails and cell phone
calls have to be secure!)
GLOSSARY
GLOSSARY
“ESI”
GLOSSARY
“ESI”
What is the commonly-used abbreviation for
“Electronically Stored Information?”
GLOSSARY
GLOSSARY
This type of information deals with a particular
data set which describes how, when and by
whom the data was collected, created,
accessed, or modified and how it is formatted
and is fully discoverable.
GLOSSARY
This type of information deals with a particular
data set which describes how, when and by
whom the data was collected, created,
accessed, or modified and how it is formatted
and is fully discoverable.
What is “metadata?”

See The Sedona Guidelines: Best Practice
Guidelines & Commentar y for Managing
Information & Records in the Electronic Age.
GLOSSARY
GLOSSARY

Hash algorithms
GLOSSARY

Hash algorithms
What are the numerical values assigned to
individual data files that uniquely identify
each electronic file every time it is moved,
printed, altered or otherwise “handled” by
a computer user?
GLOSSARY
GLOSSARY
Native format
GLOSSARY
Native format
What is the original file format that an
application uses internally when creating a
document, database or other ESI?
GLOSSARY
GLOSSARY
These files have been deleted and are no
longer listed in the operating system but are
located on a hard drive or other stored
device, in whole or in part, because they have
not yet been overwritten.
GLOSSARY
These files have been deleted and are no
longer listed in the operating system but are
located on a hard drive or other stored
device, in whole or in part, because they have
not yet been overwritten.
What are “double deleted” files?
GLOSSARY
GLOSSARY
Keyword, Boolean, proximity and concept are
four of these.
GLOSSARY
Keyword, Boolean, proximity and concept are
four of these.

What are types of searches?
GLOSSARY
GLOSSARY
These are files that may NOT be “reasonably
accessible” because they require obsolete, no
longer used, or not easily available software.
GLOSSARY
These are files that may NOT be “reasonably
accessible” because they require obsolete, no
longer used, or not easily available software.

What are legacy files?
THE NEW RULES
THE NEW RULES
Though Florida has yet to adopt formal
statewide rules for dealing with electronic
evidence, most State judges, when confronted
with e-discovery issues, do this.
THE NEW RULES
Though Florida has yet to adopt formal
statewide rules for dealing with electronic
evidence, most State judges, when confronted
with e-discovery issues, do this.
What is follow the Federal Rules of Civil
Procedure and federal court decisions regarding
e-discovery?
THE NEW RULES
THE NEW RULES
How a party may be able to recover from an
inadver tent disclosure of privileged
communication.
THE NEW RULES
How a party may be able to recover from an
inadver tent disclosure of privileged
communication.
What is the “clawback” provision of FRCP Rule
26(b)(5)(B)?
Rule 25(b)(5)(B) states: “If information produced in discovery is subject to a
claim of privilege or of protection as trial preparation material, the party making
the claim may notify any party that received the information of the claim and the
basis for it. After being notified, a party must promptly return, sequester, or
destroy the specified information and any copies it has; must not use or disclose
the information until the claim is resolved; must take reasonable steps to retrieve
the information if the party disclosed it before being notified; and may promptly
present the information to the court under seal for a determination of the
claim. The producing party must preserve the information until the claim is
resolved.”
THE NEW RULES
THE NEW RULES
The new Federal Rules of Civil Procedure
dealing with e-discovery went into effect on
this date.
THE NEW RULES
The new Federal Rules of Civil Procedure
dealing with e-discovery went into effect on
this date.

What is December 1, 2006? (Not so “new,” are
they?)
THE NEW RULES
THE NEW RULES
The five-part e-discovery rulings in this case,
which predates the 2006 FRCP, highly
influenced the “new” Rules as well as the
courts that have interpreted the Rules.
THE NEW RULES
The five-part e-discovery rulings in this case,
which predates the 2006 FRCP, highly
influenced the “new” Rules as well as the
courts that have interpreted the Rules.


What is Zubulake v. USB Warburg?
E-DISCO INFERNO
E-DISCO INFERNO
E-DISCO INFERNO
The so-called “Zubulake duty” refers to the
lawyer’s duty to do this under FRCP 26(f)?
E-DISCO INFERNO
The so-called “Zubulake duty” refers to the
lawyer’s duty to do this under FRCP 26(f)?
What is becoming fully familiar with the client’s
data retention architecture?
E-DISCO INFERNO
The so-called “Zubulake duty” refers to the
lawyer’s duty to do this under FRCP 26(f)?
What is becoming fully familiar with the client’s
data retention architecture?

