SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
WHITE PAPER




                                Key Issues in eDiscovery
ON                                               An Osterman Research White Paper
                                                                    Published September 2012
                                                                                 SPONSORED BY
          SPON




                 sponsored by
                                                                                 Osterman Research, Inc.
                                               P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
                                 Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
                                                        www.ostermanresearch.com • twitter.com/mosterman
Key Issues in eDiscovery



EXECUTIVE SUMMARY
Discovery involves the preservation, search, analysis and production of relevant
information that might play a role in civil litigation. Its importance can be summed
up by the Zubulake standard:

         "[A] party has a duty to preserve all evidence, including electronically stored
         information ('ESI'), that it knows, or should know, is relevant to any present
         or future litigation."

What this means for every business is that it must retain all of its relevant electronic
content – emails, files, databases, social media posts, instant messages and the like –
and do so systematically and following a set of procedures that will allow it to satisfy
all of its legal obligations.

While the formal process of discovery has been a key element of civil litigation for
decades, eDiscovery has become much more important over the past 10-15 years as
the proportion of electronic content in most organizations has become more
voluminous and more difficult to manage than information on paper. As evidenced
by the following figure, businesses and other organizations believe that eDiscovery
will remain just as important over the next 12 months as it is today, or it will become        Poor eDiscovery
more important.
                                                                                               results in poor
                                                                                               decision-making
Anticipated Importance of eDiscovery During the Next 12 Months                                 because those
                                                                                               charged with
                                                                                               managing
                                                                                               litigation – as
                                                                                               well as the
                                                                                               overall
                                                                                               organization – do
                                                                                               not have
                                                                                               sufficient insight
                                                                                               about what is
                                                                                               happening within
                                                                                               their organ-
                                                                                               ization.




KEY TAKEAWAYS
•   The consequences of poor data management practices – inadequate archiving,
    no ability to implement legal holds, lack of competence, etc. – include significant
    legal judgments, loss of corporate reputation, and an increased level of overall
    risk.

•   Poor eDiscovery results in poor decision-making because those charged with
    managing litigation – as well as the overall organization – do not have sufficient
    insight about what is happening within their organization.




©2012 Osterman Research, Inc.                                                              1
Key Issues in eDiscovery



•   Good eDiscovery results in lower direct costs because of the reduced number of
    person-hours that must be invested in the collection, processing and review of
    information; and lower indirect costs because of reduced corporate risk.

ABOUT THIS WHITE PAPER
This white paper discusses the important practices and technologies that any
organization should implement in order to improve eDiscovery and drive its cost as
low as possible. The paper also presents the results of a primary market research
survey conducted specifically for it that highlights the key problems that organizations
have with current eDiscovery practices. Finally, a brief overview of this paper’s
sponsors – Autonomy, C2C, Globanet, GWAVA and Imation – is included.



SHOULD YOU CARE ABOUT eDISCOVERY?
DEFINING TERMS
Discovery is the critical process of searching for information that may be relevant for
use as evidence in a trial or in pre-trial activities. It can include any sort of              While discovery
communication, document, metadata, advertisement, statement or other information
that might be useful to prove a plaintiff’s or defendant’s case in a civil action.
                                                                                               has focused
                                                                                               traditionally on
“eDiscovery” is simply the extension of this well-established process to any
Electronically Stored Information (ESI) that an organization might possess – email
                                                                                               paper documents,
messages, presentations, spreadsheets, word processing files, tweets, Facebook                 over the past
posts and any other communication or information that might be useful in a civil legal         several years ESI
action. By extension, eDiscovery can extend to any platform on which ESI is stored:
desktop computers, laptops, smartphones, tablets, backup tapes, servers, and even              has become a
employees’ home computers and other personally owned devices.                                  much more
ENORMOUS GROWTH IN THE AMOUNT OF ELECTRONIC DATA                                               important
UNDER MANAGEMENT                                                                               component of
Organizations of every size create, send, receive and store an enormous and growing            discovery for the
amount of digital information. For example, the IDC Digital Universe study estimated
that 1.8 zettabytes (1.8 trillion gigabytes) of information were created and replicated        simple reason
during 2011, a nine-fold increase from 2006 and more than doubling every two                   that a growing
yearsi. Moreover, IBM estimates that each day 2.5 quintillion bytes of data are
createdii. While much of this data is normally not subject to eDiscovery – e.g.,               proportion of
television programming and the like – the enormous scale and growth of ESI is                  corporate content
illustrative of the problem that organizations have, and will have, in finding and
producing ESI in their organizations. As just a simple illustration of data growth in a        is electronic and
mid-sized company, consider the figure on the following page that demonstrates the             never meets
growth of content storage in a typical organization with 1,000 email users.
                                                                                               paper.
While discovery has focused traditionally on paper documents, over the past several
years ESI has become a much more important component of discovery for the simple
reason that a growing proportion of corporate content is electronic and never meets
paper. Consider the following:

•   ESI is normally stored in much greater volume than are hard copy documents.

•   ESI can be modified quite easily.

•   ESI is often not readable apart from the system(s) that created it.

•   ESI contains information that is not normally displayed to users – metadata –
    that describes the context of the information and provides other useful and
    important information.




©2012 Osterman Research, Inc.                                                              2
Key Issues in eDiscovery



Seven-Year Archiving Requirements for a 1,000-Person Company
Gigabytes of Content Storage




                                                                                            While email is
                                                                                            often the most
                                                                                            important single
                                                                                            source of content
                                                                                            in most
                                                                                            organizations,
ESI consists of a large number of data types, as noted earlier, that may be in any
number of locations:                                                                        there are many
                                                                                            other content
•   Email systems
•   Social media data stores in the cloud or stored locally                                 types – and
•   Collaboration systems like SharePoint®                                                  locations in
•   Real-time communication systems like Sametime
•   Repositories of structured and unstructured data                                        which it might be
•   Employees’ home computers                                                               stored – that
•   Corporate and employee-owned smartphones
•   Tablet computers (e.g., Apple iPad, Dell Streak, etc.)                                  organizations
•   Corporate wikis and blogs                                                               must include
•   Desktop computers
•   Laptop computers                                                                        among their
•   File servers                                                                            discoverable
•   USB storage devices (e.g., flash memory sticks, iPods, etc.)
                                                                                            content sources.
While email is often the most important single source of content in most
organizations, there are many other content types – and locations in which it might
be stored – that organizations must include among their discoverable content
sources.

Preservation of this content without a true archiving system is a challenge for many
organizations for a number of reasons:

•   They must then determine where all of their content is located (no easy feat in
    any organization, let alone a distributed one).

•   They must back up this data to a central location or have ready access to it when
    required.

•   They must extract content from backup tapes or disk – an arduous task for IT
    even under good circumstances.




©2012 Osterman Research, Inc.                                                           3
Key Issues in eDiscovery



WHERE ARE WE WITH eDISCOVERY TODAY?
ORGANIZATIONS ARE (SORT OF) PREPARED FOR BASIC
eDISCOVERY, BUT NOT MUCH ELSE
Osterman Research has discovered that the vast majority of organizations believe
they are reasonably well prepared to deal with searching for, finding and producing
live email – i.e., content on email servers – in the context of eDiscovery. However,
they are much less prepared to satisfy eDiscovery requirements for other types of
content, particularly social media and cloud-based content repositories, as shown in
the following figure.


Preparedness to Search, Find and Produce Various Types of Content
% Responding Prepared or Very Well Prepared




                                                                                               Nearly three-
                                                                                               quarters of
                                                                                               internal legal
                                                                                               counsel considers
                                                                                               that eDiscovery is
                                                                                               important or
                                                                                               extremely
                                                                                               important to their
                                                                                               organizations, yet
                                                                                               only slightly
                                                                                               more than one-
                                                                                               half of them are
                                                                                               prepared or very
                                                                                               well prepared to
THE DISCONNECT BETWEEN IMPORTANCE AND READINESS
Our research also discovered that internal legal counsel and corporate management
                                                                                               deal with the
believe eDiscovery is important, but they are not as prepared for it as they need to           issues presented
be. For example, nearly three-quarters of internal legal counsel considers that
eDiscovery is important or extremely important to their organizations, yet only slightly
                                                                                               by eDiscovery.
more than one-half of them are prepared or very well prepared to deal with the
issues presented by eDiscovery. Similarly, both IT management and senior, non-IT
managers place greater importance on eDiscovery than they do on their
preparedness to deal with the issues presented by it.




©2012 Osterman Research, Inc.                                                              4
Key Issues in eDiscovery



Importance of and Preparedness for eDiscovery by Various Groups
% Responding Important or Extremely Important
% Responding Prepared or Very Well Prepared




                                                                                             A much more
                                                                                             efficient
                                                                                             approach for
                                                                                             document review
                                                                                             is predictive
                                                                                             coding, also
                                                                                             known as
THE GROWING IMPORTANCE OF PREDICTIVE CODING                                                  computer-
Traditional eDiscovery relies on linear document review – the process of manually
reviewing and coding potentially relevant and privileged content. While this process         assisted review.
works well for relatively small data sets, the review of large data sets makes linear        Predictive coding
document review inefficient and time-consuming. Moreover, it contributes
significantly to the growing cost of eDiscovery because of both the multiple reviews         generally results
of the same content that often must take place, as well as the production of content         in more accurate
that ultimately will not be useful. Underscoring the enormous cost associated with
reviewing documents during eDiscovery are the findings of a Rand analysis that               coding, as well as
found the review phase of eDiscovery accounts for 73% of the costs of producing              faster document
electronic documentsiii.
                                                                                             review and lower
A much more efficient approach for document review is predictive coding, also known          costs of
as computer-assisted review. This technique employs an expert’s review of key
documents, followed by computer review of potentially relevant content, assigning a          eDiscovery.
rating to each document based on how closely documents match the expert-reviewed
documents. Predictive coding generally results in more accurate coding, as well as
faster document review and lower costs of eDiscovery.

While predictive coding is not yet widely used, the technology was given a significant
boost by a federal judge in the case of Da Silva Moore v. Publicis Groupe et aliv. The
judge in this case ordered the adoption of a protocol that includes predictive coding.



THE BASICS OF DISCOVERY
THE FEDERAL RULES OF CIVIL PROCEDURE
The Federal Rules of Civil Procedure (FRCP) consist of a set of rules that are focused
on governing procedures for managing civil lawsuits in the United States district
courts. While the United States Supreme Court is responsible for overseeing the
FRCP, the United States Congress must approve these rules and any changes made
to them.



©2012 Osterman Research, Inc.                                                            5
Key Issues in eDiscovery



Several important changes to the FRCP went into effect in December 2006. The
modifications represented many years of debate at various levels and had a major
impact on electronic discovery within U.S.-based organizations. Many companies
have responded to these changes by improving their information management and
eDiscovery practices, although many have not.

Among the key elements of the FRCP changes are the following:

•   An expansion of discoverable material to include all ESI that might be relevant in
    a legal action [Rule 26(a)].

•   A schedule conference to discuss eDiscovery and other issues must be held
    within 120 days after a legal action is initiated [Rule 16(b)].

•   Within 99 days after a legal action commences, the parties must come to an
    agreement about the protocols and procedures that will govern the eDiscovery
    process [Rule 26(f)].                                                                     Serious
                                                                                              consequences
•   When a party requests information as part of eDiscovery, they can specify the
    format in which they would like it to be provided [Rule 34(b)].
                                                                                              can result from
                                                                                              failure to
    Sanctions can be avoided with the court’s blessing if ESI is lost because of good
•
    faith deletion practices that were not intended to destroy evidence [Rule 37(f)].
                                                                                              preserve
                                                                                              potentially
In summary, these changes reflect the fact that discovery of email and other ESI is
now a routine aspect of most litigation. As a result, decision makers need to keep in
                                                                                              relevant
mind that ESI is treated differently than paper-based data; the FRCP rules now                evidence. Courts
require early discussion of, and attention to, eDiscovery as an integral component of
any legal action; organizations should address the inadvertent distribution of
                                                                                              have discretion to
privileged or protected materials; organizations must now focus on a two-tiered               impose a variety
approach to discovery in which they must first deal with reasonably accessible
information and then later focus on less accessible data; and, finally, the rules can
                                                                                              of sanctions,
provide a safe harbor from sanctions by imposing a good faith requirement.                    including
                                                                                              monetary fines,
KEY ELEMENTS OF A SOUND eDISCOVERY SYSTEM
As part of an overall eDiscovery strategy, there are several things that any                  adverse
organization must ensure it can satisfy well in order to minimize the risk of problems        inferences,
during legal actions. While these apply specifically to eDiscovery, the general
principles involved largely apply to satisfying regulatory obligations, as well:              additional costs
                                                                                              for third parties
    Respond quickly to eDiscovery requests
•
    FRCP Rule 26(a)(1) requires that organizations have a solid understanding of
                                                                                              to review or
    their data assets and that they are able to discuss these issues ahead of the             search for data,
    initial pre-trial discovery meeting – FRCP Rule 16(b) requires that this meeting
    take place within 99 days from the commencement of a legal action.
                                                                                              or even criminal
    Organizations that have not planned ahead for such an eventuality may face a              charges.
    variety of negative consequences, not least of which is the enormous expense
    and disruption that eDiscovery can create for the unprepared.

    Sometimes, however, organizations have much less time than this to produce the
    required information. For example, in the case of Best Buy v. Developers
    Diversified Realtyv, the judge in the case ruled that the latter had to produce
    electronic content within just 28 daysvi.

