SlideShare uma empresa Scribd logo
1 de 22
Litigation Holds A primer Debbie Westwood, Consultant Your on call litigation support department
What is a litigation hold? And is it any different to a legal hold?
A litigation hold is a process which an organization uses to preserve ALL forms of relevant information when litigation is reasonably anticipated
That means ESI too . . .
A litigation hold is a process . . . It is not a piece of software Some eDiscovery software can help automate litigation holds But it is not a substitute for human intelligence It is not a once-and-done task See Zubulake v. UBS Warburg, 2004 WL 1620866 (S.D.N.Y. July 20, 2004) (aka “Zubulake V”) Imposes a continuing obligation on lawyers to remind key players of their preservation obligation
A litigation hold is a process . . . Must be in writing See The Pension Committee of Montreal, et al. v. Banc of America Securities, et al., 05 Civ. 9016 (SDNY Jan. 15, 2010) (Judge Scheindlin wrote this opinion as well as the Zubulake opinions) See also Zubulake V Ideally want to have responses from key players (read receipts are not enough) Documentation is everything in eDiscovery
All forms of relevant information . . .
. . . when litigation is reasonably anticipated Case law varies enormously Phillip M. Adams & Associates, L.L.C. v. Dell, Inc., et al.,  2009 WL 910801 (D.Utah) Patent infringement case ASUS claimed “safe harbor rule” (FRCP 37(e)) ASUS left records management decisions entirely up to employees Judge imposed sanctions BUT Judge essentially argued that hold had to be implemented EIGHT YEARS before suit was filed
. . . when litigation is reasonably anticipated Phillip M. Adams & Associates, L.L.C. v. Dell, Inc., et al.,  2009 WL 910801 (D.Utah) This case is an outlier Generally there is a clear “trigger event” e.g. Letter from lawyer advising of potential claim Management discussion about a harassment event Doe v. Norwalk Community College, 248 F.R.D. 372 (D.Conn. 2007) Demand letters Threats of litigation or other evidence of intent to sue
The (almost) perfect litigation hold letter Includes a clear language summary of the legal issues Includes a list of example locations for data and possible types of relevant data Includes a contact person for questions Includes a list of key custodians Includes a list of things to NOT do (defrag, hardware upgrades, opening / moving / deleting files) Is sent to key custodians and IT staff Is followed up with an in-person questionnaire
Records management Key to effective litigation holds
Records management A.K.A. Records retention policy, data destruction policy, information management Refers to the storage, retention and destruction of data created in the course of business Subject to various regulations Tax, HIPAA, SOX, etc. Subject to business relevance Accounting records, orders, “business intelligence” Should include ALL sources of information
Records management How not to use your records management policy: Arthur Andersen LLP v. United States, 544 U.S. 696 (2005) August 2001:  Arthur Anderson knew about financial irregularities related to Enron October 2001:  Knew it would be subject to massive SEC investigation October 2001:  Email from in-house counsel reminding staff to comply with existing document retention program November 2001:  First subpoena from SEC
Records management ARMA International is a key source of information (www.arma.org) Effective records management = lower eDiscovery costs Effective records management = lower risk of spoliation Effective records management = lower data storage / maintenance costs Effective records management = retrievable, authentic, accurate information
Records management The challenge is figuring out what to keep . . . and what to destroy
How to preserve . . .	 An incomplete guide
How to preserve
How to preserve / collect Email: Grab PSTs from Exchange server Don’t forget local PST archives Grab NSFs from Lotus Domino Don’t forget local replicas, Notes ID files Office documents: Pinpoint Safecopy will make evidentiary sound copies of active data Can forensically image entire computer also
How to preserve / collect Databases: Live access Duplicate database structure & import relevant data (quite complex) Run reports (generally acceptable) Websites / online content: Wayback machine, HTTrack, Camstudio Subpoena to Facebook/Yahoo/Google/Twitter for private content Twitter: check out www.Arkovi.com
How to preserve / collect
How to preserve / collect Social media preservation in its infancy Wider issue is preservation of Web 2.0 content Not static Here today, gone tomorrow Pulls from multiple sources Not all publicly accessible Watch this space! Social media is increasingly important for “run-of-the-mill” litigation Divorces, personal injury, wrongful dismissals
Questions? Thank you! Debbie Westwood, Consultant Your on call litigation support department