Rule 26(f) requires that the parties to litigation
meet and confer early in the litigation to discuss
the scope of and agree on rules for discovery,
during which counsel must be prepared to provide
details regarding the location of and nature of any
relevant ESI.
E-DISCO INFERNO
E-DISCO INFERNO
These are two of the many places where
relevant data may be stored (e.g. where the
lawyer will be expected to look) .
E-DISCO INFERNO
These are two of the many places where
relevant data may be stored (e.g. where the
lawyer will be expected to look) .

We will accept any two of these:

What are tapes, hard drives, portable storage
devices (thumb/jump drives), networks, mobile
devices (cell phones, pager s), home
computers, PBX (voicemail) systems, RAID
arrays, or servers?
E-DISCO INFERNO
E-DISCO INFERNO
How Judge Sheindlin defines “gross negligence” in preserving
electronic evidence in  Pension Comm. of the Univ. of Montreal
Pension Plan v.   Banc of America Sec., LLC, 2010 WL 184312
(S.D.N.Y. Jan. 15, 2010). 
E-DISCO INFERNO
How Judge Sheindlin defines “gross negligence” in preserving
electronic evidence in  Pension Comm. of the Univ. of Montreal
Pension Plan v.   Banc of America Sec., LLC, 2010 WL 184312
(S.D.N.Y. Jan. 15, 2010). 
“After a discovery duty is well established, the failure to
adhere to contemporary standards can be considered
gross negligence... (T)he following failures support a finding of gross
negligence...: to issue a written litigation hold, to identify the key
players and to ensure that their electronic and paper records are
preserved, to cease the deletion of email or to preserve the
records of former employees that are in a party’s possession,
custody, or control, and to preserve backup tapes when they are
the sole source of relevant information or when they relate to key
players, if the relevant information maintained by those players is
not obtainable from readily accessible sources.
E-DISCO INFERNO
E-DISCO INFERNO
Ralph Losey, in his book Introduction to e-
Discovery, calls this “the number one trend” in
e-discovery.
E-DISCO INFERNO
Ralph Losey, in his book Introduction to e-
Discovery, calls this “the number one trend” in
e-discovery.
What is abuse of e-discovery?

The large volume of information that is stored
electronically by many companies has led
some lawyers to make discovery battles more
important than the actual merits of the case.
E-DISCO INFERNO
E-DISCO INFERNO
This is the estimated percentage of electronic
records that are never converted to paper in the
ordinary course of business.
E-DISCO INFERNO
This is the estimated percentage of electronic
records that are never converted to paper in the
ordinary course of business.

What is 80%?

That means... Most of the time you cannot
authenticate a printout of an e-mail as “kept in
the ordinary course of business.”
E-DISCO INFERNO
E-DISCO INFERNO
This is a common way that lawyers inadvertently
waive privilege.
E-DISCO INFERNO
This is a common way that lawyers inadvertently
waive privilege.
We will take either:

1. What is producing a privileged email or
   other electronic document?

2. What is failing to follow the client’s
   document retention policy?
E-DISCO INFERNO
E-DISCO INFERNO
In the context of e-discovery spoliation, courts have
sometimes allowed this erosion of attorney-client
privilege.
E-DISCO INFERNO
In the context of e-discovery spoliation, courts have
sometimes allowed this erosion of attorney-client
privilege.

What is the mandatory waiver of privilege during the
deposition of counsel regarding document
preservation, collection and production?
E-DISCO INFERNO
E-DISCO INFERNO
Lawyers most often make inadvertent
disclosures of privileged information by doing
this.
E-DISCO INFERNO
Lawyers most often make inadvertent
disclosures of privileged information by doing
this.
What is treating electronic discover y
nonchalantly?
See Gragg v. International Management Group, Inc.,
2007 WL 1074894 (N.D.N.Y April 2007) (determining
that in-house counsel, who delegated preparation and
production of ESI to non-attorney assistant, and outside
counsel, who forwarded the same to plaintiff ’s attorney
without reviewing the production, had voluntarily
waived privilege through their nonchalance).
E-DISCO INFERNO
E-DISCO INFERNO
Metadata is useful in establishing or discounting
this.
E-DISCO INFERNO
Metadata is useful in establishing or discounting
this.