•   Impose legal holds when necessary
    If a litigation hold – i.e., a suspension of any deletion of content that might be
    relevant during a legal action – is required, it is imperative that an organization
    preserve all relevant data, such as emails, word processing documents that may
    contain business records, financial spreadsheets, etc. Serious consequences can
    result from failure to preserve potentially relevant evidence. Courts have
    discretion to impose a variety of sanctions, including monetary fines, adverse



©2012 Osterman Research, Inc.                                                             6
Key Issues in eDiscovery



    inferences, and additional costs for third parties to review or search for data, or
    even criminal charges. At a minimum, an organization that cannot produce data
    as a result of deletion may suffer a damaged corporate reputation.

•   Identify what is and is not accessible
    Each party to a civil litigation must also determine what it can and cannot
    reasonably produce. If the evaluation determines that certain electronic content
    cannot be produced because it is not reasonably accessible or it is too expensive
    to produce, FRCP Rule 26(b)(2)(B) of the FRCP still requires that information
    about this content must be forthcoming. This might include, for example,
    information describing content on backup tapes that is in a format that can no
    longer be read because the equipment that could access the information is no
    longer in use. This further implies that ESI must be preserved even if it is not
    reasonably accessible.

•   Manage a growing number of data types and venues
    Complicating the eDiscovery process further is the fact that there is a large and
    growing number of data types and platforms on which relevant data may be
    stored. For example, discoverable content will typically reside on corporate email
    servers, file servers, SharePoint databases and other IT-managed systems.
    However, it can also reside on corporate and personal smartphones and tablets,
    cloud-based data repositories like Dropbox, employees’ home computers, USB
    sticks and a host of other on-premise and cloud-based platforms. One of the               Complicating the
    more important downsides of the Bring Your Own Device (BYOD) trend, for
    example, is this proliferation of corporate content in locations that are not under       eDiscovery
    IT’s control.                                                                             process further is
IMPORTANT ISSUES TO CONSIDER
                                                                                              the fact that there
There are a variety of lessons that organizations can take from court decisions about         is a large and
what to do – and what not to do – in the context of eDiscovery. What follows are
some notable cases that can shed light on best practices when considering how to
                                                                                              growing number
plan for eDiscovery:                                                                          of data types and
•   A failure to preserve ESI may lead to sanctions
                                                                                              platforms on
    In the case of Pension Committee of University of Montreal Pension Plan v. Banc           which relevant
    of America Securities, LLCvii, the Court issued sanctions against parties that did        data may be
    not adequately preserve ESI, citing the “gross negligence” of their actions. This
    ruling was made even though the judge found that there was no evidence of bad             stored.
    faith on the part of those who did not preserve the required ESI.

•   eDiscovery must be relatively specific
    In the 2010 case of Moulin Global Eyecare Holdings Ltd. v. KPMG that
    adjudicated in Hong Kong, the court rejected plaintiffs’ arguments a request for
    discovery of ESI that it considered too expansive. The court determined that
    allowing such broad access to the defendant’s electronic information would be
    “tantamount to requiring the defendants to turn over the contents of their filing
    cabinets for the plaintiffs to rummage through.viii”

•   Backup tapes are not satisfactory for eDiscovery
    The case of Johnson v. Neimanix is a good example of why using backup tapes
    as the primary source of discoverable content is not a best practice. The
    defendant argued that it should not have to produce emails that were stored on
    5,880 backup tapes, because accessing this information would allegedly have
    required 14,700 person-hours to catalog and restore, and that an additional 46.7
    days would have been required for the creation of .PST files. The defendant
    argued that this data was not reasonably accessible. Luckily for the defendant,
    the Court agreed with their position and did not require production of the data.
    However, a judge could easily have determined that this content should have
    been archived and ordered the defendants to produce the requested data.




©2012 Osterman Research, Inc.                                                             7
Key Issues in eDiscovery



•   Cooperation between parties is essential
    In Digicel v. Cable & Wireless PLC, the defendant made a unilateral decision not
    to search through their backup tapes for content. Further, the defendant
    determined the search terms it would use, a decision that the plaintiffs opposed.
    The British court that heard the case overruled the defendant’s decision and
    ordered it to both restore employee emails that were stored on backup tapes, as
    well as add a few more search terms. The court was not willing to allow one
    party to the suit to make unilateral decisions regarding what content was
    discoverable.x

•   Social media content is increasingly part of eDiscovery
    The case of Lester v. Allied Concrete Company is illustrative of the growing
    importance of social media content in legal actionsxi. In this case, a personal
    injury attorney instructed his client to delete various photographs from his
    Facebook profile instead of placing a formal legal hold on these images, or at
    least instructing that the content not be deleted. In response, the Court ordered
    the attorney to pay $522,000 for this spoliation of evidence and required the
    client to pay $180,000, despite the fact that a jury awarded the plaintiff $8.6
    million (later reduced by the Court to $4.1 million)xii. The ill-advising attorney no
    longer practices law.                                                                       Good eDiscovery
•   eDiscovery must be managed competently
                                                                                                and related tools,
    In Green v. Blitz U.S.A.xiii, the Court sanctioned the defendant for a variety of           policies and
    failures, including their representative (who claimed to be computer illiterate) not        practices can
    putting a legal hold on relevant data, not coordinating his work with the
    defendant’s IT department, and not performing keyword searches, all of which                help avoid legal
    resulted in relevant documents not being produced. After key documents were                 actions
    not discovered in this case, but were discovered in another case one year later,
    the judge a) issued a $250,000 civil contempt sanction against Blitz, b) ordered            altogether by
    the company to inform plaintiffs from the past two years about the sanction, and            ensuring that,
    c) to include a copy of the sanction memorandum in every case in which it will
    be involved during the next five years.                                                     through the use
                                                                                                of good search
•   Metadata may need to be produced
    Judge Shira Scheindlin, who ruled in the landmark Zubulake v. UBS Warburg                   capabilities and
    case, issued an important ruling in February 2011 that will have important                  analytics,
    ramifications for the use of metadata. In National Day Laborer Organizing
    Network v. U.S. Immigration and Customs Enforcement Agency,xiv Judge                        corporate policies
    Scheindlin a) stressed the importance of metadata in her ruling that “certain key           are being
    metadata fields are an integral part of public records,” and b) that counsel must
    “make greater efforts to comply with the expectations that courts now demand                followed on a
    …with respect to expensive and time-consuming document production.”                         continual (and,
•   Home computers may constitute part of your discoverable content                             perhaps, near
    In Orrell v. Motorcarparts of America, Inc.xv, the Court ordered the production of          real-time) basis.
    a plaintiff’s home computer for forensic examination because it contained
    information that allegedly had been wiped from the plaintiff’s company-supplied
    laptop computer.



HOW CAN YOUR ORGANIZATION BENEFIT
FROM PROPER eDISCOVERY?
BE PROACTIVE INSTEAD OF REACTIVE
All organizations should deploy sound eDiscovery capabilities that include the ability
to index content, search for it, allow it to be tagged or classified, and impose legal
holds quickly. Moreover, these tools should be sufficient so as to provide decision
makers confidence that all relevant data is being held, and that all archived
information that is relevant to a case has been discovered (e.g., data on mobile




©2012 Osterman Research, Inc.                                                               8
Key Issues in eDiscovery



devices). The right eDiscovery capabilities can help an organization to be proactive in
two important ways:

•   Good eDiscovery and related tools, policies and practices can help avoid legal
    actions altogether by ensuring that, through the use of good search capabilities
    and analytics, corporate policies are being followed on a continual (and, perhaps,
    near real-time) basis. This allows an organization to monitor employee behavior
    on an ongoing basis to look for potentially actionable statements or activities,
    and to adjust corporate policies on-the-fly to minimize the potential for legal
    action.

•   In situations where a legal action has already begun, robust eDiscovery
    capabilities can help in early case assessment so that decision makers can
    understand their legal position early on, at times to an organization’s advantage
    over the opposition. This might include reviewing the likelihood of victory early
    in a case, allowing an organization either to settle quickly and avoid significant
    legal fees or an adverse judgment; or giving decision makers confidence that
    they can prevail and thereby reduce the likelihood of an adverse judgment.
    Having the right tools lets decision makers focus on the merits of a case instead
    of the process, and reduced costs lets an organization devote more resources
    toward resolving the case instead of spending significant amounts on the
    eDiscovery process itself.
                                                                                              From an IT
In short, being proactive will help decision makers to make better and more well              perspective, one
informed decisions. This will help minimize the negative impact of a legal action and         of the benefits of
can lead to lower legal fees, the reduced likelihood of court-imposed sanctions, and
reduced disruption to normal business operations.                                             good eDiscovery
                                                                                              is its ability to
IMPROVE THE EFFICIENCY OF LITIGATION
The right eDiscovery systems, services and tools can help an organization respond to          reduce storage
legal actions more effectively. The appropriate tools will help organizations to              management
understand what content they have available and what is not reasonably accessible.
These tools can also streamline the eDiscovery process and help organizations
                                                                                              problems for
respond more quickly and at a lower cost.                                                     email and other
                                                                                              types of business
LOWER COSTS
Good eDiscovery capabilities can also help an organization reduce the overall costs of        records.
managing email content, records and the business itself. These benefits include:

•   Avoiding many of the costs associated with outside counsel expenses by
    reducing the subset of data that has been flagged for legal review.

•   Reducing the length of the eDiscovery process, which can result in hard cost
    savings of internal staff time.

•   Reducing other costs, including legal judgments, fines, and public relations
    damage from negative press.

•   Reducing the cost of backing up content by moving older, unstructured data
    such as email, to content archiving systems.

From an IT perspective, one of the benefits of good eDiscovery is its ability to reduce
storage management problems for email and other types of business records.
Osterman Research has found in numerous surveys that most of the serious problems
involved in managing email systems are storage-related, including problems like large
attachments sent through email, growing use of attachments itself, and storing large
volumes of older content on primary storage systems connected to live email servers.
These are benefits that can be realized in the management of other types of records
as well, since this content can also be migrated to less expensive archival storage.
The right archiving, litigation hold and related solutions can significantly reduce




©2012 Osterman Research, Inc.                                                             9
Key Issues in eDiscovery



storage costs and provide a number of other email management benefits well beyond
just eDiscovery.



ELECTRONIC DISCOVERY REFERENCE MODEL
The Electronic Discovery Reference Model (EDRM), diagrammed in the following
figure, was a response to the relatively few standards and lack of generally accepted
guidelines for the process of eDiscovery that existed prior to its development. The
team that developed the EDRM was facilitated by George Socha (Socha Consulting
LLC) and Tom Gelbmann (Gelbmann & Associates), and included 62 organizations,
among whom were software developers, law firms, consulting firms, professional
organizations and large corporations.


Electronic Discovery Reference Modelxvi




                                                                                                The EDRM,
                                                                                                which was placed
                                                                                                into the public
                                                                                                domain in May
                                                                                                2006, is designed
                                                                                                to help
                                                                                                organizations
                                                                                                manage the
Begun in May 2005, the goal of the EDRM Project was the creation of a framework
for the “development, selection, evaluation and use of electronic discovery products            process of
and services”. The EDRM, which was placed into the public domain in May 2006, is                eDiscovery from
designed to help organizations manage the process of eDiscovery from the initial
stages of managing electronic information through to its presentation.                          the initial stages
                                                                                                of managing
The EDRM’s development was important because it represented a major step forward
in the standardization of the eDiscovery process. Standardization is important for              electronic
eDiscovery for a variety of reasons, most notably because of the growth in the                  information
quantity and diversity of ESI, as well as the large number of entities that will need to
process this data (internal and external legal counsel, senior managers, archiving              through to its
solution vendors, cloud-based IT managed services, outside forensics firms and                  presentation.
others).

Following development of the EDRM was the EDRM XML project in the 2006-2007
timeframe. The goal of this project was to “provide a standard, generally accepted
XML schema to facilitate the movement of electronically stored information (ESI)
from one step of the electronic discovery process to the next, from one software
program to the next, and from one organization to the next. The EDRM XML 2
project continued the development of the EDRM XML schema for metadata,
developing protocols for the number of electronic files that are preserved in their
native format, and developing a compliance validation tool, among other projects.

KEY ELEMENTS OF THE EDRM
The EDRM is divided into nine sections that focus on the process of managing an
eDiscovery effort:




©2012 Osterman Research, Inc.                                                              10
Key Issues in eDiscovery



•   Information Management
    This phase focuses on managing electronic content in such a way that an
    organization can prepare for eDiscovery should that become necessary. The
    goal of Information Management in an EDRM context is to minimize the risk and
    cost associated with the entire process of eDiscovery. Managed properly, this
    step can dramatically reduce the effort required in the subsequent phases of the
    EDRM process.

•   Identification
    Understand the “inventory” of ESI that might be relevant in a particular legal
    action and that might have to be presented during discovery. At this point in the
    process, discovery demands, disclosure obligations and other pertinent claims
    and demands are reviewed and considered. The goal at this stage of the
    process is to understand the universe of information that might be required in
    order to respond to appropriate eDiscovery requests and then determine the
    subset of information that will be relevant for further processing.