Mais conteúdo relacionado

Destaque

Brodeur Sight Words
Brodeur Sight WordsBrodeur Sight Words
Brodeur Sight Wordsguest75628b
 
SABER HABITAR EL MON
SABER HABITAR EL MONSABER HABITAR EL MON
SABER HABITAR EL MONca04
 
H1N1 EĞİTİM Semineri
H1N1 EĞİTİM SemineriH1N1 EĞİTİM Semineri
H1N1 EĞİTİM Seminerianttab
 
en yüksek viyadük
en yüksek viyadüken yüksek viyadük
en yüksek viyadükhalid şen
 
Dynamic Earth
Dynamic EarthDynamic Earth
Dynamic Earthcourts
 
Internet Security
Internet SecurityInternet Security
Internet Securitybruce761207
 
Stewardship Verses
Stewardship VersesStewardship Verses
Stewardship Versesrevup321
 
Phoenix Energy Star Bulk Purchasing Presentation
Phoenix   Energy Star Bulk Purchasing PresentationPhoenix   Energy Star Bulk Purchasing Presentation
Phoenix Energy Star Bulk Purchasing PresentationICF_HCD
 
Institutions Struggeling with Web2.0
Institutions Struggeling with Web2.0Institutions Struggeling with Web2.0
Institutions Struggeling with Web2.0Hendrik Drachsler
 
Tips for grabbing and holding attention in online courses
Tips for grabbing and holding attention in online coursesTips for grabbing and holding attention in online courses
Tips for grabbing and holding attention in online coursesDr Graeme Salter
 
Q4M Microblogcon
Q4M MicroblogconQ4M Microblogcon
Q4M MicroblogconKazuho Oku
 
彩蝶计划2008版
彩蝶计划2008版彩蝶计划2008版
彩蝶计划2008版mingxia
 

Destaque (20)

Brodeur Sight Words
Brodeur Sight WordsBrodeur Sight Words
Brodeur Sight Words
 
SABER HABITAR EL MON
SABER HABITAR EL MONSABER HABITAR EL MON
SABER HABITAR EL MON
 
H1N1 EĞİTİM Semineri
H1N1 EĞİTİM SemineriH1N1 EĞİTİM Semineri
H1N1 EĞİTİM Semineri
 
Skanenordost 080520
Skanenordost 080520Skanenordost 080520
Skanenordost 080520
 
Analisi
AnalisiAnalisi
Analisi
 
en yüksek viyadük
en yüksek viyadüken yüksek viyadük
en yüksek viyadük
 
The CLAS APP
The CLAS APPThe CLAS APP
The CLAS APP
 
Dynamic Earth
Dynamic EarthDynamic Earth
Dynamic Earth
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Stewardship Verses
Stewardship VersesStewardship Verses
Stewardship Verses
 
παρουσίαση1van Gogh
παρουσίαση1van Goghπαρουσίαση1van Gogh
παρουσίαση1van Gogh
 
Del.Icio.Us
Del.Icio.UsDel.Icio.Us
Del.Icio.Us
 
Phoenix Energy Star Bulk Purchasing Presentation
Phoenix   Energy Star Bulk Purchasing PresentationPhoenix   Energy Star Bulk Purchasing Presentation
Phoenix Energy Star Bulk Purchasing Presentation
 
Institutions Struggeling with Web2.0
Institutions Struggeling with Web2.0Institutions Struggeling with Web2.0
Institutions Struggeling with Web2.0
 
Tips for grabbing and holding attention in online courses
Tips for grabbing and holding attention in online coursesTips for grabbing and holding attention in online courses
Tips for grabbing and holding attention in online courses
 
