SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
e-Discovery

Data Retention and Other Useful
       Discussion Topics
Document Retention Policy
• Document retention means many things to many people depending on
  their business.
        • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices)
        • HIPPA
• Can be mandated based on industry by either federal, or state
  jurisdictions, sometimes both.
• Basically if you are not mandated to retain your documents, draft and
  adhere to your own document retention policy. This will make any
  electronic discovery process much more efficient.
• Adhering to your own document retention policy ensures your ethical
  practices regarding data deletion if involved in litigation.
• An effective data retention policy should:
        • Reduce “data artifacts”
        • Reduce the amount of production and review: if involved in electronic discovery
        • Properly store and delete company relevant data based on requirements set by the
          organization or mandating authority.
        • Address all relative data and storage options utilized by the company, pc hard disks,
          servers, mobile devices, tapes, archives, off-site storage
Electronic Discovery
• Electronic discovery (or e-discovery) refers to discovery in civil litigation
  which deals with information in electronic format also referred to as
  Electronically Stored Information (ESI). Electronic information is different
  from paper information because of its intangible form, volume, transience
  and persistence. Also, electronic information is usually accompanied by
  metadata, which is not present in paper documents. However, paper
  documents can be scanned into electronic format and then manually
  coded with metadata. The preservation of metadata from electronic
  documents creates special challenges to prevent spoliation.

• Electronic discovery was the subject of amendments to the Federal Rules
  of Civil Procedure, effective December 1, 2006.[1] shows the changes, the
  complete Rules, where in particular rules 16 and 26 are of interest to
  electronic discovery.

* source http://en.wikipedia.org/wiki/Electronic_discovery
Federal Rules of Civil Procedure
                Related to e-Discovery
Rule 16. Pretrial Conferences; Scheduling; Management
(a) Purposes of a Pretrial Conference.
      (3) discouraging wasteful pretrial activities;
(b) Scheduling
      (3) Contents of the Order.
              (A) Required Contents. The scheduling order must limit the time to join other parties, amend the
                  pleadings, complete discovery, and file motions.
              (B) Permitted Contents. The scheduling order may:
                  (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1);
                  (ii) modify the extent of discovery;
                  (iii) provide for disclosure or discovery of electronically stored information;
(c) Attendance and Matters for Consideration at a Pretrial Conference.
       (2) Matters for Consideration
              (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule
                  26 and Rules 29 through 37;




* Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
Federal Rules of Civil Procedure
             Related to e-Discovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(a)   Required Disclosures
      (1) Initial Disclosures
           (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court,
           a party must, without awaiting a discovery request, provide to the other parties:
                (ii) a copy — or a description by category and location — of all documents, electronically stored information, and
                tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or
                defenses, unless the use would be solely for impeachment;
(b) Discovery Scope and Limits.
       (2) Limitations on Frequency and Extent
           (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of
           electronically stored information from sources that the party identifies as not reasonably accessible
           because of undue burden or cost. On motion to compel discovery or for a protective order, the party from
           whom discovery is sought must show that the information is not reasonably accessible because of undue
           burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if
           the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may
           specify conditions for the discovery.
           (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery
           otherwise allowed by these rules or by local rule if it determines that:
                (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is
                more convenient, less burdensome, or less expensive;
                (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or
                (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case,
                the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the
                importance of the discovery in resolving the issues.
Federal Rules of Civil Procedure
                Related to eDiscovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(b) Discovery Scope and Limits
      (3) Trial Preparation: Materials.
           (A) Documents and Tangible Things.
           (B) Protection Against Disclosure.
           (C) Previous Statement.
        (5) Claiming Privilege or Protecting Trial- Preparation Materials.
             (B)Information Produced.
(c) Protective Orders
      (1) In General
      (2) Ordering Discovery
(d) Timing and Sequence of Discovery
      (1) Timing
      (2) Sequence
(e) Supplementation of Disclosures and Responses.
      (1) In General
      (2) Expert Witness.
(f) Conference of the Parties; Planning for Discovery
      (3) Discovery Plan.