•   Preservation
    This is a critical step that ensures that ESI is protected from spoliation and
    modification, such as through the imposition and enforcement of a legal hold on
    all relevant ESI. If spoliation does occur, the consequences can be expensive.
    For example, in the case of Leon vs. IDX Systems Corporation [2006 U.S. App.
    LEXIS 23820 (9th Cir. Sept. 20, 2006)], the plaintiff deleted 2,200 files from the          The purpose of
    laptop computer his employer had issued to him. The court dismissed the case
    and awarded the defendant $65,000 for the spoliation.                                       the Information
                                                                                                Governance
•   Collection
    During this phase, all relevant ESI is collected from the various sources that              Reference Model
    contain it, including messaging archives, backup tapes, file servers, desktops,             (IGRM) is to
    laptops, employees’ home computers, smartphones and other sources.
                                                                                                “provide a
•   Processing                                                                                  common,
    At this point, collected data is indexed and, thus, made searchable. The data
    should also be de-duplicated in order to reduce the amount of data that must be             practical, flexible
    reviewed during subsequent phases of the discovery process. Collected data                  framework to
    should also be prioritized into a) content that will likely be relevant later in the
    process and b) content that will likely not be relevant. At this point, decision
                                                                                                help organ-
    makers may want to convert ESI into a form that will permit the most efficient              izations develop
    and thorough review of its contents.
                                                                                                and implement
•   Analysis                                                                                    effective and
    This phase involves a variety of activities, including determining exactly what the
    ESI means in the context of the legal action at hand, developing summaries of
                                                                                                actionable
    relevant information, determining the key issues on which to focus, etc.                    information
•   Review
                                                                                                management
    The review phase includes evaluating the content for its relevance, determining if          programs.
    specific items are subject to attorney-client privilege, redacting ESI as
    appropriate, etc.

•   Production
    The production of data involves delivering the relevant ESI to any parties or
    systems that will need it. It also includes the activities focused on delivering ESI
    in the appropriate formats (e.g. in native or image format) and form(s), including
    DVDs, CD-ROMs, paper, etc.

•   Presentation
    The presentation of ESI is a key consideration at various points of the eDiscovery
    process – as information is reviewed, analyzed, produced, etc. The specific
    forms of presentation for ESI will vary widely depending on the content; how,
    where and by whom the content will be presented; and other factors.



©2012 Osterman Research, Inc.                                                              11
Key Issues in eDiscovery



THE INFORMATION GOVERNANCE REFERENCE MODEL
The purpose of the Information Governance Reference Model (IGRM) is to “provide a
common, practical, flexible framework to help organizations develop and implement
effective and actionable information management programs.”xvii Its goal is essentially
to bring together various stakeholders within an organization and provide them with a
common framework for discussing and acting on the Information Management node
of the EDRM. The IGRM fills an important void because it attempts to integrate the
records management, archiving and retention obligations across an entire
organization.


Information Governance Reference Modelxviii




                                                                                              Enacted in 1975,
                                                                                              the Federal
                                                                                              Rules of
                                                                                              Evidence (FRE)
                                                                                              are a set of
                                                                                              requirements that
                                                                                              determine how
                                                                                              evidence is
                                                                                              presented during
                                                                                              trial in the U.S.
                                                                                              federal courts.



OTHER ISSUES
FEDERAL RULES OF EVIDENCE
Enacted in 1975, the Federal Rules of Evidence (FRE) are a set of requirements that
determine how evidence is presented during trial in the U.S. federal courts. These
rules are focused mostly on the initial presentation of evidence during trials.
Individual states may use these rules as the basis for their own rules of evidence, or
they may adopt a different set of rules for presenting evidence at trial. It is
important to note that for purposes of presenting evidence, a printed or otherwise
human-readable version of electronic evidence is considered to be an original and can
be presented at trial according to FRE Rule 1001(3).

Authentication is a key part of the eDiscovery process because its goal is to prove
that a document is what its presenter claims it to be – a true and verifiable
representation of an electronic document. Authentication for electronic content is
even more critical than for paper-based documents, since electronic documents are
more easily altered. For example, the process of copying data from one location to



©2012 Osterman Research, Inc.                                                            12
Key Issues in eDiscovery



another may actually alter the metadata of that data and call into question its
authenticity. When the authenticity of a piece of evidence has been called into
question, an attorney may need to depose a witness who can verify the chain of
custody of an electronic document, a signature block in an email can be used to
provide authenticity, or each party in a legal action can agree to stipulate that
electronic records will be considered authentic. Atkinson-Baker has written a good
overview of the authentication requirements for electronic recordsxix.

Proving the authenticity of electronic records is a major issue that many organizations
have not completely resolved. A classic case in point is Vinhnee vs. American Express
Travel Related Services Company, Inc. In this case, American Express sought
payment for more than $40,000 in charges on two credit cards from a California
resident who had filed for bankruptcy protection. However, because American
Express could not prove the authenticity of the electronic statements it presented
during trial, it lost the case even without the plaintiff being present. Another
important case, Lorraine v. Merkel, saw the Court deny the admissibility of electronic
evidence simply because it could not be authenticatedxx. In Lorraine v. Merkel, the
chief magistrate presiding over the case wrote:

    “…there are five distinct but interrelated evidentiary issues that govern                  The most useful
    whether electronic evidence will be admitted into evidence at trial or                     archiving
    accepted as an exhibit in summary judgment practice. Although each of
    these rules may not apply to every exhibit offered…each still must be                      solutions will
    considered in evaluating how to secure the admissibility of electronic                     provide a verified
    evidence to support claims and defenses. Because it can be expected
    that electronic evidence will constitute much, if not most, of the                         audit trail
    evidence used in future motions practice or at trial, counsel should                       showing who
    know how to get it right on the first try.”
                                                                                               accessed
    “computerized data ... raise unique issues concerning accuracy and                         archived content
    authenticity ... The integrity of data may be compromised in the course
    of discovery by improper search and retrieval techniques, data
                                                                                               and when it was
    conversion, or mishandling.”                                                               accessed,
                                                                                               preventing an
Status of U.S. States’ Adoption of FRCP Requirements                                           original of a
                                                                                               document from
                                                                                               being altered
                                                                                               after the fact and
                                                                                               minimizing the
                                                                                               potential need to
                                                                                               address chain-of-
                                                                                               custody issues.




©2012 Osterman Research, Inc.                                                             13
Key Issues in eDiscovery



The ability to provide the authenticity of content, as well as the chain of custody for
content relevant to a legal action, is one of the more important benefits of an
archiving solution. The most useful archiving solutions will provide a verified audit
trail showing who accessed archived content and when it was accessed, preventing
an original of a document from being altered after the fact and minimizing the
potential need to address chain-of-custody issues.

STATE FRCP-RELATED LAWS
The FRCP is but one of the key issues with which litigators and others involved in the
eDiscovery must deal. As shown in the figure on the preceeding page, many U.S.
states have already passed, or will soon pass, their own version of the FRCP for civil
litigation that takes place within their respective state court systems.

eDISCOVERY IN OTHER JURISDICTIONS
Owing to the somewhat fairly litigious nature of society in the United States, U.S.
eDiscovery practices are more advanced and requirements more specific than in most
other nations. For example, in most of Europe organizations are not required to
produce content that runs counter to the claims they make in a legal action.
Requirements in the United Kingdom, however, can compel organizations to produce
damaging content, but only after a court orderxxi.

While eDiscovery in American legal proceedings is difficult, laws in other parts of the
world can significantly complicate eDiscovery (often referred to as “e-disclosure”             While eDiscovery
outside of the United States). For example:                                                    in American
•   At present, courts in England and Wales may or may not require some type of                legal proceedings
    standard disclosure – namely, the disclosure that a document “exists or has                is difficult, laws
    existed”. The recipient of the disclosure has a right to inspection of the
    documents, albeit subject to a variety of restrictionsxxii. However, in April 2013         in other parts of
    the UK Civil Procedure Rule 31.5 will go into effect, permitting courts much more          the world can
    discretion when ordering disclosure. Some of the rules are similar to the FRCP in
    the United States, such as the requirement to disclose relevant documents and              significantly
    the applicability of the Rule to electronic contentxxiii.                                  complicate
•   In 2010, Ontario amended its rules of civil procedure in order to accommodate              eDiscovery (often
    the growth of electronic content as part of the discovery process. Rule                    referred to as “e-
    29.1.03(4) now reads “In preparing the discovery plan, the parties shall consult
    and have regard to the document titled 'The Sedona Canada Principles                       disclosure”
    Addressing Electronic Discovery' developed by and available from The Sedona                outside of the
    Conference.”
                                                                                               United States).
•   As is the case in many countries, Mexico does not have pre-trial discovery or
    disclosure requirements, but the courts will compel litigants and third parties to
    produce information if it is deemed necessary to the proceedings and if the
    documents are specifically identified.

•   The European Commission Directive 95/46/EC, adopted in October 1995, was
    designed to standardize the protections for data privacy among all of the
    member states of the European Union and to protect individuals’ right to privacy.
    The Directive focuses on the processing of individuals’ data within the EU, but
    also applies to any entity outside of the EU to whom this data might be provided,
    such as during an eDiscovery exercise. The Directive does not permit data to be
    provided to anyone whose national laws do not adequately safeguard privacy
    rights.

    Moreover, the Convention on the Taking of Evidence Abroad in Civil Matters (the
    Hague Evidence Convention) – which the U.S. Senate ratified in 1972 – was
    designed to “establish a system for obtaining evidence located abroad that would
    be ‘tolerable’ to the state executing the request and would produce evidence




©2012 Osterman Research, Inc.                                                             14
Key Issues in eDiscovery



    ‘utilizable’ in the requesting state.”

•   France imposes even more stringent requirements than Directive 95/46. French
    Penal Code, Law No 80 – 538 imposes fines and/or jail time for those who seek,
    request or disclose information intended to develop evidence for foreign legal
    proceedings.

•   Australia’s Supreme Court of Victoria, in its Practice Note No. 1 of 2007 (February
    2007), strongly suggested that parties to a legal action should consider using
    technology to improve the efficiency of legal proceedings, including eDiscovery
    tools. The Federal Court of Australia has gone further and developed eDiscovery
    rules similar to those contained in the new amendments to the FRCP. Moreover,
    the Australian Federal Court ruled in 2009 that all cases meeting minimum
    requirements must be managed only with digital content, not paper.

Blocking statutes, such as the French law noted above, have been in place for many
years in various countries and were enacted specifically to block discovery
proceedings. For example, blocking statutes exist in Ontario, Canada (Business
Records Protection Act), the United Kingdom (The Shipping and Commercial
Documents Act) and the Netherlands (Economic Competition Act). The key issue to                 Does your IT
keep in mind with regard to blocking statutes is that even though data has been                 management
found, it may not be usable.
                                                                                                know the name
A good analysis of eDiscovery outside of the United States is E-Discovery Around the            of your
Worldxxiv.
                                                                                                organization’s
                                                                                                chief legal
WHAT SHOULD YOU DO NEXT?                                                                        counsel? Does
ACHIEVING THE IT-LEGAL HANDSHAKE                                                                legal counsel
In order to establish a robust eDiscovery capability in any organization, but
particularly a larger one, it is essential to start with a “meet-and-greet” among the           know the
relevant internal parties. For example, does your IT management know the name of                name(s) of your
your organization’s chief legal counsel? Does legal counsel know the name(s) of your
senior IT managers? Are key stakeholders aware of who else would potentially be                 senior IT
involved in eDiscovery planning?                                                                managers? Are
Establishing this “legal-IT handshake” is a critical first step toward developing an            key stakeholders
effective eDiscovery strategy. Having each group familiarize itself with the                    aware of who
requirements of the other will go a long way toward helping an organization develop
an effective eDiscovery plan. For example, while IT may perceive that all legal                 else would
counsel needs is a robust search capability for electronic content, the reality is that         potentially be
the legal workflow is more complex than that, and includes search, creating internal
workflows for content, review of the discovered content, marking up the relevance of
                                                                                                involved in
records, exporting data sets for use in forensics analysis tools, sending to external           eDiscovery
counsel for review, and taking things to the point of production (such as going
through the Bates numbering process to serialize a production set).
                                                                                                planning?

EMPLOY YOUR EMPLOYEES
While policies, practices, procedures and technologies are all vital, it is essential to
educate employees, consultants and others in the organization about the importance
of retaining important documents, using corporate communication and collaboration
resources wisely, not deleting documents intentionally and the like. Employing users
as this first line of defense can go a long way toward improving eDiscovery in
virtually any organization.

THE IMPORTANCE OF GOOD PRACTICES
It is also essential to understand that eDiscovery is critical to any business or
organization, not just enterprises or organizations that serve “litigious” markets. For
example, the survey conducted for this white paper found that across all industries




©2012 Osterman Research, Inc.                                                              15
Key Issues in eDiscovery



and organization sizes, there was a median of 2.0 eDiscovery cases per 1,000
employees in the year ending mid-2012; this figure is expected to increase to 2.9
during the next year.

A variety of laws and other requirements, as well as common eDiscovery risks and
scenarios, can apply to any business of any size in any industry. Moreover, every
organization will have a unique mix of policies, processes, business operations, and
technologies that may increase its particular risks in the context of civil litigation.

As a result, an accurate baseline snapshot of eDiscovery and corresponding
expenditures today within an organization will help its decision makers to develop,
priortize, and justify changes and investments moving forward.