What are the legal elements of a claim or
defense (especially when used to show
knowledge, notice or spoliation of evidence)?
E-DISCO INFERNO
E-DISCO INFERNO
Useful or not, to be admitted into evidence
metadata must also be this.
E-DISCO INFERNO
Useful or not, to be admitted into evidence
metadata must also be this.
Relevant and properly authenticated.
E-DISCO INFERNO
E-DISCO INFERNO
This court specifically ordered metadata
production by enumerating relevant metadata
fields, thereby creating a blueprint for metadata
production for other courts.
E-DISCO INFERNO
This court specifically ordered metadata
production by enumerating relevant metadata
fields, thereby creating a blueprint for metadata
production for other courts.
What is the Middle District of Florida?

See In re Seroquel Prods. Liab. Litig., 2007 WL
219989 (M.D. Fla., Jan. 26, 2007) (U.S. Magistrate
Judge David A. Barker found that sanctions were
warranted for the defendant's "purposefully sluggish"
ESI production and failure to produce "usable" or
"reasonably accessible" documents).
E-DISCO INFERNO
E-DISCO INFERNO
Issued in August 2009, the first set of e-discovery
rules, following in large part the Federal Rules, sets
the standard for e-discovery in Florida State courts.
E-DISCO INFERNO
Issued in August 2009, the first set of e-discovery
rules, following in large part the Federal Rules, sets
the standard for e-discovery in Florida State courts.
What are the Complex Business Litigation Division
Amended Procedures for the Thirteenth Judicial
Circuit Court in and for Hillsborough County,
Florida?

Orange County may be next if the judges have their
way. Bottom line - Florida judges “get” e-discovery!
FINAL JEOPARDY:
 “NOT MY JOB”
FINAL JEOPARDY:
            “NOT MY JOB”
In In re A & M Florida Properties II, LLC, 2010 WL
1418861 (Bankr. S.D.N.Y. Apr. 7, 2010), Plaintiff ’s
lawyers were found to be this when they over-
delegated to their client the lawyers’ duty to find
and collect digital evidence.
FINAL JEOPARDY:
            “NOT MY JOB”
In In re A & M Florida Properties II, LLC, 2010 WL
1418861 (Bankr. S.D.N.Y. Apr. 7, 2010), Plaintiff ’s
lawyers were found to be this when they over-
delegated to their client the lawyers’ duty to find
and collect digital evidence.
What is negligent?

While the Bankruptcy Court found no bad faith on
the part of the lawyers or their clients, the Court
determined that the lawyers’ failure to adequately
educate their clients regarding the need to preserve
and search email archives was negligent.
Suzanne D. Meehle

Email: suzanne@innesmeehle.com
Web: http://www.innesmeehle.com

Mais conteúdo relacionado

Mais procurados

ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
 
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...Vivastream
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics PresentationJonathan Ezor
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
Blake Lapthorn Thames Valley HR forum - 10 May 2011
Blake Lapthorn Thames Valley HR forum - 10 May 2011Blake Lapthorn Thames Valley HR forum - 10 May 2011
Blake Lapthorn Thames Valley HR forum - 10 May 2011Blake Morgan
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethicsJunaid Qadir
 

Mais procurados (18)

ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and Licensing
 
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Employees’ Privacy Rights In The Digital Age
Employees’ Privacy Rights In The Digital AgeEmployees’ Privacy Rights In The Digital Age
Employees’ Privacy Rights In The Digital Age
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Blake Lapthorn Thames Valley HR forum - 10 May 2011
Blake Lapthorn Thames Valley HR forum - 10 May 2011Blake Lapthorn Thames Valley HR forum - 10 May 2011
Blake Lapthorn Thames Valley HR forum - 10 May 2011
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 

Destaque

Embedding semantic annotations within texts: the FRETTA approach
Embedding semantic annotations within texts: the FRETTA approachEmbedding semantic annotations within texts: the FRETTA approach
Embedding semantic annotations within texts: the FRETTA approachUniversity of Bologna
 
Diaporama retraite 30 sept
Diaporama retraite 30 septDiaporama retraite 30 sept
Diaporama retraite 30 septboltoncharlotte
 
Characterising citations in scholarly articles: an experiment
Characterising citations in scholarly articles: an experimentCharacterising citations in scholarly articles: an experiment
Characterising citations in scholarly articles: an experimentUniversity of Bologna
 
Catalogue ROSIERS 2013 - Pépinières Michel Taillandier
Catalogue ROSIERS 2013 - Pépinières Michel TaillandierCatalogue ROSIERS 2013 - Pépinières Michel Taillandier
Catalogue ROSIERS 2013 - Pépinières Michel Taillandiersmact
 