*source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
Electronically Stored Information (ESI)
•        Electronically stored information, for the purpose of the Federal Rules of Civil
         Procedure (FRCP) is information created, manipulated, communicated, stored, and
         best utilized in digital form, requiring the use of computer hardware and software.
         The term has become a legally defined phrase as the U.S. government determined
         for the purposes of the FRCP rules of 2006 that promulgating procedures for
         maintenance and discovery for electronically stored information was necessary. [1]

•        Types of ESI
         (1)Native Files (Office documents ect…)
         (2)Logical Data (RAM)




[1]source:   http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure)
[2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
e-Discovery as Experienced
The process as experienced:
• Requesting attorney/party issues legal hold (usually broad), or requests financial impact
    information for the legal hold they are about to request.
• Responding attorney/party rebuts request as too broad or implements legal hold on electronic
    information to the specified requirements of the request.
• Parties conference and discovery requirements are mandated.
• Responding party performs discovery on the data specified in the time frame required.
• Information/documents produced from the discovery are given to counsel to review for privileged
    information.
• Non-privileged information is given to requesting party in the specified required formats.

Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing
    their discovery requirements.

•   Typically this is a “data hunt” by the complainant counsel to discover what types of data are
    available, any data retention policies that exist, and in what formats the data is in.
•   This may even get into “known” information such as if the IT personnel is aware of any data
    destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has
    assisted any specific employees in question with data deletion.
Legal Hold
•   With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley
    cases, and the Supreme Court analyzing how document retention policies are
    enforced, corporate practices around the retention/ destruction of electronically
    stored information (ESI) have never been more important.
•   The “legal hold” operates at the intersection of litigation and corporate retention
    practices, and it has emerged as an almost-obligatory component of a company's
    response to notice or reasonable anticipation of litigation. The basis of this
    obligation is the common law duty against spoilation; that is, the duty to avoid the
    loss of, destruction of, or failure to preserve information that may be relevant to
    pending or potential proceedings.
•   In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the
    documents in your desk drawers or file cabinets. But modern businesses generate
    massive amounts of digital information, which is created and stored in an ever-
    expanding number of devices and locations, and which can be destroyed without
    any affirmative action. As a result, effective legal hold practices involve significantly
    more than merely issuing an internal letter and sitting back until the official
    discover process begins.