FOCUS ON POLICIES
It is also important to establish data retention and deletion schedules for all content
types, a practice that many organizations do not pursue with sufficient urgency. It is
important for any organization to retain all of the electronic data that it will need for
current and anticipated eDiscovery and other retention requirements. However,
many organizations, either by overspecifying the amount of data they must retain
and/or not establishing appropriate data deletion policies, retain more information
than is necessary, creating greater and unnecessary liability. This can result in much
higher eDiscovery costs because more data is retrieved and must be reviewed, as
well as unnecessarily high storage costs. It is important for any organization to have             An adequate
its legal team work with IT to conduct a review and ensure compliance with
regulatory and statutory requirements. Data classification here is a critical step –
                                                                                                   legal hold
decision makers must define what needs to be retained, what can safely be deleted,                 process must
and the disposition method to be used.
                                                                                                   include
If a legal action is “reasonably anticipated”, it is vital that an organization immediately        technologies and
begin to identify and preserve all relevant data. For example, a claim for a breached
contract with a contractor might require preservation of emails and other electronic
                                                                                                   practices that will
documents between employees and the contractor, as well as between employees                       enable these
talking about the contract or the contractor’s performance. A properly configured
eDiscovery and data archiving capability will allow organizations to immediately place
                                                                                                   holds to be
a hold on data when requested by a court or regulator or on the advice of legal                    imposed, because
counsel, and retain it for as long as necessary.                                                   relying on
Litigants that fail to preserve or hold ESI properly are subject to a wide variety of              individuals to
consequences, including reputational harm, additional costs for third parties to review            hold data may
or search for data, court sanctions, directed verdicts or instructions to a jury that it
can view a defendant’s or plaintiff’s failure to produce data as evidence of culpability.          not be sufficient
                                                                                                   in many cases.
An adequate legal hold process must include technologies and practices that will
enable these holds to be imposed, because relying on individuals to hold data may
not be sufficient in many cases. In addition to the Green v. Blitz case noted earlier,
Jones v. Bremen High School Districtxxv is illustrative of the importance of good legal
holds:

•   The plaintiff filed an Equal Employment Opportunity Commission charge in
    October 2007xxvi . The defendant did not issue a litigation hold, but did instruct
    three individuals in the District to search through email and save relevant
    messages. However, destruction of ESI continued and only one year after the
    case was filed did the District implement automated email archiving. Only in
    Spring 2009 did the defendant instruct its employees to retain emails that might
    be relevant to this case.

    The judge in this case did not issue an adverse inference instruction to the jury,
    but did instruct them that a lack of relevant emails was not evidence that they
    did not exist. Further, the District had to pay for the cost of court reports when
    witnesses were deposed about recently created emails, and they had to pay the
    plaintiff’s costs associated with preparing a motion for sanctions.



©2012 Osterman Research, Inc.                                                                 16
Key Issues in eDiscovery



IMPLEMENT THE RIGHT TECHNOLOGIES
Last, but certainly not least, deploy the storage systems and software tools, services
or other capabilities – archiving, storage, predictive coding, etc. – that will enable
proactivity in the context of eDiscovery. As discussed above, these capabilities will
ensure that all necessary data is accessible and reviewable early in the lifecycle of a
case. The right technology will help an organization classify data as it is created and
then discover content wherever it exists. These can include, but are not limited to,
email servers, file servers, local computers, and other sources like mobile devices.
Good tools will also create a complete eDiscovery repository and deduplicate the
data. For example, single-instance storage or file/block deduplication applications
can reduce the size of some data stores and significantly streamline the entire
eDiscovery process.


SPONSORS OF THIS REPORT
Autonomy, an HP Company, is a global leader in software that processes human
information, or unstructured data, including social media, email, video, audio, text,
web pages, and more. Autonomy’s powerful management and analytic tools for
structured information together with its ability to extract meaning in real time from all
forms of information, regardless of format, offer a unique capability for organizations                                      !
seeking to derive the most value from their data.
                                                                                                  www.autonomy.com
To meet today’s unique challenges and legal requirements, organizations need an
eDiscovery solution that is efficient and defensible, offers massive scalability, is              twitter.com/
language and format independent, and provides end-to-end coverage across the                      AutonomyCorp
entire eDiscovery process—from information management, identification, and
preservation through collection, analysis, review, and production. To support rigorous            autonomy@
litigation cycles, general counsel and outside counsel alike require an eDiscovery
                                                                                                  autonomy.com
solution that not only reduces cost and risk, but is simple to use, automates
processes, and includes powerful workflow capabilities.
                                                                                                  +1 44 1223 4480000
Autonomy eDiscovery solutions unify identification, collection, early case assessment,
                                                                                                  +1 415 243 9955
document review, and production in a single application that leverages Meaning                    !
Based Coding, advanced analytics, and policy-based, automated workflow to simplify
the process. Autonomy eDiscovery operates seamlessly with Autonomy Legal Hold
and a range of modules from the Autonomy Information Governance suite, including
Autonomy Consolidated Archive, to provide a complete end-to-end solution for
enterprise customers.




C2C believes that the best way for IT to mitigate the challenges of eDiscovery is to be
prepared. A well thought out information management strategy can save time and
money and reduce risks associated with eDiscovery. An email management solution
like ArchiveOne provides a solid foundation for any comprehensive Information
Management strategy to be built on because its sophisticated policy engine allows
granular control over the data and its advanced search and retention management                                  !
capabilities provide control of email – live or archived – anywhere in the organization,
including PSTs wherever they reside (server, desktop, laptop).                                    www.c2c.com

C2C solutions focus on streamlining the early stages of EDRM and empowering expert                info@c2c.com
end users (such as in-house counsel, HR, compliance officers) to explore email data
early by iteratively searching until the most responsive messages are identified, and             +1 44 118 951 1211
then collecting and preserving them in a secure litigation repository. Additionally,              +1 508 870 2205
these expert end users can manage message-level legal holds ensuring that the most                !
critical data is fully protected. The result is a smaller, more targeted data set that can
be packaged for formal processing, review and analysis.




©2012 Osterman Research, Inc.                                                                17
Key Issues in eDiscovery



Businesses that implement such solutions are typically better positioned to respond to
eDiscovery requests because they retain only what they need and have access to it
when they need it. Managing email data up front drives efficiency into downstream
IT discovery processes – identification, collection, preservations – and reduces time,
costs and risks of eDiscovery.




Globanet is a leading provider of archiving and ediscovery solutions worldwide.
Founded in 1996, the company is a pioneer in archiving and intelligent information
                                                                                                                              !
governance, and has developed a portfolio of software and services to help
organizations manage data from creation to expiry. A Symantec Technology-
                                                                                               www.globanet.com
enabled Platinum Partner with Master Specialization in Archiving and eDiscovery,
Globanet’s professional services team has extensive experience with industry-
                                                                                               twitter.com/Globanet
leading Enterprise Vault and Clearwell.
!                                                                                              info@globanet.com
The first certified Symantec Enterprise Vault consultancy in North America, Globanet
has successfully delivered more than 2,500 Enterprise Vault projects to date,                  +1 310 202 0757
including some of the largest and most complex deployments. The company’s
                                                                                               !
combined team of Enterprise Vault engineers and software developers is one of the
largest in the world. Its developers have extensive knowledge of the Enterprise
Vault API and have customized and integrated Enterprise Vault to meet some of the
toughest client requirements. In addition, many of Globanet’s proprietary software
tools extend and improve on Enterprise Vault's functionality, delivering an
enhanced Enterprise Vault experience.

Whether a small-medium businesses or a large global enterprise, Globanet offers a
variety of solutions to meet every client’s needs, from simple and affordable data
migrations to large-scale data management solutions. Globanet’s broad range of
services includes policy and solution design, installation and configuration, data
migration, custom development and add-ons, and project-based ediscovery
consulting.




For over 10 years, GWAVA has been focused on message security – providing anti-
spam and anti-virus protection for email; backup, restore and archiving of digital                                        !
messages; and email system management.
                                                                                               www.gwava.com
Messaging has changed from simply email to include texting, instant messaging,
collaboration and social media. You need to keep it, track it, and manage all of it. No
matter where it comes from or where it resides. All while dealing with the increasing          twitter.com/GWAVA
sophistication of cyberterrorists. GWAVA takes on these challenges, securing the
messages of thousands of organizations around the world. GWAVA products back up,               questions@gwava.com
archive and retain electronic messages including email, text and more assuring they
are accessible when you need them. Going beyond traditional anti-spam and anti-                +1 866 464 9282
virus protection, GWAVA makes sure cyber-criminals cannot corrupt or access your               +1 646 304 6250
messages or hijack your organization’s resources.                                              !
With GWAVA as your message security partner, you will be able to respond to the
rapidly changing definition of what is important to your organizations’
communications. A knowledgeable and friendly worldwide support team is always
available to respond to your needs, no matter when or where you may be.

GWAVA has offices in the United States, Canada, Germany, Great Britain and
Australia. We support Microsoft, Novell, Research in Motion, and other enterprise
infrastructure platforms.




©2012 Osterman Research, Inc.                                                             18
Key Issues in eDiscovery



Imation is a global scalable storage and data security company. Our portfolio includes
tiered storage and security offerings for business, and products designed to manage
audio and video information in the home.
                                                                                                                           !
Imation Scalable Storage solutions are purpose-built to deliver multi-media, multi-tier,
secure data protection and archiving for data-intensive, compliance-driven SMBs.                www.imation.com
These organizations are experiencing explosive data growth fueled by modernization
of IT and are intrigued by new storage tiers and media but lack practical ways to               twitter.com/
implement. Through its Scalable Storage solutions, Imation is the only company to               imationstorage
enable four layers of data storage: active, online, nearline and cloud.
                                                                                                +1 651 704 7777
Imation Scalable Storage solutions reduce storage costs by optimizing and
                                                                                                !
automating data protection and compliance. Solutions include: Imation DataGuard
NAS-based disk drive appliances for data protection, Imation InfiniVault data archive
appliances, RDX removable hard disk storage systems and Imation LTO Tape Drive
and Tape Library solutions. Imation Scalable Storage solutions deliver maximum
efficiency and ease of use in regulated bulk storage environments.




©2012 Osterman Research, Inc.                                                              19
Key Issues in eDiscovery


© 2012 Osterman Research, Inc. All rights reserved.

No part of this document may be reproduced in any form by any means, nor may it be
distributed without the permission of Osterman Research, Inc., nor may it be resold or
distributed by any entity other than Osterman Research, Inc., without prior written authorization
of Osterman Research, Inc.

Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes
legal advice, nor shall this document or any software product or other offering referenced herein
serve as a substitute for the reader’s compliance with any laws (including but not limited to any
act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively,
“Laws”)) referenced in this document. If necessary, the reader should consult with competent
legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no
representation or warranty regarding the completeness or accuracy of the information contained
in this document.

THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR
IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE
ILLEGAL.



i
        http://www.emc.com/collateral/about/news/idc-emc-digital-universe-2011-infographic.pdf
ii
        http://www-01.ibm.com/software/data/bigdata/
iii
        http://www.rand.org/content/dam/rand/pubs/monographs/2012/RAND_MG1208.pdf
iv
        http://pdfserver.amlaw.com/legaltechnology/Da_Silva_Moore_v_Publicis_Groupe_11-
        civ-1279_nysd_complaint.pdf
v
        636 F.Supp.2d 869 (2009)
vi
        http://www.inboxer.com/downloads/Whitepaper_FRCP.pdf
vii
        2010 WL 184312 (S.D.N.Y. Jan. 15, 2010)
viii
        http://www.clearwellsystems.com/e-discovery-blog/tag/case-law/
ix
        2010 U.S. Dist. LEXIS 110496 (E.D. Mo. Oct. 18, 2010)
x
        Source: Kroll Ontrack
xi
        http://blog.x1discovery.com/2011/11/15/facebook-spoliation-costs-lawyer-522000-ends-
        his-legal-career/
xii
        http://www.readthehook.com/102207/not-over-both-sides-appeal-lester-v-allied-concrete
xiii
        http://civilprocedure.dbllaw.com/2011/08/past-eDiscovery-errors-result-in-sanctions/
xiv
        http://ralphlosey.files.wordpress.com/2011/02/ndlon-v-ice-10-civ-3488-
        metadata-foia_revised.pdf
xv
        2007 WL 4287750 (W.D.N.C. Dec. 5, 2007)
xvi
        Source: EDRM (edrm.net)
xvii
        http://www.edrm.net/projects/igrm
xviii
        http://www.edrm.net/projects/igrm
xix
        http://www.depo.com/resources/aa_thediscoveryupdate/authenticating_email.html
xx
        http://www.wwpi.com/index.php?option=com_content&task=view&id=4092&Itemid=44
xxi
        http://www.legaltechnology.com/the-orange-rag-blog/guest-article-the-ediscovery-passport/
xxii
        http://www.justice.gov.uk/courts/procedure-rules/civil/rules/part31#IDAALICC
xxiii
        http://www.clearwellsystems.com/e-discovery-blog/tag/practice-direction/
xxiv
        http://www.mcmillan.ca/Files/ARTICLE_E-Discovery_Around_the_World_0110.pdf
xxv
        Dist. 228, 2010 WL 2106640 (N.D. Ill. May 25, 2010)
xxvi
        http://blog.legalholdpro.com/2010/06/10/northern-district-of-illinois-makes-its-own-
        way-with-opinion-echoing-need-for
        strong-legal-holds/




©2012 Osterman Research, Inc.                                                                          20

Mais conteúdo relacionado

Mais procurados

WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011
Vincent Ducrey
 
Data-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceData-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data Governance
DATAVERSITY
 
Rapid Semantic Web Application Development
Rapid Semantic Web Application DevelopmentRapid Semantic Web Application Development
Rapid Semantic Web Application Development
Bernadette Hyland-Wood
 
20111120 warsaw learning curve by b hyland notes
20111120 warsaw   learning curve by b hyland notes20111120 warsaw   learning curve by b hyland notes
20111120 warsaw learning curve by b hyland notes
Bernadette Hyland-Wood
 
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
DATAVERSITY
 
Digital Prosumer - Identification of Personas through Intelligent Data Mining...
Digital Prosumer - Identification of Personas through Intelligent Data Mining...Digital Prosumer - Identification of Personas through Intelligent Data Mining...
Digital Prosumer - Identification of Personas through Intelligent Data Mining...
Adebowale Nadi MBCS MIET MIScT RITTech
 
Emm Introduction 2013
Emm Introduction 2013Emm Introduction 2013
Emm Introduction 2013
Lee Schlenker
 
Leveraging social-networks-for-results-13338
Leveraging social-networks-for-results-13338Leveraging social-networks-for-results-13338
Leveraging social-networks-for-results-13338
Spreeas
 

Mais procurados (18)

W7 durrm16
W7 durrm16W7 durrm16
W7 durrm16
 
WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011
 
Data-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceData-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data Governance
 
Rapid Semantic Web Application Development
Rapid Semantic Web Application DevelopmentRapid Semantic Web Application Development
Rapid Semantic Web Application Development
 
20111120 warsaw learning curve by b hyland notes
20111120 warsaw   learning curve by b hyland notes20111120 warsaw   learning curve by b hyland notes
20111120 warsaw learning curve by b hyland notes
 
Disruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital StrategiesDisruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital Strategies
 
San~o y salvo
San~o y salvoSan~o y salvo
San~o y salvo
 
Social Intranet
Social IntranetSocial Intranet
Social Intranet
 
Structured Occurrence Network for provenance: talk for ipaw12 paper
Structured Occurrence Network for provenance: talk for ipaw12 paperStructured Occurrence Network for provenance: talk for ipaw12 paper
Structured Occurrence Network for provenance: talk for ipaw12 paper
 
Computer in Society
Computer in SocietyComputer in Society
Computer in Society
 
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
Practical Applications for Data Warehousing, Analytics, BI, and Meta-Integrat...
 