Eclipse@eBay
Eclipse@eBayEclipse@eBay
Eclipse@eBay
 
Q4M Microblogcon
Q4M MicroblogconQ4M Microblogcon
Q4M Microblogcon
 
網路安全
網路安全網路安全
網路安全
 
彩蝶计划2008版
彩蝶计划2008版彩蝶计划2008版
彩蝶计划2008版
 

Semelhante a Litigation Holds: A primer

Electric Insurance RM and ESI
Electric Insurance   RM and ESIElectric Insurance   RM and ESI
Electric Insurance RM and ESIJohn Jablonski
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalAubrey Owens
 
Ctin Ediscovery
Ctin EdiscoveryCtin Ediscovery
Ctin EdiscoveryCTIN
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]Phil Huggins FBCS CITP
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentationjmsobel1
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White PaperKevin Featherly
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610dparalegal
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNsJohn Trigg
 
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerLegally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerMark Hyde
 
Lec11chap10f04
Lec11chap10f04Lec11chap10f04
Lec11chap10f04screaminc
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011John Bambenek
 
Presentation @ 24th International Conference on Legal Knowledge and Informati...
Presentation @ 24th International Conference on Legal Knowledge and Informati...Presentation @ 24th International Conference on Legal Knowledge and Informati...
Presentation @ 24th International Conference on Legal Knowledge and Informati...Daniel Katz
 
Monica Crocker & Cathy Beil eDiscovery In The Real World
Monica Crocker & Cathy Beil eDiscovery In The Real WorldMonica Crocker & Cathy Beil eDiscovery In The Real World
Monica Crocker & Cathy Beil eDiscovery In The Real Worldguestacc6281
 
Sound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSeth Row
 

Semelhante a Litigation Holds: A primer (20)

EDI 2009 Smaller Stakes Litigation
EDI 2009 Smaller Stakes LitigationEDI 2009 Smaller Stakes Litigation
EDI 2009 Smaller Stakes Litigation
 
Electric Insurance RM and ESI
Electric Insurance   RM and ESIElectric Insurance   RM and ESI
Electric Insurance RM and ESI
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the Paralegal
 
Ctin Ediscovery
Ctin EdiscoveryCtin Ediscovery
Ctin Ediscovery
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentation
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610Unnatural Practice Of Case Management Revised 0610
Unnatural Practice Of Case Management Revised 0610
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNs
 
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerLegally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
 
Lec11chap10f04
Lec11chap10f04Lec11chap10f04
Lec11chap10f04
 
Disaster recovery enw
Disaster recovery enwDisaster recovery enw
Disaster recovery enw
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
 
Presentation @ 24th International Conference on Legal Knowledge and Informati...
Presentation @ 24th International Conference on Legal Knowledge and Informati...Presentation @ 24th International Conference on Legal Knowledge and Informati...
Presentation @ 24th International Conference on Legal Knowledge and Informati...
 
Paul Johnson
Paul JohnsonPaul Johnson
Paul Johnson
 
Monica Crocker & Cathy Beil eDiscovery In The Real World
Monica Crocker & Cathy Beil eDiscovery In The Real WorldMonica Crocker & Cathy Beil eDiscovery In The Real World
Monica Crocker & Cathy Beil eDiscovery In The Real World
 
Sound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSound E-Discovery Collection Practices
Sound E-Discovery Collection Practices
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Litigation Holds: A primer