* source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
The Sedona Conference®
     Best Practices Recommendations & Principles for
       Addressing Electronic Document Production
1.   Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state
     equivalents. Organizations must properly preserve electronically stored information that can
     reasonably be anticipated to be relevant to litigation.
2.   When balancing the cost, burden, and need for electronically stored information, courts and
     parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its
     state equivalents, which require consideration of the technological feasibility and realistic costs of
     preserving, retrieving, reviewing, and producing electronically stored information, as well as the
     nature of the litigation and the amount in controversy
3.   Parties should confer early in discovery regarding the preservation and production of
     electronically stored information when these matters are at issue in the litigation and seek to
     agree on the scope of each party’s rights and responsibilities
4.   Discovery requests for electronically stored information should be as clear as possible, while
     responses and objections to discovery should disclose the scope and limits of the production
5.   The obligation to preserve electronically stored information requires reasonable and good faith
     efforts to retain information that may be relevant to pending or threatened litigation. However, it
     is unreasonable to expect parties to take every conceivable step to preserve all potentially
     relevant electronically stored information
6.   Responding parties are best situated to evaluate the procedures, methodologies, and
     technologies appropriate for preserving and producing their own electronically stored
     information
7.   The requesting party has the burden on a motion to compel to show that the responding party’s
     steps to preserve and produce relevant electronically stored information were inadequate
The Sedona Conference®
      Best Practices Recommendations & Principles for
        Addressing Electronic Document Production
8.    The primary source of electronically stored information for production should be active data and information.
      Resort to disaster recovery backup tapes and other sources of electronically stored information that are not
      reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs
      and burdens of retrieving and processing the electronically stored information from such sources, including the
      disruption of business and information management activities
9.    Absent a showing of special need and relevance, a responding party should not be required to preserve, review,
      or produce deleted, shadowed, fragmented, or residual electronically stored information
10.   A responding party should follow reasonable procedures to protect privileges and objections in connection with
      the production of electronically stored information
11.    A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored
      information by using electronic tools and processes, such as data sampling, searching, or the use of selection
      criteria, to identify data reasonably likely to contain relevant information
12.   Absent party agreement or court order specifying the form or forms of production, production should be made
      in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into
      account the need to produce reasonably accessible metadata that will enable the receiving party to have the
      same ability to access, search, and display the information as the producing party where appropriate or
      necessary in light of the nature of the information and the needs of the case
13.   Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing
      electronically stored information should be borne by the responding party, unless the information sought is not
      reasonably available to the responding party in the ordinary course of business. If the information sought is not
      reasonably available to the responding party in the ordinary course of business, then, absent special
      circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to
      the requesting party
14.   Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear
      duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a
      reasonable probability that the loss of the evidence has materially prejudiced the adverse party
Discussion Points
• Legal professionals don’t fully understand information
  technology and the extent of their requests. How does
  this impact IT/IS?
• Using cost-shifting as an effective tool to reducing e-
  Discovery requests.
• Why would my company need a data retention policy?
• Is data governance important to managing litigious
  corporate data?
• Ethical, practical, and efficient data retention
      • Does it exist?
      • Who’s managing it?

Mais conteúdo relacionado

Mais procurados

cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...Sebastiano Battiato
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Daubert and it’s implications
Daubert and it’s implicationsDaubert and it’s implications
Daubert and it’s implicationsMahipreet Kaur
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 

Mais procurados (20)

cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Daubert and it’s implications
Daubert and it’s implicationsDaubert and it’s implications
Daubert and it’s implications
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Email investigation
Email investigationEmail investigation
Email investigation
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Forensic Anthrpology
Forensic AnthrpologyForensic Anthrpology
Forensic Anthrpology
 

Semelhante a E Discovery

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Seth Row
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rulesrlhicksjr
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeBoyarMiller
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer WorkshopJohn Jablonski
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 

Semelhante a E Discovery (20)

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Seventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot ProgramSeventh Circuit Ediscovery Pilot Program
Seventh Circuit Ediscovery Pilot Program
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
E discovery 101
E discovery 101E discovery 101
E discovery 101
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Discovery Practice
 Discovery Practice Discovery Practice
Discovery Practice
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
 
Daniel day
Daniel dayDaniel day
Daniel day
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 

Mais de James Sutter

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214James Sutter
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014James Sutter
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David MannJames Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013James Sutter
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOTJames Sutter
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13James Sutter
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjtJames Sutter
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costsJames Sutter
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentationJames Sutter
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12James Sutter
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012 James Sutter
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12James Sutter
 

Mais de James Sutter (20)

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David Mann
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjt
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costs
 
CIO Branding
CIO BrandingCIO Branding
CIO Branding
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentation
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12
 
CIO Value Issue
CIO Value IssueCIO Value Issue
CIO Value Issue
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