Digital Prosumer - Identification of Personas through Intelligent Data Mining...
Digital Prosumer - Identification of Personas through Intelligent Data Mining...Digital Prosumer - Identification of Personas through Intelligent Data Mining...
Digital Prosumer - Identification of Personas through Intelligent Data Mining...
 
Dark Data: Where the Future Lies
Dark Data: Where the Future LiesDark Data: Where the Future Lies
Dark Data: Where the Future Lies
 
Emm Introduction 2013
Emm Introduction 2013Emm Introduction 2013
Emm Introduction 2013
 
Teigland Leading In Networked MNC
Teigland Leading In Networked MNCTeigland Leading In Networked MNC
Teigland Leading In Networked MNC
 
Leveraging Social Networks For Results 13338
Leveraging Social Networks For Results 13338Leveraging Social Networks For Results 13338
Leveraging Social Networks For Results 13338
 
Leveraging social-networks-for-results-13338
Leveraging social-networks-for-results-13338Leveraging social-networks-for-results-13338
Leveraging social-networks-for-results-13338
 
Towards a Peer-to-peer Technium
Towards a Peer-to-peer TechniumTowards a Peer-to-peer Technium
Towards a Peer-to-peer Technium
 

Destaque

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
scubastog
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
J. David Morris
 
January 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations PresentationJanuary 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations Presentation
John Wang
 

Destaque (13)

Franchise Recruitment Summit July 2011
Franchise Recruitment Summit July 2011Franchise Recruitment Summit July 2011
Franchise Recruitment Summit July 2011
 
February 2010 8 Things You Cant Afford To Ignore About eDiscovery
February 2010 8 Things You Cant Afford To Ignore About eDiscoveryFebruary 2010 8 Things You Cant Afford To Ignore About eDiscovery
February 2010 8 Things You Cant Afford To Ignore About eDiscovery
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
E-Discovery explained, so you don't need to be a Lawyer, to get it.
E-Discovery explained, so you don't need to be a Lawyer, to get it.E-Discovery explained, so you don't need to be a Lawyer, to get it.
E-Discovery explained, so you don't need to be a Lawyer, to get it.
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
FreEed - Open Source eDiscovery
FreEed - Open Source eDiscoveryFreEed - Open Source eDiscovery
FreEed - Open Source eDiscovery
 
January 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations PresentationJanuary 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations Presentation
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Ediscovery 101
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery Perspective
 
Burford Barometer: 2016 Judgment Enforcement Survey
Burford Barometer: 2016 Judgment Enforcement SurveyBurford Barometer: 2016 Judgment Enforcement Survey
Burford Barometer: 2016 Judgment Enforcement Survey
 

Semelhante a Key Issues in eDiscovery

2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Exterro
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
e.law International
 
Reese ICT4902 Information Overload
Reese ICT4902 Information OverloadReese ICT4902 Information Overload
Reese ICT4902 Information Overload
Michael Reese
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
Sherpa Software
 
informationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxinformationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptx
MarlonMagtibay2
 
Cutting the Clutter - Tackling Information Overload
Cutting the Clutter - Tackling Information OverloadCutting the Clutter - Tackling Information Overload
Cutting the Clutter - Tackling Information Overload
Elizabeth Lupfer
 

Semelhante a Key Issues in eDiscovery (20)

Analyst Report: Osterman Research: File Archiving: The Next Big Thing or Just...
Analyst Report: Osterman Research: File Archiving: The Next Big Thing or Just...Analyst Report: Osterman Research: File Archiving: The Next Big Thing or Just...
Analyst Report: Osterman Research: File Archiving: The Next Big Thing or Just...
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
 
Information Management
Information ManagementInformation Management
Information Management
 
Big data baddata-gooddata
Big data baddata-gooddataBig data baddata-gooddata
Big data baddata-gooddata
 
Information & knowledge management
Information & knowledge managementInformation & knowledge management
Information & knowledge management
 
Reese ICT4902 Information Overload
Reese ICT4902 Information OverloadReese ICT4902 Information Overload
Reese ICT4902 Information Overload
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataThe Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
informationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxinformationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptx
 
Big data
Big dataBig data
Big data
 
Dealing with Big Data: Planning for and Surviving the Petabyte Age
Dealing with Big Data: Planning for and Surviving the Petabyte AgeDealing with Big Data: Planning for and Surviving the Petabyte Age
Dealing with Big Data: Planning for and Surviving the Petabyte Age
 
Cutting the Clutter - Tackling Information Overload
Cutting the Clutter - Tackling Information OverloadCutting the Clutter - Tackling Information Overload
Cutting the Clutter - Tackling Information Overload
 
ENTARENA - Benefits of a connected treasurer
ENTARENA -   Benefits of a connected treasurerENTARENA -   Benefits of a connected treasurer
ENTARENA - Benefits of a connected treasurer
 
Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 

Mais de Osterman Research, Inc.

Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Osterman Research, Inc.
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
Osterman Research, Inc.
 

Mais de Osterman Research, Inc. (20)

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive Migrations
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
Best Practices for File Sharing
Best Practices for File SharingBest Practices for File Sharing
Best Practices for File Sharing
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less Expensive
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
Putting IT Back in Control of BYOD
Putting IT Back in Control of BYODPutting IT Back in Control of BYOD
Putting IT Back in Control of BYOD
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social Media
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
 
Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...
 
Making File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureMaking File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More Secure
 

Último

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Último (20)