  • 1. Litigation Holds A primer Debbie Westwood, Consultant Your on call litigation support department
  • 2. What is a litigation hold? And is it any different to a legal hold?
  • 3. A litigation hold is a process which an organization uses to preserve ALL forms of relevant information when litigation is reasonably anticipated
  • 4. That means ESI too . . .
  • 5. A litigation hold is a process . . . It is not a piece of software Some eDiscovery software can help automate litigation holds But it is not a substitute for human intelligence It is not a once-and-done task See Zubulake v. UBS Warburg, 2004 WL 1620866 (S.D.N.Y. July 20, 2004) (aka “Zubulake V”) Imposes a continuing obligation on lawyers to remind key players of their preservation obligation
  • 6. A litigation hold is a process . . . Must be in writing See The Pension Committee of Montreal, et al. v. Banc of America Securities, et al., 05 Civ. 9016 (SDNY Jan. 15, 2010) (Judge Scheindlin wrote this opinion as well as the Zubulake opinions) See also Zubulake V Ideally want to have responses from key players (read receipts are not enough) Documentation is everything in eDiscovery
  • 7. All forms of relevant information . . .
  • 8. . . . when litigation is reasonably anticipated Case law varies enormously Phillip M. Adams & Associates, L.L.C. v. Dell, Inc., et al.,  2009 WL 910801 (D.Utah) Patent infringement case ASUS claimed “safe harbor rule” (FRCP 37(e)) ASUS left records management decisions entirely up to employees Judge imposed sanctions BUT Judge essentially argued that hold had to be implemented EIGHT YEARS before suit was filed
  • 9. . . . when litigation is reasonably anticipated Phillip M. Adams & Associates, L.L.C. v. Dell, Inc., et al.,  2009 WL 910801 (D.Utah) This case is an outlier Generally there is a clear “trigger event” e.g. Letter from lawyer advising of potential claim Management discussion about a harassment event Doe v. Norwalk Community College, 248 F.R.D. 372 (D.Conn. 2007) Demand letters Threats of litigation or other evidence of intent to sue
  • 10. The (almost) perfect litigation hold letter Includes a clear language summary of the legal issues Includes a list of example locations for data and possible types of relevant data Includes a contact person for questions Includes a list of key custodians Includes a list of things to NOT do (defrag, hardware upgrades, opening / moving / deleting files) Is sent to key custodians and IT staff Is followed up with an in-person questionnaire
  • 11. Records management Key to effective litigation holds
  • 12. Records management A.K.A. Records retention policy, data destruction policy, information management Refers to the storage, retention and destruction of data created in the course of business Subject to various regulations Tax, HIPAA, SOX, etc. Subject to business relevance Accounting records, orders, “business intelligence” Should include ALL sources of information
  • 13. Records management How not to use your records management policy: Arthur Andersen LLP v. United States, 544 U.S. 696 (2005) August 2001: Arthur Anderson knew about financial irregularities related to Enron October 2001: Knew it would be subject to massive SEC investigation October 2001: Email from in-house counsel reminding staff to comply with existing document retention program November 2001: First subpoena from SEC
  • 14. Records management ARMA International is a key source of information (www.arma.org) Effective records management = lower eDiscovery costs Effective records management = lower risk of spoliation Effective records management = lower data storage / maintenance costs Effective records management = retrievable, authentic, accurate information
  • 15. Records management The challenge is figuring out what to keep . . . and what to destroy
  • 16. How to preserve . . . An incomplete guide
  • 18. How to preserve / collect Email: Grab PSTs from Exchange server Don’t forget local PST archives Grab NSFs from Lotus Domino Don’t forget local replicas, Notes ID files Office documents: Pinpoint Safecopy will make evidentiary sound copies of active data Can forensically image entire computer also
  • 19. How to preserve / collect Databases: Live access Duplicate database structure & import relevant data (quite complex) Run reports (generally acceptable) Websites / online content: Wayback machine, HTTrack, Camstudio Subpoena to Facebook/Yahoo/Google/Twitter for private content Twitter: check out www.Arkovi.com
  • 20. How to preserve / collect
  • 21. How to preserve / collect Social media preservation in its infancy Wider issue is preservation of Web 2.0 content Not static Here today, gone tomorrow Pulls from multiple sources Not all publicly accessible Watch this space! Social media is increasingly important for “run-of-the-mill” litigation Divorces, personal injury, wrongful dismissals
  • 22. Questions? Thank you! Debbie Westwood, Consultant Your on call litigation support department