E-Discovery Ethics CLE
E-Discovery Ethics CLE E-Discovery Ethics CLE
E-Discovery Ethics CLE Suzanne Meehle
 

Destaque (6)

Embedding semantic annotations within texts: the FRETTA approach
Embedding semantic annotations within texts: the FRETTA approachEmbedding semantic annotations within texts: the FRETTA approach
Embedding semantic annotations within texts: the FRETTA approach
 
Diaporama retraite 30 sept
Diaporama retraite 30 septDiaporama retraite 30 sept
Diaporama retraite 30 sept
 
Characterising citations in scholarly articles: an experiment
Characterising citations in scholarly articles: an experimentCharacterising citations in scholarly articles: an experiment
Characterising citations in scholarly articles: an experiment
 
Catalogue ROSIERS 2013 - Pépinières Michel Taillandier
Catalogue ROSIERS 2013 - Pépinières Michel TaillandierCatalogue ROSIERS 2013 - Pépinières Michel Taillandier
Catalogue ROSIERS 2013 - Pépinières Michel Taillandier
 
E-Discovery Ethics CLE
E-Discovery Ethics CLE E-Discovery Ethics CLE
E-Discovery Ethics CLE
 
Make your business
Make your businessMake your business
Make your business
 

Semelhante a E-Discovert Ethhics CLE April 25 2010

Content = Communication: What is Plain Language and Why Should You Care?
Content = Communication: What is Plain Language and Why Should You Care?Content = Communication: What is Plain Language and Why Should You Care?
Content = Communication: What is Plain Language and Why Should You Care?Deborah S. Bosley
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalAubrey Owens
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
Ten steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionTen steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionJeffJohnson442
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizurerlhicksjr
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...J. David Morris
 
Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics OklahomaJon Sutten
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
 
Whats The Fuss?
Whats The Fuss? Whats The Fuss?
Whats The Fuss? barrp
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentationShanonNasoni
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
Older Generation Vs Younger Generation Essay
Older Generation Vs Younger Generation EssayOlder Generation Vs Younger Generation Essay
Older Generation Vs Younger Generation EssayPatty Loen
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 

Semelhante a E-Discovert Ethhics CLE April 25 2010 (20)

Content = Communication: What is Plain Language and Why Should You Care?
Content = Communication: What is Plain Language and Why Should You Care?Content = Communication: What is Plain Language and Why Should You Care?
Content = Communication: What is Plain Language and Why Should You Care?
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the Paralegal
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Ten steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selectionTen steps for early awareness and relevance/non-relevance selection
Ten steps for early awareness and relevance/non-relevance selection
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
 
Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
 
Whats The Fuss?
Whats The Fuss? Whats The Fuss?
Whats The Fuss?
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentation
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Older Generation Vs Younger Generation Essay
Older Generation Vs Younger Generation EssayOlder Generation Vs Younger Generation Essay
Older Generation Vs Younger Generation Essay
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Be A Wonk
Be A WonkBe A Wonk
Be A Wonk
 