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Key Issues in eDiscovery

  • 1. WHITE PAPER Key Issues in eDiscovery ON An Osterman Research White Paper Published September 2012 SPONSORED BY SPON sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  • 2. Key Issues in eDiscovery EXECUTIVE SUMMARY Discovery involves the preservation, search, analysis and production of relevant information that might play a role in civil litigation. Its importance can be summed up by the Zubulake standard: "[A] party has a duty to preserve all evidence, including electronically stored information ('ESI'), that it knows, or should know, is relevant to any present or future litigation." What this means for every business is that it must retain all of its relevant electronic content – emails, files, databases, social media posts, instant messages and the like – and do so systematically and following a set of procedures that will allow it to satisfy all of its legal obligations. While the formal process of discovery has been a key element of civil litigation for decades, eDiscovery has become much more important over the past 10-15 years as the proportion of electronic content in most organizations has become more voluminous and more difficult to manage than information on paper. As evidenced by the following figure, businesses and other organizations believe that eDiscovery will remain just as important over the next 12 months as it is today, or it will become Poor eDiscovery more important. results in poor decision-making Anticipated Importance of eDiscovery During the Next 12 Months because those charged with managing litigation – as well as the overall organization – do not have sufficient insight about what is happening within their organ- ization. KEY TAKEAWAYS • The consequences of poor data management practices – inadequate archiving, no ability to implement legal holds, lack of competence, etc. – include significant legal judgments, loss of corporate reputation, and an increased level of overall risk. • Poor eDiscovery results in poor decision-making because those charged with managing litigation – as well as the overall organization – do not have sufficient insight about what is happening within their organization. ©2012 Osterman Research, Inc. 1
  • 3. Key Issues in eDiscovery • Good eDiscovery results in lower direct costs because of the reduced number of person-hours that must be invested in the collection, processing and review of information; and lower indirect costs because of reduced corporate risk. ABOUT THIS WHITE PAPER This white paper discusses the important practices and technologies that any organization should implement in order to improve eDiscovery and drive its cost as low as possible. The paper also presents the results of a primary market research survey conducted specifically for it that highlights the key problems that organizations have with current eDiscovery practices. Finally, a brief overview of this paper’s sponsors – Autonomy, C2C, Globanet, GWAVA and Imation – is included. SHOULD YOU CARE ABOUT eDISCOVERY? DEFINING TERMS Discovery is the critical process of searching for information that may be relevant for use as evidence in a trial or in pre-trial activities. It can include any sort of While discovery communication, document, metadata, advertisement, statement or other information that might be useful to prove a plaintiff’s or defendant’s case in a civil action. has focused traditionally on “eDiscovery” is simply the extension of this well-established process to any Electronically Stored Information (ESI) that an organization might possess – email paper documents, messages, presentations, spreadsheets, word processing files, tweets, Facebook over the past posts and any other communication or information that might be useful in a civil legal several years ESI action. By extension, eDiscovery can extend to any platform on which ESI is stored: desktop computers, laptops, smartphones, tablets, backup tapes, servers, and even has become a employees’ home computers and other personally owned devices. much more ENORMOUS GROWTH IN THE AMOUNT OF ELECTRONIC DATA important UNDER MANAGEMENT component of Organizations of every size create, send, receive and store an enormous and growing discovery for the amount of digital information. For example, the IDC Digital Universe study estimated that 1.8 zettabytes (1.8 trillion gigabytes) of information were created and replicated simple reason during 2011, a nine-fold increase from 2006 and more than doubling every two that a growing yearsi. Moreover, IBM estimates that each day 2.5 quintillion bytes of data are createdii. While much of this data is normally not subject to eDiscovery – e.g., proportion of television programming and the like – the enormous scale and growth of ESI is corporate content illustrative of the problem that organizations have, and will have, in finding and producing ESI in their organizations. As just a simple illustration of data growth in a is electronic and mid-sized company, consider the figure on the following page that demonstrates the never meets growth of content storage in a typical organization with 1,000 email users. paper. While discovery has focused traditionally on paper documents, over the past several years ESI has become a much more important component of discovery for the simple reason that a growing proportion of corporate content is electronic and never meets paper. Consider the following: • ESI is normally stored in much greater volume than are hard copy documents. • ESI can be modified quite easily. • ESI is often not readable apart from the system(s) that created it. • ESI contains information that is not normally displayed to users – metadata – that describes the context of the information and provides other useful and important information. ©2012 Osterman Research, Inc. 2
  • 4. Key Issues in eDiscovery Seven-Year Archiving Requirements for a 1,000-Person Company Gigabytes of Content Storage While email is often the most important single source of content in most organizations, ESI consists of a large number of data types, as noted earlier, that may be in any number of locations: there are many other content • Email systems • Social media data stores in the cloud or stored locally types – and • Collaboration systems like SharePoint® locations in • Real-time communication systems like Sametime • Repositories of structured and unstructured data which it might be • Employees’ home computers stored – that • Corporate and employee-owned smartphones • Tablet computers (e.g., Apple iPad, Dell Streak, etc.) organizations • Corporate wikis and blogs must include • Desktop computers • Laptop computers among their • File servers discoverable • USB storage devices (e.g., flash memory sticks, iPods, etc.) content sources. While email is often the most important single source of content in most organizations, there are many other content types – and locations in which it might be stored – that organizations must include among their discoverable content sources. Preservation of this content without a true archiving system is a challenge for many organizations for a number of reasons: • They must then determine where all of their content is located (no easy feat in any organization, let alone a distributed one). • They must back up this data to a central location or have ready access to it when required. • They must extract content from backup tapes or disk – an arduous task for IT even under good circumstances. ©2012 Osterman Research, Inc. 3
  • 5. Key Issues in eDiscovery WHERE ARE WE WITH eDISCOVERY TODAY? ORGANIZATIONS ARE (SORT OF) PREPARED FOR BASIC eDISCOVERY, BUT NOT MUCH ELSE Osterman Research has discovered that the vast majority of organizations believe they are reasonably well prepared to deal with searching for, finding and producing live email – i.e., content on email servers – in the context of eDiscovery. However, they are much less prepared to satisfy eDiscovery requirements for other types of content, particularly social media and cloud-based content repositories, as shown in the following figure. Preparedness to Search, Find and Produce Various Types of Content % Responding Prepared or Very Well Prepared Nearly three- quarters of internal legal counsel considers that eDiscovery is important or extremely important to their organizations, yet only slightly more than one- half of them are prepared or very well prepared to THE DISCONNECT BETWEEN IMPORTANCE AND READINESS Our research also discovered that internal legal counsel and corporate management deal with the believe eDiscovery is important, but they are not as prepared for it as they need to issues presented be. For example, nearly three-quarters of internal legal counsel considers that eDiscovery is important or extremely important to their organizations, yet only slightly by eDiscovery. more than one-half of them are prepared or very well prepared to deal with the issues presented by eDiscovery. Similarly, both IT management and senior, non-IT managers place greater importance on eDiscovery than they do on their preparedness to deal with the issues presented by it. ©2012 Osterman Research, Inc. 4
  • 6. Key Issues in eDiscovery Importance of and Preparedness for eDiscovery by Various Groups % Responding Important or Extremely Important % Responding Prepared or Very Well Prepared A much more efficient approach for document review is predictive coding, also known as THE GROWING IMPORTANCE OF PREDICTIVE CODING computer- Traditional eDiscovery relies on linear document review – the process of manually reviewing and coding potentially relevant and privileged content. While this process assisted review. works well for relatively small data sets, the review of large data sets makes linear Predictive coding document review inefficient and time-consuming. Moreover, it contributes significantly to the growing cost of eDiscovery because of both the multiple reviews generally results of the same content that often must take place, as well as the production of content in more accurate that ultimately will not be useful. Underscoring the enormous cost associated with reviewing documents during eDiscovery are the findings of a Rand analysis that coding, as well as found the review phase of eDiscovery accounts for 73% of the costs of producing faster document electronic documentsiii. review and lower A much more efficient approach for document review is predictive coding, also known costs of as computer-assisted review. This technique employs an expert’s review of key documents, followed by computer review of potentially relevant content, assigning a eDiscovery. rating to each document based on how closely documents match the expert-reviewed documents. Predictive coding generally results in more accurate coding, as well as faster document review and lower costs of eDiscovery. While predictive coding is not yet widely used, the technology was given a significant boost by a federal judge in the case of Da Silva Moore v. Publicis Groupe et aliv. The judge in this case ordered the adoption of a protocol that includes predictive coding. THE BASICS OF DISCOVERY THE FEDERAL RULES OF CIVIL PROCEDURE The Federal Rules of Civil Procedure (FRCP) consist of a set of rules that are focused on governing procedures for managing civil lawsuits in the United States district courts. While the United States Supreme Court is responsible for overseeing the FRCP, the United States Congress must approve these rules and any changes made to them. ©2012 Osterman Research, Inc. 5
  • 7. Key Issues in eDiscovery Several important changes to the FRCP went into effect in December 2006. The modifications represented many years of debate at various levels and had a major impact on electronic discovery within U.S.-based organizations. Many companies have responded to these changes by improving their information management and eDiscovery practices, although many have not. Among the key elements of the FRCP changes are the following: • An expansion of discoverable material to include all ESI that might be relevant in a legal action [Rule 26(a)]. • A schedule conference to discuss eDiscovery and other issues must be held within 120 days after a legal action is initiated [Rule 16(b)]. • Within 99 days after a legal action commences, the parties must come to an agreement about the protocols and procedures that will govern the eDiscovery process [Rule 26(f)]. Serious consequences • When a party requests information as part of eDiscovery, they can specify the format in which they would like it to be provided [Rule 34(b)]. can result from failure to Sanctions can be avoided with the court’s blessing if ESI is lost because of good • faith deletion practices that were not intended to destroy evidence [Rule 37(f)]. preserve potentially In summary, these changes reflect the fact that discovery of email and other ESI is now a routine aspect of most litigation. As a result, decision makers need to keep in relevant mind that ESI is treated differently than paper-based data; the FRCP rules now evidence. Courts require early discussion of, and attention to, eDiscovery as an integral component of any legal action; organizations should address the inadvertent distribution of have discretion to privileged or protected materials; organizations must now focus on a two-tiered impose a variety approach to discovery in which they must first deal with reasonably accessible information and then later focus on less accessible data; and, finally, the rules can of sanctions, provide a safe harbor from sanctions by imposing a good faith requirement. including monetary fines, KEY ELEMENTS OF A SOUND eDISCOVERY SYSTEM As part of an overall eDiscovery strategy, there are several things that any adverse organization must ensure it can satisfy well in order to minimize the risk of problems inferences, during legal actions. While these apply specifically to eDiscovery, the general principles involved largely apply to satisfying regulatory obligations, as well: additional costs for third parties Respond quickly to eDiscovery requests • FRCP Rule 26(a)(1) requires that organizations have a solid understanding of to review or their data assets and that they are able to discuss these issues ahead of the search for data, initial pre-trial discovery meeting – FRCP Rule 16(b) requires that this meeting take place within 99 days from the commencement of a legal action. or even criminal Organizations that have not planned ahead for such an eventuality may face a charges. variety of negative consequences, not least of which is the enormous expense and disruption that eDiscovery can create for the unprepared. Sometimes, however, organizations have much less time than this to produce the required information. For example, in the case of Best Buy v. Developers Diversified Realtyv, the judge in the case ruled that the latter had to produce electronic content within just 28 daysvi. • Impose legal holds when necessary If a litigation hold – i.e., a suspension of any deletion of content that might be relevant during a legal action – is required, it is imperative that an organization preserve all relevant data, such as emails, word processing documents that may contain business records, financial spreadsheets, etc. Serious consequences can result from failure to preserve potentially relevant evidence. Courts have discretion to impose a variety of sanctions, including monetary fines, adverse ©2012 Osterman Research, Inc. 6
  • 8. Key Issues in eDiscovery inferences, and additional costs for third parties to review or search for data, or even criminal charges. At a minimum, an organization that cannot produce data as a result of deletion may suffer a damaged corporate reputation. • Identify what is and is not accessible Each party to a civil litigation must also determine what it can and cannot reasonably produce. If the evaluation determines that certain electronic content cannot be produced because it is not reasonably accessible or it is too expensive to produce, FRCP Rule 26(b)(2)(B) of the FRCP still requires that information about this content must be forthcoming. This might include, for example, information describing content on backup tapes that is in a format that can no longer be read because the equipment that could access the information is no longer in use. This further implies that ESI must be preserved even if it is not reasonably accessible. • Manage a growing number of data types and venues Complicating the eDiscovery process further is the fact that there is a large and growing number of data types and platforms on which relevant data may be stored. For example, discoverable content will typically reside on corporate email servers, file servers, SharePoint databases and other IT-managed systems. However, it can also reside on corporate and personal smartphones and tablets, cloud-based data repositories like Dropbox, employees’ home computers, USB sticks and a host of other on-premise and cloud-based platforms. One of the Complicating the more important downsides of the Bring Your Own Device (BYOD) trend, for example, is this proliferation of corporate content in locations that are not under eDiscovery IT’s control. process further is IMPORTANT ISSUES TO CONSIDER the fact that there There are a variety of lessons that organizations can take from court decisions about is a large and what to do – and what not to do – in the context of eDiscovery. What follows are some notable cases that can shed light on best practices when considering how to growing number plan for eDiscovery: of data types and • A failure to preserve ESI may lead to sanctions platforms on In the case of Pension Committee of University of Montreal Pension Plan v. Banc which relevant of America Securities, LLCvii, the Court issued sanctions against parties that did data may be not adequately preserve ESI, citing the “gross negligence” of their actions. This ruling was made even though the judge found that there was no evidence of bad stored. faith on the part of those who did not preserve the required ESI. • eDiscovery must be relatively specific In the 2010 case of Moulin Global Eyecare Holdings Ltd. v. KPMG that adjudicated in Hong Kong, the court rejected plaintiffs’ arguments a request for discovery of ESI that it considered too expansive. The court determined that allowing such broad access to the defendant’s electronic information would be “tantamount to requiring the defendants to turn over the contents of their filing cabinets for the plaintiffs to rummage through.viii” • Backup tapes are not satisfactory for eDiscovery The case of Johnson v. Neimanix is a good example of why using backup tapes as the primary source of discoverable content is not a best practice. The defendant argued that it should not have to produce emails that were stored on 5,880 backup tapes, because accessing this information would allegedly have required 14,700 person-hours to catalog and restore, and that an additional 46.7 days would have been required for the creation of .PST files. The defendant argued that this data was not reasonably accessible. Luckily for the defendant, the Court agreed with their position and did not require production of the data. However, a judge could easily have determined that this content should have been archived and ordered the defendants to produce the requested data. ©2012 Osterman Research, Inc. 7
  • 9. Key Issues in eDiscovery • Cooperation between parties is essential In Digicel v. Cable & Wireless PLC, the defendant made a unilateral decision not to search through their backup tapes for content. Further, the defendant determined the search terms it would use, a decision that the plaintiffs opposed. The British court that heard the case overruled the defendant’s decision and ordered it to both restore employee emails that were stored on backup tapes, as well as add a few more search terms. The court was not willing to allow one party to the suit to make unilateral decisions regarding what content was discoverable.x • Social media content is increasingly part of eDiscovery The case of Lester v. Allied Concrete Company is illustrative of the growing importance of social media content in legal actionsxi. In this case, a personal injury attorney instructed his client to delete various photographs from his Facebook profile instead of placing a formal legal hold on these images, or at least instructing that the content not be deleted. In response, the Court ordered the attorney to pay $522,000 for this spoliation of evidence and required the client to pay $180,000, despite the fact that a jury awarded the plaintiff $8.6 million (later reduced by the Court to $4.1 million)xii. The ill-advising attorney no longer practices law. Good eDiscovery • eDiscovery must be managed competently and related tools, In Green v. Blitz U.S.A.xiii, the Court sanctioned the defendant for a variety of policies and failures, including their representative (who claimed to be computer illiterate) not practices can putting a legal hold on relevant data, not coordinating his work with the defendant’s IT department, and not performing keyword searches, all of which help avoid legal resulted in relevant documents not being produced. After key documents were actions not discovered in this case, but were discovered in another case one year later, the judge a) issued a $250,000 civil contempt sanction against Blitz, b) ordered altogether by the company to inform plaintiffs from the past two years about the sanction, and ensuring that, c) to include a copy of the sanction memorandum in every case in which it will be involved during the next five years. through the use of good search • Metadata may need to be produced Judge Shira Scheindlin, who ruled in the landmark Zubulake v. UBS Warburg capabilities and case, issued an important ruling in February 2011 that will have important analytics, ramifications for the use of metadata. In National Day Laborer Organizing Network v. U.S. Immigration and Customs Enforcement Agency,xiv Judge corporate policies Scheindlin a) stressed the importance of metadata in her ruling that “certain key are being metadata fields are an integral part of public records,” and b) that counsel must “make greater efforts to comply with the expectations that courts now demand followed on a …with respect to expensive and time-consuming document production.” continual (and, • Home computers may constitute part of your discoverable content perhaps, near In Orrell v. Motorcarparts of America, Inc.xv, the Court ordered the production of real-time) basis. a plaintiff’s home computer for forensic examination because it contained information that allegedly had been wiped from the plaintiff’s company-supplied laptop computer. HOW CAN YOUR ORGANIZATION BENEFIT FROM PROPER eDISCOVERY? BE PROACTIVE INSTEAD OF REACTIVE All organizations should deploy sound eDiscovery capabilities that include the ability to index content, search for it, allow it to be tagged or classified, and impose legal holds quickly. Moreover, these tools should be sufficient so as to provide decision makers confidence that all relevant data is being held, and that all archived information that is relevant to a case has been discovered (e.g., data on mobile ©2012 Osterman Research, Inc. 8
  • 10. Key Issues in eDiscovery devices). The right eDiscovery capabilities can help an organization to be proactive in two important ways: • Good eDiscovery and related tools, policies and practices can help avoid legal actions altogether by ensuring that, through the use of good search capabilities and analytics, corporate policies are being followed on a continual (and, perhaps, near real-time) basis. This allows an organization to monitor employee behavior on an ongoing basis to look for potentially actionable statements or activities, and to adjust corporate policies on-the-fly to minimize the potential for legal action. • In situations where a legal action has already begun, robust eDiscovery capabilities can help in early case assessment so that decision makers can understand their legal position early on, at times to an organization’s advantage over the opposition. This might include reviewing the likelihood of victory early in a case, allowing an organization either to settle quickly and avoid significant legal fees or an adverse judgment; or giving decision makers confidence that they can prevail and thereby reduce the likelihood of an adverse judgment. Having the right tools lets decision makers focus on the merits of a case instead of the process, and reduced costs lets an organization devote more resources toward resolving the case instead of spending significant amounts on the eDiscovery process itself. From an IT In short, being proactive will help decision makers to make better and more well perspective, one informed decisions. This will help minimize the negative impact of a legal action and of the benefits of can lead to lower legal fees, the reduced likelihood of court-imposed sanctions, and reduced disruption to normal business operations. good eDiscovery is its ability to IMPROVE THE EFFICIENCY OF LITIGATION The right eDiscovery systems, services and tools can help an organization respond to reduce storage legal actions more effectively. The appropriate tools will help organizations to management understand what content they have available and what is not reasonably accessible. These tools can also streamline the eDiscovery process and help organizations problems for respond more quickly and at a lower cost. email and other types of business LOWER COSTS Good eDiscovery capabilities can also help an organization reduce the overall costs of records. managing email content, records and the business itself. These benefits include: • Avoiding many of the costs associated with outside counsel expenses by reducing the subset of data that has been flagged for legal review. • Reducing the length of the eDiscovery process, which can result in hard cost savings of internal staff time. • Reducing other costs, including legal judgments, fines, and public relations damage from negative press. • Reducing the cost of backing up content by moving older, unstructured data such as email, to content archiving systems. From an IT perspective, one of the benefits of good eDiscovery is its ability to reduce storage management problems for email and other types of business records. Osterman Research has found in numerous surveys that most of the serious problems involved in managing email systems are storage-related, including problems like large attachments sent through email, growing use of attachments itself, and storing large volumes of older content on primary storage systems connected to live email servers. These are benefits that can be realized in the management of other types of records as well, since this content can also be migrated to less expensive archival storage. The right archiving, litigation hold and related solutions can significantly reduce ©2012 Osterman Research, Inc. 9
  • 11. Key Issues in eDiscovery storage costs and provide a number of other email management benefits well beyond just eDiscovery. ELECTRONIC DISCOVERY REFERENCE MODEL The Electronic Discovery Reference Model (EDRM), diagrammed in the following figure, was a response to the relatively few standards and lack of generally accepted guidelines for the process of eDiscovery that existed prior to its development. The team that developed the EDRM was facilitated by George Socha (Socha Consulting LLC) and Tom Gelbmann (Gelbmann & Associates), and included 62 organizations, among whom were software developers, law firms, consulting firms, professional organizations and large corporations. Electronic Discovery Reference Modelxvi The EDRM, which was placed into the public domain in May 2006, is designed to help organizations manage the Begun in May 2005, the goal of the EDRM Project was the creation of a framework for the “development, selection, evaluation and use of electronic discovery products process of and services”. The EDRM, which was placed into the public domain in May 2006, is eDiscovery from designed to help organizations manage the process of eDiscovery from the initial stages of managing electronic information through to its presentation. the initial stages of managing The EDRM’s development was important because it represented a major step forward in the standardization of the eDiscovery process. Standardization is important for electronic eDiscovery for a variety of reasons, most notably because of the growth in the information quantity and diversity of ESI, as well as the large number of entities that will need to process this data (internal and external legal counsel, senior managers, archiving through to its solution vendors, cloud-based IT managed services, outside forensics firms and presentation. others). Following development of the EDRM was the EDRM XML project in the 2006-2007 timeframe. The goal of this project was to “provide a standard, generally accepted XML schema to facilitate the movement of electronically stored information (ESI) from one step of the electronic discovery process to the next, from one software program to the next, and from one organization to the next. The EDRM XML 2 project continued the development of the EDRM XML schema for metadata, developing protocols for the number of electronic files that are preserved in their native format, and developing a compliance validation tool, among other projects. KEY ELEMENTS OF THE EDRM The EDRM is divided into nine sections that focus on the process of managing an eDiscovery effort: ©2012 Osterman Research, Inc. 10
  • 12. Key Issues in eDiscovery • Information Management This phase focuses on managing electronic content in such a way that an organization can prepare for eDiscovery should that become necessary. The goal of Information Management in an EDRM context is to minimize the risk and cost associated with the entire process of eDiscovery. Managed properly, this step can dramatically reduce the effort required in the subsequent phases of the EDRM process. • Identification Understand the “inventory” of ESI that might be relevant in a particular legal action and that might have to be presented during discovery. At this point in the process, discovery demands, disclosure obligations and other pertinent claims and demands are reviewed and considered. The goal at this stage of the process is to understand the universe of information that might be required in order to respond to appropriate eDiscovery requests and then determine the subset of information that will be relevant for further processing. • Preservation This is a critical step that ensures that ESI is protected from spoliation and modification, such as through the imposition and enforcement of a legal hold on all relevant ESI. If spoliation does occur, the consequences can be expensive. For example, in the case of Leon vs. IDX Systems Corporation [2006 U.S. App. LEXIS 23820 (9th Cir. Sept. 20, 2006)], the plaintiff deleted 2,200 files from the The purpose of laptop computer his employer had issued to him. The court dismissed the case and awarded the defendant $65,000 for the spoliation. the Information Governance • Collection During this phase, all relevant ESI is collected from the various sources that Reference Model contain it, including messaging archives, backup tapes, file servers, desktops, (IGRM) is to laptops, employees’ home computers, smartphones and other sources. “provide a • Processing common, At this point, collected data is indexed and, thus, made searchable. The data should also be de-duplicated in order to reduce the amount of data that must be practical, flexible reviewed during subsequent phases of the discovery process. Collected data framework to should also be prioritized into a) content that will likely be relevant later in the process and b) content that will likely not be relevant. At this point, decision help organ- makers may want to convert ESI into a form that will permit the most efficient izations develop and thorough review of its contents. and implement • Analysis effective and This phase involves a variety of activities, including determining exactly what the ESI means in the context of the legal action at hand, developing summaries of actionable relevant information, determining the key issues on which to focus, etc. information • Review management The review phase includes evaluating the content for its relevance, determining if programs. specific items are subject to attorney-client privilege, redacting ESI as appropriate, etc. • Production The production of data involves delivering the relevant ESI to any parties or systems that will need it. It also includes the activities focused on delivering ESI in the appropriate formats (e.g. in native or image format) and form(s), including DVDs, CD-ROMs, paper, etc. • Presentation The presentation of ESI is a key consideration at various points of the eDiscovery process – as information is reviewed, analyzed, produced, etc. The specific forms of presentation for ESI will vary widely depending on the content; how, where and by whom the content will be presented; and other factors. ©2012 Osterman Research, Inc. 11
  • 13. Key Issues in eDiscovery THE INFORMATION GOVERNANCE REFERENCE MODEL The purpose of the Information Governance Reference Model (IGRM) is to “provide a common, practical, flexible framework to help organizations develop and implement effective and actionable information management programs.”xvii Its goal is essentially to bring together various stakeholders within an organization and provide them with a common framework for discussing and acting on the Information Management node of the EDRM. The IGRM fills an important void because it attempts to integrate the records management, archiving and retention obligations across an entire organization. Information Governance Reference Modelxviii Enacted in 1975, the Federal Rules of Evidence (FRE) are a set of requirements that determine how evidence is presented during trial in the U.S. federal courts. OTHER ISSUES FEDERAL RULES OF EVIDENCE Enacted in 1975, the Federal Rules of Evidence (FRE) are a set of requirements that determine how evidence is presented during trial in the U.S. federal courts. These rules are focused mostly on the initial presentation of evidence during trials. Individual states may use these rules as the basis for their own rules of evidence, or they may adopt a different set of rules for presenting evidence at trial. It is important to note that for purposes of presenting evidence, a printed or otherwise human-readable version of electronic evidence is considered to be an original and can be presented at trial according to FRE Rule 1001(3). Authentication is a key part of the eDiscovery process because its goal is to prove that a document is what its presenter claims it to be – a true and verifiable representation of an electronic document. Authentication for electronic content is even more critical than for paper-based documents, since electronic documents are more easily altered. For example, the process of copying data from one location to ©2012 Osterman Research, Inc. 12
  • 14. Key Issues in eDiscovery another may actually alter the metadata of that data and call into question its authenticity. When the authenticity of a piece of evidence has been called into question, an attorney may need to depose a witness who can verify the chain of custody of an electronic document, a signature block in an email can be used to provide authenticity, or each party in a legal action can agree to stipulate that electronic records will be considered authentic. Atkinson-Baker has written a good overview of the authentication requirements for electronic recordsxix. Proving the authenticity of electronic records is a major issue that many organizations have not completely resolved. A classic case in point is Vinhnee vs. American Express Travel Related Services Company, Inc. In this case, American Express sought payment for more than $40,000 in charges on two credit cards from a California resident who had filed for bankruptcy protection. However, because American Express could not prove the authenticity of the electronic statements it presented during trial, it lost the case even without the plaintiff being present. Another important case, Lorraine v. Merkel, saw the Court deny the admissibility of electronic evidence simply because it could not be authenticatedxx. In Lorraine v. Merkel, the chief magistrate presiding over the case wrote: “…there are five distinct but interrelated evidentiary issues that govern The most useful whether electronic evidence will be admitted into evidence at trial or archiving accepted as an exhibit in summary judgment practice. Although each of these rules may not apply to every exhibit offered…each still must be solutions will considered in evaluating how to secure the admissibility of electronic provide a verified evidence to support claims and defenses. Because it can be expected that electronic evidence will constitute much, if not most, of the audit trail evidence used in future motions practice or at trial, counsel should showing who know how to get it right on the first try.” accessed “computerized data ... raise unique issues concerning accuracy and archived content authenticity ... The integrity of data may be compromised in the course of discovery by improper search and retrieval techniques, data and when it was conversion, or mishandling.” accessed, preventing an Status of U.S. States’ Adoption of FRCP Requirements original of a document from being altered after the fact and minimizing the potential need to address chain-of- custody issues. ©2012 Osterman Research, Inc. 13
  • 15. Key Issues in eDiscovery The ability to provide the authenticity of content, as well as the chain of custody for content relevant to a legal action, is one of the more important benefits of an archiving solution. The most useful archiving solutions will provide a verified audit trail showing who accessed archived content and when it was accessed, preventing an original of a document from being altered after the fact and minimizing the potential need to address chain-of-custody issues. STATE FRCP-RELATED LAWS The FRCP is but one of the key issues with which litigators and others involved in the eDiscovery must deal. As shown in the figure on the preceeding page, many U.S. states have already passed, or will soon pass, their own version of the FRCP for civil litigation that takes place within their respective state court systems. eDISCOVERY IN OTHER JURISDICTIONS Owing to the somewhat fairly litigious nature of society in the United States, U.S. eDiscovery practices are more advanced and requirements more specific than in most other nations. For example, in most of Europe organizations are not required to produce content that runs counter to the claims they make in a legal action. Requirements in the United Kingdom, however, can compel organizations to produce damaging content, but only after a court orderxxi. While eDiscovery in American legal proceedings is difficult, laws in other parts of the world can significantly complicate eDiscovery (often referred to as “e-disclosure” While eDiscovery outside of the United States). For example: in American • At present, courts in England and Wales may or may not require some type of legal proceedings standard disclosure – namely, the disclosure that a document “exists or has is difficult, laws existed”. The recipient of the disclosure has a right to inspection of the documents, albeit subject to a variety of restrictionsxxii. However, in April 2013 in other parts of the UK Civil Procedure Rule 31.5 will go into effect, permitting courts much more the world can discretion when ordering disclosure. Some of the rules are similar to the FRCP in the United States, such as the requirement to disclose relevant documents and significantly the applicability of the Rule to electronic contentxxiii. complicate • In 2010, Ontario amended its rules of civil procedure in order to accommodate eDiscovery (often the growth of electronic content as part of the discovery process. Rule referred to as “e- 29.1.03(4) now reads “In preparing the discovery plan, the parties shall consult and have regard to the document titled 'The Sedona Canada Principles disclosure” Addressing Electronic Discovery' developed by and available from The Sedona outside of the Conference.” United States). • As is the case in many countries, Mexico does not have pre-trial discovery or disclosure requirements, but the courts will compel litigants and third parties to produce information if it is deemed necessary to the proceedings and if the documents are specifically identified. • The European Commission Directive 95/46/EC, adopted in October 1995, was designed to standardize the protections for data privacy among all of the member states of the European Union and to protect individuals’ right to privacy. The Directive focuses on the processing of individuals’ data within the EU, but also applies to any entity outside of the EU to whom this data might be provided, such as during an eDiscovery exercise. The Directive does not permit data to be provided to anyone whose national laws do not adequately safeguard privacy rights. Moreover, the Convention on the Taking of Evidence Abroad in Civil Matters (the Hague Evidence Convention) – which the U.S. Senate ratified in 1972 – was designed to “establish a system for obtaining evidence located abroad that would be ‘tolerable’ to the state executing the request and would produce evidence ©2012 Osterman Research, Inc. 14