Último

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 

Último (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 

E-Discovert Ethhics CLE April 25 2010

  • 1. Keeping Inviolate Clients’ Secrets in the Age of Electronic Communications, Websites, and Emails A Game of E-Discovery Jeopardy Suzanne D. Meehle Innes & Meehle, P.L. 730 Maitland Avenue Altamonte Springs, Florida 32701 Phone 407-792-6503 Fax 407-792-6504 Email suzanne@innesmeehle.com
  • 2. WHO ARE YOU? AND WHY SHOULD I LISTEN TO YOU ANYWAY? Hi! I’m Suzanne. I grew up in Huntsville, Alabama - home of Werner Von Braun’s rocket program - and moved to Central Florida in 1999. I graduated magna cum laude from the University of Alabama in Huntsville with a Bachelor of Arts in English in 1991. Despite my liberal arts background, I stumbled into a 10+ year as a systems engineer working for a number of start-up software and heath care technology firms as well as running my own consulting business. In plain English,I was a computer network and database “geek,” and I really understand computer systems: networks, operating systems, databases, data warehouses, email servers, ... you get the idea. I went on to obtain a Juris Doctor from Barry University School of Law, graduating cum laude in 2003. I previously worked as an associate with ShuffieldLowman, where I specialized in corporate transactions and intellectual property.  Because of my background, I also became the “go to” person when e-discovery issues reared their ugly heads in our litigation department. Most of the time, I happily worked on the side of litigation avoidance, but I have drafted my share of litigation hold letters and given plenty of lectures to my clients about preservation of electronic evidence. Oh, and in December 2008, I received my certification in e-discovery from Kroll Ontrack. And if that doesn’t convince you, there’s always the chocolate.
  • 3. RULES • At the top of the screen you will see the selected topic or category. (Sorry! You don’t get to choose the category.) • An answer will appear on the screen before you. • Raise your hand quickly if you know the response and wait to be called. • Remember that your response must be in the form of a question.
  • 5. Oath Text This duty is imposed on Florida lawyers by the Oath of the Florida Bar regarding client communications.
  • 6. Oath Text This duty is imposed on Florida lawyers by the Oath of the Florida Bar regarding client communications. What is maintaining confidentiality and preserving inviolate the secrets of client communications?
  • 8. Oath Text These days, client communications include all of these.
  • 9. Oath Text These days, client communications include all of these. What are electronic communications between client and attorney, including text (SMS) messages, email messages, instant messages (IMs), fax messages, and voice mail.
  • 11. GENERAL ETHICS Florida lawyers must abide by this code of ethics and responsibility.
  • 12. GENERAL ETHICS Florida lawyers must abide by this code of ethics and responsibility. What are the Rules Regulating The Florida Bar (or more specifically, Section 4 - The Rules of Professional Conduct)?
  • 14. GENERAL CONFIDENTIALITY This duty is imposed on Florida lawyers regarding client communications.
  • 15. GENERAL CONFIDENTIALITY This duty is imposed on Florida lawyers regarding client communications. What is protecting the confidences of all clients and abiding all statutes or rules now in effect or hereafter to be enacted controlling privileged communications?
  • 17. ELECTRONIC COMMUNICATION The Rules regard electronically stored client communication as this.
  • 18. ELECTRONIC COMMUNICATION The Rules regard electronically stored client communication as this. What is privileged? (Yeah - it’s obvious, but give it a minute to sink in. That means that those emails and cell phone calls have to be secure!)
  • 21. GLOSSARY “ESI” What is the commonly-used abbreviation for “Electronically Stored Information?”
  • 23. GLOSSARY This type of information deals with a particular data set which describes how, when and by whom the data was collected, created, accessed, or modified and how it is formatted and is fully discoverable.
  • 24. GLOSSARY This type of information deals with a particular data set which describes how, when and by whom the data was collected, created, accessed, or modified and how it is formatted and is fully discoverable. What is “metadata?” See The Sedona Guidelines: Best Practice Guidelines & Commentar y for Managing Information & Records in the Electronic Age.
  • 27. GLOSSARY Hash algorithms What are the numerical values assigned to individual data files that uniquely identify each electronic file every time it is moved, printed, altered or otherwise “handled” by a computer user?
  • 30. GLOSSARY Native format What is the original file format that an application uses internally when creating a document, database or other ESI?
  • 32. GLOSSARY These files have been deleted and are no longer listed in the operating system but are located on a hard drive or other stored device, in whole or in part, because they have not yet been overwritten.