  • 16. Key Issues in eDiscovery ‘utilizable’ in the requesting state.” • France imposes even more stringent requirements than Directive 95/46. French Penal Code, Law No 80 – 538 imposes fines and/or jail time for those who seek, request or disclose information intended to develop evidence for foreign legal proceedings. • Australia’s Supreme Court of Victoria, in its Practice Note No. 1 of 2007 (February 2007), strongly suggested that parties to a legal action should consider using technology to improve the efficiency of legal proceedings, including eDiscovery tools. The Federal Court of Australia has gone further and developed eDiscovery rules similar to those contained in the new amendments to the FRCP. Moreover, the Australian Federal Court ruled in 2009 that all cases meeting minimum requirements must be managed only with digital content, not paper. Blocking statutes, such as the French law noted above, have been in place for many years in various countries and were enacted specifically to block discovery proceedings. For example, blocking statutes exist in Ontario, Canada (Business Records Protection Act), the United Kingdom (The Shipping and Commercial Documents Act) and the Netherlands (Economic Competition Act). The key issue to Does your IT keep in mind with regard to blocking statutes is that even though data has been management found, it may not be usable. know the name A good analysis of eDiscovery outside of the United States is E-Discovery Around the of your Worldxxiv. organization’s chief legal WHAT SHOULD YOU DO NEXT? counsel? Does ACHIEVING THE IT-LEGAL HANDSHAKE legal counsel In order to establish a robust eDiscovery capability in any organization, but particularly a larger one, it is essential to start with a “meet-and-greet” among the know the relevant internal parties. For example, does your IT management know the name of name(s) of your your organization’s chief legal counsel? Does legal counsel know the name(s) of your senior IT managers? Are key stakeholders aware of who else would potentially be senior IT involved in eDiscovery planning? managers? Are Establishing this “legal-IT handshake” is a critical first step toward developing an key stakeholders effective eDiscovery strategy. Having each group familiarize itself with the aware of who requirements of the other will go a long way toward helping an organization develop an effective eDiscovery plan. For example, while IT may perceive that all legal else would counsel needs is a robust search capability for electronic content, the reality is that potentially be the legal workflow is more complex than that, and includes search, creating internal workflows for content, review of the discovered content, marking up the relevance of involved in records, exporting data sets for use in forensics analysis tools, sending to external eDiscovery counsel for review, and taking things to the point of production (such as going through the Bates numbering process to serialize a production set). planning? EMPLOY YOUR EMPLOYEES While policies, practices, procedures and technologies are all vital, it is essential to educate employees, consultants and others in the organization about the importance of retaining important documents, using corporate communication and collaboration resources wisely, not deleting documents intentionally and the like. Employing users as this first line of defense can go a long way toward improving eDiscovery in virtually any organization. THE IMPORTANCE OF GOOD PRACTICES It is also essential to understand that eDiscovery is critical to any business or organization, not just enterprises or organizations that serve “litigious” markets. For example, the survey conducted for this white paper found that across all industries ©2012 Osterman Research, Inc. 15
  • 17. Key Issues in eDiscovery and organization sizes, there was a median of 2.0 eDiscovery cases per 1,000 employees in the year ending mid-2012; this figure is expected to increase to 2.9 during the next year. A variety of laws and other requirements, as well as common eDiscovery risks and scenarios, can apply to any business of any size in any industry. Moreover, every organization will have a unique mix of policies, processes, business operations, and technologies that may increase its particular risks in the context of civil litigation. As a result, an accurate baseline snapshot of eDiscovery and corresponding expenditures today within an organization will help its decision makers to develop, priortize, and justify changes and investments moving forward. FOCUS ON POLICIES It is also important to establish data retention and deletion schedules for all content types, a practice that many organizations do not pursue with sufficient urgency. It is important for any organization to retain all of the electronic data that it will need for current and anticipated eDiscovery and other retention requirements. However, many organizations, either by overspecifying the amount of data they must retain and/or not establishing appropriate data deletion policies, retain more information than is necessary, creating greater and unnecessary liability. This can result in much higher eDiscovery costs because more data is retrieved and must be reviewed, as well as unnecessarily high storage costs. It is important for any organization to have An adequate its legal team work with IT to conduct a review and ensure compliance with regulatory and statutory requirements. Data classification here is a critical step – legal hold decision makers must define what needs to be retained, what can safely be deleted, process must and the disposition method to be used. include If a legal action is “reasonably anticipated”, it is vital that an organization immediately technologies and begin to identify and preserve all relevant data. For example, a claim for a breached contract with a contractor might require preservation of emails and other electronic practices that will documents between employees and the contractor, as well as between employees enable these talking about the contract or the contractor’s performance. A properly configured eDiscovery and data archiving capability will allow organizations to immediately place holds to be a hold on data when requested by a court or regulator or on the advice of legal imposed, because counsel, and retain it for as long as necessary. relying on Litigants that fail to preserve or hold ESI properly are subject to a wide variety of individuals to consequences, including reputational harm, additional costs for third parties to review hold data may or search for data, court sanctions, directed verdicts or instructions to a jury that it can view a defendant’s or plaintiff’s failure to produce data as evidence of culpability. not be sufficient in many cases. An adequate legal hold process must include technologies and practices that will enable these holds to be imposed, because relying on individuals to hold data may not be sufficient in many cases. In addition to the Green v. Blitz case noted earlier, Jones v. Bremen High School Districtxxv is illustrative of the importance of good legal holds: • The plaintiff filed an Equal Employment Opportunity Commission charge in October 2007xxvi . The defendant did not issue a litigation hold, but did instruct three individuals in the District to search through email and save relevant messages. However, destruction of ESI continued and only one year after the case was filed did the District implement automated email archiving. Only in Spring 2009 did the defendant instruct its employees to retain emails that might be relevant to this case. The judge in this case did not issue an adverse inference instruction to the jury, but did instruct them that a lack of relevant emails was not evidence that they did not exist. Further, the District had to pay for the cost of court reports when witnesses were deposed about recently created emails, and they had to pay the plaintiff’s costs associated with preparing a motion for sanctions. ©2012 Osterman Research, Inc. 16
  • 18. Key Issues in eDiscovery IMPLEMENT THE RIGHT TECHNOLOGIES Last, but certainly not least, deploy the storage systems and software tools, services or other capabilities – archiving, storage, predictive coding, etc. – that will enable proactivity in the context of eDiscovery. As discussed above, these capabilities will ensure that all necessary data is accessible and reviewable early in the lifecycle of a case. The right technology will help an organization classify data as it is created and then discover content wherever it exists. These can include, but are not limited to, email servers, file servers, local computers, and other sources like mobile devices. Good tools will also create a complete eDiscovery repository and deduplicate the data. For example, single-instance storage or file/block deduplication applications can reduce the size of some data stores and significantly streamline the entire eDiscovery process. SPONSORS OF THIS REPORT Autonomy, an HP Company, is a global leader in software that processes human information, or unstructured data, including social media, email, video, audio, text, web pages, and more. Autonomy’s powerful management and analytic tools for structured information together with its ability to extract meaning in real time from all forms of information, regardless of format, offer a unique capability for organizations ! seeking to derive the most value from their data. www.autonomy.com To meet today’s unique challenges and legal requirements, organizations need an eDiscovery solution that is efficient and defensible, offers massive scalability, is twitter.com/ language and format independent, and provides end-to-end coverage across the AutonomyCorp entire eDiscovery process—from information management, identification, and preservation through collection, analysis, review, and production. To support rigorous autonomy@ litigation cycles, general counsel and outside counsel alike require an eDiscovery autonomy.com solution that not only reduces cost and risk, but is simple to use, automates processes, and includes powerful workflow capabilities. +1 44 1223 4480000 Autonomy eDiscovery solutions unify identification, collection, early case assessment, +1 415 243 9955 document review, and production in a single application that leverages Meaning ! Based Coding, advanced analytics, and policy-based, automated workflow to simplify the process. Autonomy eDiscovery operates seamlessly with Autonomy Legal Hold and a range of modules from the Autonomy Information Governance suite, including Autonomy Consolidated Archive, to provide a complete end-to-end solution for enterprise customers. C2C believes that the best way for IT to mitigate the challenges of eDiscovery is to be prepared. A well thought out information management strategy can save time and money and reduce risks associated with eDiscovery. An email management solution like ArchiveOne provides a solid foundation for any comprehensive Information Management strategy to be built on because its sophisticated policy engine allows granular control over the data and its advanced search and retention management ! capabilities provide control of email – live or archived – anywhere in the organization, including PSTs wherever they reside (server, desktop, laptop). www.c2c.com C2C solutions focus on streamlining the early stages of EDRM and empowering expert info@c2c.com end users (such as in-house counsel, HR, compliance officers) to explore email data early by iteratively searching until the most responsive messages are identified, and +1 44 118 951 1211 then collecting and preserving them in a secure litigation repository. Additionally, +1 508 870 2205 these expert end users can manage message-level legal holds ensuring that the most ! critical data is fully protected. The result is a smaller, more targeted data set that can be packaged for formal processing, review and analysis. ©2012 Osterman Research, Inc. 17
  • 19. Key Issues in eDiscovery Businesses that implement such solutions are typically better positioned to respond to eDiscovery requests because they retain only what they need and have access to it when they need it. Managing email data up front drives efficiency into downstream IT discovery processes – identification, collection, preservations – and reduces time, costs and risks of eDiscovery. Globanet is a leading provider of archiving and ediscovery solutions worldwide. Founded in 1996, the company is a pioneer in archiving and intelligent information ! governance, and has developed a portfolio of software and services to help organizations manage data from creation to expiry. A Symantec Technology- www.globanet.com enabled Platinum Partner with Master Specialization in Archiving and eDiscovery, Globanet’s professional services team has extensive experience with industry- twitter.com/Globanet leading Enterprise Vault and Clearwell. ! info@globanet.com The first certified Symantec Enterprise Vault consultancy in North America, Globanet has successfully delivered more than 2,500 Enterprise Vault projects to date, +1 310 202 0757 including some of the largest and most complex deployments. The company’s ! combined team of Enterprise Vault engineers and software developers is one of the largest in the world. Its developers have extensive knowledge of the Enterprise Vault API and have customized and integrated Enterprise Vault to meet some of the toughest client requirements. In addition, many of Globanet’s proprietary software tools extend and improve on Enterprise Vault's functionality, delivering an enhanced Enterprise Vault experience. Whether a small-medium businesses or a large global enterprise, Globanet offers a variety of solutions to meet every client’s needs, from simple and affordable data migrations to large-scale data management solutions. Globanet’s broad range of services includes policy and solution design, installation and configuration, data migration, custom development and add-ons, and project-based ediscovery consulting. For over 10 years, GWAVA has been focused on message security – providing anti- spam and anti-virus protection for email; backup, restore and archiving of digital ! messages; and email system management. www.gwava.com Messaging has changed from simply email to include texting, instant messaging, collaboration and social media. You need to keep it, track it, and manage all of it. No matter where it comes from or where it resides. All while dealing with the increasing twitter.com/GWAVA sophistication of cyberterrorists. GWAVA takes on these challenges, securing the messages of thousands of organizations around the world. GWAVA products back up, questions@gwava.com archive and retain electronic messages including email, text and more assuring they are accessible when you need them. Going beyond traditional anti-spam and anti- +1 866 464 9282 virus protection, GWAVA makes sure cyber-criminals cannot corrupt or access your +1 646 304 6250 messages or hijack your organization’s resources. ! With GWAVA as your message security partner, you will be able to respond to the rapidly changing definition of what is important to your organizations’ communications. A knowledgeable and friendly worldwide support team is always available to respond to your needs, no matter when or where you may be. GWAVA has offices in the United States, Canada, Germany, Great Britain and Australia. We support Microsoft, Novell, Research in Motion, and other enterprise infrastructure platforms. ©2012 Osterman Research, Inc. 18
  • 20. Key Issues in eDiscovery Imation is a global scalable storage and data security company. Our portfolio includes tiered storage and security offerings for business, and products designed to manage audio and video information in the home. ! Imation Scalable Storage solutions are purpose-built to deliver multi-media, multi-tier, secure data protection and archiving for data-intensive, compliance-driven SMBs. www.imation.com These organizations are experiencing explosive data growth fueled by modernization of IT and are intrigued by new storage tiers and media but lack practical ways to twitter.com/ implement. Through its Scalable Storage solutions, Imation is the only company to imationstorage enable four layers of data storage: active, online, nearline and cloud. +1 651 704 7777 Imation Scalable Storage solutions reduce storage costs by optimizing and ! automating data protection and compliance. Solutions include: Imation DataGuard NAS-based disk drive appliances for data protection, Imation InfiniVault data archive appliances, RDX removable hard disk storage systems and Imation LTO Tape Drive and Tape Library solutions. Imation Scalable Storage solutions deliver maximum efficiency and ease of use in regulated bulk storage environments. ©2012 Osterman Research, Inc. 19
  • 21. Key Issues in eDiscovery © 2012 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i http://www.emc.com/collateral/about/news/idc-emc-digital-universe-2011-infographic.pdf ii http://www-01.ibm.com/software/data/bigdata/ iii http://www.rand.org/content/dam/rand/pubs/monographs/2012/RAND_MG1208.pdf iv http://pdfserver.amlaw.com/legaltechnology/Da_Silva_Moore_v_Publicis_Groupe_11- civ-1279_nysd_complaint.pdf v 636 F.Supp.2d 869 (2009) vi http://www.inboxer.com/downloads/Whitepaper_FRCP.pdf vii 2010 WL 184312 (S.D.N.Y. Jan. 15, 2010) viii http://www.clearwellsystems.com/e-discovery-blog/tag/case-law/ ix 2010 U.S. Dist. LEXIS 110496 (E.D. Mo. Oct. 18, 2010) x Source: Kroll Ontrack xi http://blog.x1discovery.com/2011/11/15/facebook-spoliation-costs-lawyer-522000-ends- his-legal-career/ xii http://www.readthehook.com/102207/not-over-both-sides-appeal-lester-v-allied-concrete xiii http://civilprocedure.dbllaw.com/2011/08/past-eDiscovery-errors-result-in-sanctions/ xiv http://ralphlosey.files.wordpress.com/2011/02/ndlon-v-ice-10-civ-3488- metadata-foia_revised.pdf xv 2007 WL 4287750 (W.D.N.C. Dec. 5, 2007) xvi Source: EDRM (edrm.net) xvii http://www.edrm.net/projects/igrm xviii http://www.edrm.net/projects/igrm xix http://www.depo.com/resources/aa_thediscoveryupdate/authenticating_email.html xx http://www.wwpi.com/index.php?option=com_content&task=view&id=4092&Itemid=44 xxi http://www.legaltechnology.com/the-orange-rag-blog/guest-article-the-ediscovery-passport/ xxii http://www.justice.gov.uk/courts/procedure-rules/civil/rules/part31#IDAALICC xxiii http://www.clearwellsystems.com/e-discovery-blog/tag/practice-direction/ xxiv http://www.mcmillan.ca/Files/ARTICLE_E-Discovery_Around_the_World_0110.pdf xxv Dist. 228, 2010 WL 2106640 (N.D. Ill. May 25, 2010) xxvi http://blog.legalholdpro.com/2010/06/10/northern-district-of-illinois-makes-its-own- way-with-opinion-echoing-need-for strong-legal-holds/ ©2012 Osterman Research, Inc. 20