  • 33. GLOSSARY These files have been deleted and are no longer listed in the operating system but are located on a hard drive or other stored device, in whole or in part, because they have not yet been overwritten. What are “double deleted” files?
  • 35. GLOSSARY Keyword, Boolean, proximity and concept are four of these.
  • 36. GLOSSARY Keyword, Boolean, proximity and concept are four of these. What are types of searches?
  • 38. GLOSSARY These are files that may NOT be “reasonably accessible” because they require obsolete, no longer used, or not easily available software.
  • 39. GLOSSARY These are files that may NOT be “reasonably accessible” because they require obsolete, no longer used, or not easily available software. What are legacy files?
  • 41. THE NEW RULES Though Florida has yet to adopt formal statewide rules for dealing with electronic evidence, most State judges, when confronted with e-discovery issues, do this.
  • 42. THE NEW RULES Though Florida has yet to adopt formal statewide rules for dealing with electronic evidence, most State judges, when confronted with e-discovery issues, do this. What is follow the Federal Rules of Civil Procedure and federal court decisions regarding e-discovery?
  • 44. THE NEW RULES How a party may be able to recover from an inadver tent disclosure of privileged communication.
  • 45. THE NEW RULES How a party may be able to recover from an inadver tent disclosure of privileged communication. What is the “clawback” provision of FRCP Rule 26(b)(5)(B)? Rule 25(b)(5)(B) states: “If information produced in discovery is subject to a claim of privilege or of protection as trial preparation material, the party making the claim may notify any party that received the information of the claim and the basis for it. After being notified, a party must promptly return, sequester, or destroy the specified information and any copies it has; must not use or disclose the information until the claim is resolved; must take reasonable steps to retrieve the information if the party disclosed it before being notified; and may promptly present the information to the court under seal for a determination of the claim. The producing party must preserve the information until the claim is resolved.”
  • 47. THE NEW RULES The new Federal Rules of Civil Procedure dealing with e-discovery went into effect on this date.
  • 48. THE NEW RULES The new Federal Rules of Civil Procedure dealing with e-discovery went into effect on this date. What is December 1, 2006? (Not so “new,” are they?)
  • 50. THE NEW RULES The five-part e-discovery rulings in this case, which predates the 2006 FRCP, highly influenced the “new” Rules as well as the courts that have interpreted the Rules.
  • 51. THE NEW RULES The five-part e-discovery rulings in this case, which predates the 2006 FRCP, highly influenced the “new” Rules as well as the courts that have interpreted the Rules. What is Zubulake v. USB Warburg?
  • 54. E-DISCO INFERNO The so-called “Zubulake duty” refers to the lawyer’s duty to do this under FRCP 26(f)?
  • 55. E-DISCO INFERNO The so-called “Zubulake duty” refers to the lawyer’s duty to do this under FRCP 26(f)? What is becoming fully familiar with the client’s data retention architecture?
  • 56. E-DISCO INFERNO The so-called “Zubulake duty” refers to the lawyer’s duty to do this under FRCP 26(f)? What is becoming fully familiar with the client’s data retention architecture? Rule 26(f) requires that the parties to litigation meet and confer early in the litigation to discuss the scope of and agree on rules for discovery, during which counsel must be prepared to provide details regarding the location of and nature of any relevant ESI.
  • 58. E-DISCO INFERNO These are two of the many places where relevant data may be stored (e.g. where the lawyer will be expected to look) .
  • 59. E-DISCO INFERNO These are two of the many places where relevant data may be stored (e.g. where the lawyer will be expected to look) . We will accept any two of these: What are tapes, hard drives, portable storage devices (thumb/jump drives), networks, mobile devices (cell phones, pager s), home computers, PBX (voicemail) systems, RAID arrays, or servers?
  • 61. E-DISCO INFERNO How Judge Sheindlin defines “gross negligence” in preserving electronic evidence in  Pension Comm. of the Univ. of Montreal Pension Plan v.   Banc of America Sec., LLC, 2010 WL 184312 (S.D.N.Y. Jan. 15, 2010). 
  • 62. E-DISCO INFERNO How Judge Sheindlin defines “gross negligence” in preserving electronic evidence in  Pension Comm. of the Univ. of Montreal Pension Plan v.   Banc of America Sec., LLC, 2010 WL 184312 (S.D.N.Y. Jan. 15, 2010).  “After a discovery duty is well established, the failure to adhere to contemporary standards can be considered gross negligence... (T)he following failures support a finding of gross negligence...: to issue a written litigation hold, to identify the key players and to ensure that their electronic and paper records are preserved, to cease the deletion of email or to preserve the records of former employees that are in a party’s possession, custody, or control, and to preserve backup tapes when they are the sole source of relevant information or when they relate to key players, if the relevant information maintained by those players is not obtainable from readily accessible sources.
  • 64. E-DISCO INFERNO Ralph Losey, in his book Introduction to e- Discovery, calls this “the number one trend” in e-discovery.
  • 65. E-DISCO INFERNO Ralph Losey, in his book Introduction to e- Discovery, calls this “the number one trend” in e-discovery. What is abuse of e-discovery? The large volume of information that is stored electronically by many companies has led some lawyers to make discovery battles more important than the actual merits of the case.
  • 67. E-DISCO INFERNO This is the estimated percentage of electronic records that are never converted to paper in the ordinary course of business.
  • 68. E-DISCO INFERNO This is the estimated percentage of electronic records that are never converted to paper in the ordinary course of business. What is 80%? That means... Most of the time you cannot authenticate a printout of an e-mail as “kept in the ordinary course of business.”
  • 70. E-DISCO INFERNO This is a common way that lawyers inadvertently waive privilege.
  • 71. E-DISCO INFERNO This is a common way that lawyers inadvertently waive privilege. We will take either: 1. What is producing a privileged email or other electronic document? 2. What is failing to follow the client’s document retention policy?
  • 73. E-DISCO INFERNO In the context of e-discovery spoliation, courts have sometimes allowed this erosion of attorney-client privilege.
  • 74. E-DISCO INFERNO In the context of e-discovery spoliation, courts have sometimes allowed this erosion of attorney-client privilege. What is the mandatory waiver of privilege during the deposition of counsel regarding document preservation, collection and production?
  • 76. E-DISCO INFERNO Lawyers most often make inadvertent disclosures of privileged information by doing this.
  • 77. E-DISCO INFERNO Lawyers most often make inadvertent disclosures of privileged information by doing this. What is treating electronic discover y nonchalantly? See Gragg v. International Management Group, Inc., 2007 WL 1074894 (N.D.N.Y April 2007) (determining that in-house counsel, who delegated preparation and production of ESI to non-attorney assistant, and outside counsel, who forwarded the same to plaintiff ’s attorney without reviewing the production, had voluntarily waived privilege through their nonchalance).
  • 79. E-DISCO INFERNO Metadata is useful in establishing or discounting this.
  • 80. E-DISCO INFERNO Metadata is useful in establishing or discounting this. What are the legal elements of a claim or defense (especially when used to show knowledge, notice or spoliation of evidence)?
  • 82. E-DISCO INFERNO Useful or not, to be admitted into evidence metadata must also be this.
  • 83. E-DISCO INFERNO Useful or not, to be admitted into evidence metadata must also be this. Relevant and properly authenticated.
  • 85. E-DISCO INFERNO This court specifically ordered metadata production by enumerating relevant metadata fields, thereby creating a blueprint for metadata production for other courts.
  • 86. E-DISCO INFERNO This court specifically ordered metadata production by enumerating relevant metadata fields, thereby creating a blueprint for metadata production for other courts. What is the Middle District of Florida? See In re Seroquel Prods. Liab. Litig., 2007 WL 219989 (M.D. Fla., Jan. 26, 2007) (U.S. Magistrate Judge David A. Barker found that sanctions were warranted for the defendant's "purposefully sluggish" ESI production and failure to produce "usable" or "reasonably accessible" documents).
  • 88. E-DISCO INFERNO Issued in August 2009, the first set of e-discovery rules, following in large part the Federal Rules, sets the standard for e-discovery in Florida State courts.
  • 89. E-DISCO INFERNO Issued in August 2009, the first set of e-discovery rules, following in large part the Federal Rules, sets the standard for e-discovery in Florida State courts. What are the Complex Business Litigation Division Amended Procedures for the Thirteenth Judicial Circuit Court in and for Hillsborough County, Florida? Orange County may be next if the judges have their way. Bottom line - Florida judges “get” e-discovery!
  • 91. FINAL JEOPARDY: “NOT MY JOB” In In re A & M Florida Properties II, LLC, 2010 WL 1418861 (Bankr. S.D.N.Y. Apr. 7, 2010), Plaintiff ’s lawyers were found to be this when they over- delegated to their client the lawyers’ duty to find and collect digital evidence.
  • 92. FINAL JEOPARDY: “NOT MY JOB” In In re A & M Florida Properties II, LLC, 2010 WL 1418861 (Bankr. S.D.N.Y. Apr. 7, 2010), Plaintiff ’s lawyers were found to be this when they over- delegated to their client the lawyers’ duty to find and collect digital evidence. What is negligent? While the Bankruptcy Court found no bad faith on the part of the lawyers or their clients, the Court determined that the lawyers’ failure to adequately educate their clients regarding the need to preserve and search email archives was negligent.
  • 93. Suzanne D. Meehle Email: suzanne@innesmeehle.com Web: http://www.innesmeehle.com

Notas do Editor

  1. 1. 10+ years as a systems engineer = geek cred 2. 3+ years doing e-disco 3. Asked by Hon. Jose Rodriguez to put this together for another CLE/CJE program at Barry 4. Chocolate
  2. maintaining confidentiality and preserving inviolate the secrets of client communications
  3. maintaining confidentiality and preserving inviolate the secrets of client communications
  4. electronic communications between client and attorney, including text (SMS) messages, email messages, instant messages (IMs), fax messages, and voice mail
  5. electronic communications between client and attorney, including text (SMS) messages, email messages, instant messages (IMs), fax messages, and voice mail
  6. Either: 1. the Rules Regulating The Florida Bar; or 2. The Rules of Professional Conduct
  7. Either: 1. the Rules Regulating The Florida Bar; or 2. The Rules of Professional Conduct
  8. protect client confidences and abidie all statutes or rules controlling privileged communications
  9. protect client confidences and abidie all statutes or rules controlling privileged communications
  10. privileged
  11. privileged
  12. Electronically Stored Information
  13. Electronically Stored Information
  14. metada
  15. metada
  16. numerical values that uniquely identify individual data files, including even minor revisions of the “same” file
  17. numerical values that uniquely identify individual data files, including even minor revisions of the “same” file
  18. Original file format (whatever that may be)
  19. Original file format (whatever that may be)
  20. double deleted files
  21. double deleted files
  22. Types of searches
  23. Types of searches
  24. legacy files
  25. legacy files
  26. Follow: 1. FRCP 2. Federal court decisions 3. Sedona Principles
  27. Follow: 1. FRCP 2. Federal court decisions 3. Sedona Principles
  28. In the event of inadvertent disclosure, Must notify the party that received the information of the claim of privilege and the basis for it. After being notified, a party1. Must promptly return, sequester, or destroy the specified information;2. Must not use or disclose the information until the claim is resolved.3. Must take reasonable steps to retrieve the information if the party disclosed it before being notified; and 4. May promptly present the information to the court under seal for a determination of the claim. The producing party must preserve the information until the claim is resolved.
  29. In the event of inadvertent disclosure, Must notify the party that received the information of the claim of privilege and the basis for it. After being notified, a party1. Must promptly return, sequester, or destroy the specified information;2. Must not use or disclose the information until the claim is resolved.3. Must take reasonable steps to retrieve the information if the party disclosed it before being notified; and 4. May promptly present the information to the court under seal for a determination of the claim. The producing party must preserve the information until the claim is resolved.
  30. 12/1/2006
  31. 12/1/2006
  32. Zubulake v. U.S.B. Warburg (I-V), SDNY 2004, Judge Shira Aa. Sheindlin
  33. Zubulake v. U.S.B. Warburg (I-V), SDNY 2004, Judge Shira Aa. Sheindlin
  34. become fully familiar with the client’s data retention architecture
  35. become fully familiar with the client’s data retention architecture
  36. become fully familiar with the client’s data retention architecture
  37. become fully familiar with the client’s data retention architecture
  38. We will accept any two of these: What are tapes, hard drives, portable storage devices (thumb/jump drives), networks, mobile devices (cell phones, pagers), home computers, PBX (voicemail) systems, RAID arrays, or servers?
  39. We will accept any two of these: What are tapes, hard drives, portable storage devices (thumb/jump drives), networks, mobile devices (cell phones, pagers), home computers, PBX (voicemail) systems, RAID arrays, or servers?
  40. “failure to adhere to contemporary standards” Sanctions included: 1. Adverse jury instruction that plaintiffs were grossly negligent in performing their discovery obligations and had lost evidence as a result; and that jury could adopt a rebuttable presumption that the lost evidence was relevant and would have favored the defendants; and  2. Monetary sanctions requiring plaintiffs to pay the defendants' reasonable attorney's fees and costs attributable to the discovery dispute.  3. Requirement to provide further discovery if possible, noting that the goal of discovery is "to obtain evidence, not to issue sanctions."   
  41. “failure to adhere to contemporary standards” Sanctions included: 1. Adverse jury instruction that plaintiffs were grossly negligent in performing their discovery obligations and had lost evidence as a result; and that jury could adopt a rebuttable presumption that the lost evidence was relevant and would have favored the defendants; and  2. Monetary sanctions requiring plaintiffs to pay the defendants' reasonable attorney's fees and costs attributable to the discovery dispute.  3. Requirement to provide further discovery if possible, noting that the goal of discovery is "to obtain evidence, not to issue sanctions."   
  42. What is abuse of e-discovery?
  43. What is abuse of e-discovery?
  44. 80%
  45. 80%
  46. either: What is producing a privileged email or other electronic document? What is failing to follow the client’s document retention policy?
  47. either: What is producing a privileged email or other electronic document? What is failing to follow the client’s document retention policy?
  48. mandatory waiver of privilege during the deposition of counsel
  49. mandatory waiver of privilege during the deposition of counsel
  50. treating e-discovery nonchalantly
  51. treating e-discovery nonchalantly
  52. legal elements of a claim or defense
  53. legal elements of a claim or defense
  54. Relevant and properly authenticated.
  55. Relevant and properly authenticated.
  56. Middle District of Florida
  57. Middle District of Florida
  58. Complex Business Litigation Division Amended Procedures for the Thirteenth Judicial Circuit Court in and for Hillsborough County, Florida
  59. Complex Business Litigation Division Amended Procedures for the Thirteenth Judicial Circuit Court in and for Hillsborough County, Florida
  60. negligent
  61. negligent