E Discovery

  • 1. e-Discovery Data Retention and Other Useful Discussion Topics
  • 2. Document Retention Policy • Document retention means many things to many people depending on their business. • Sarbanes-Oxley’s (Sarbanes-Oxley's Document Retention Rules and Best Practices) • HIPPA • Can be mandated based on industry by either federal, or state jurisdictions, sometimes both. • Basically if you are not mandated to retain your documents, draft and adhere to your own document retention policy. This will make any electronic discovery process much more efficient. • Adhering to your own document retention policy ensures your ethical practices regarding data deletion if involved in litigation. • An effective data retention policy should: • Reduce “data artifacts” • Reduce the amount of production and review: if involved in electronic discovery • Properly store and delete company relevant data based on requirements set by the organization or mandating authority. • Address all relative data and storage options utilized by the company, pc hard disks, servers, mobile devices, tapes, archives, off-site storage
  • 3. Electronic Discovery • Electronic discovery (or e-discovery) refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). Electronic information is different from paper information because of its intangible form, volume, transience and persistence. Also, electronic information is usually accompanied by metadata, which is not present in paper documents. However, paper documents can be scanned into electronic format and then manually coded with metadata. The preservation of metadata from electronic documents creates special challenges to prevent spoliation. • Electronic discovery was the subject of amendments to the Federal Rules of Civil Procedure, effective December 1, 2006.[1] shows the changes, the complete Rules, where in particular rules 16 and 26 are of interest to electronic discovery. * source http://en.wikipedia.org/wiki/Electronic_discovery
  • 4. Federal Rules of Civil Procedure Related to e-Discovery Rule 16. Pretrial Conferences; Scheduling; Management (a) Purposes of a Pretrial Conference. (3) discouraging wasteful pretrial activities; (b) Scheduling (3) Contents of the Order. (A) Required Contents. The scheduling order must limit the time to join other parties, amend the pleadings, complete discovery, and file motions. (B) Permitted Contents. The scheduling order may: (i) modify the timing of disclosures under Rules 26(a) and 26(e)(1); (ii) modify the extent of discovery; (iii) provide for disclosure or discovery of electronically stored information; (c) Attendance and Matters for Consideration at a Pretrial Conference. (2) Matters for Consideration (F) controlling and scheduling discovery, including orders affecting disclosures and discovery under Rule 26 and Rules 29 through 37; * Source : http://www2.law.cornell.edu/rules/frcp/Rule16.htm
  • 5. Federal Rules of Civil Procedure Related to e-Discovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (a) Required Disclosures (1) Initial Disclosures (A)In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise stipulated or ordered by the court, a party must, without awaiting a discovery request, provide to the other parties: (ii) a copy — or a description by category and location — of all documents, electronically stored information, and tangible things that the disclosing party has in its possession, custody, or control and may use to support its claims or defenses, unless the use would be solely for impeachment; (b) Discovery Scope and Limits. (2) Limitations on Frequency and Extent (B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for the discovery. (C) When Required. On motion or on its own, the court must limit the frequency or extent of discovery otherwise allowed by these rules or by local rule if it determines that: (i) the discovery sought is unreasonably cumulative or duplicative, or can be obtained from some other source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity to obtain the information by discovery in the action; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties' resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.
  • 6. Federal Rules of Civil Procedure Related to eDiscovery Rule 26. Duty to Disclose; General Provisions Governing Discovery (b) Discovery Scope and Limits (3) Trial Preparation: Materials. (A) Documents and Tangible Things. (B) Protection Against Disclosure. (C) Previous Statement. (5) Claiming Privilege or Protecting Trial- Preparation Materials. (B)Information Produced. (c) Protective Orders (1) In General (2) Ordering Discovery (d) Timing and Sequence of Discovery (1) Timing (2) Sequence (e) Supplementation of Disclosures and Responses. (1) In General (2) Expert Witness. (f) Conference of the Parties; Planning for Discovery (3) Discovery Plan. *source: http://www2.law.cornell.edu/rules/frcp/Rule26.htm
  • 7. Electronically Stored Information (ESI) • Electronically stored information, for the purpose of the Federal Rules of Civil Procedure (FRCP) is information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software. The term has become a legally defined phrase as the U.S. government determined for the purposes of the FRCP rules of 2006 that promulgating procedures for maintenance and discovery for electronically stored information was necessary. [1] • Types of ESI (1)Native Files (Office documents ect…) (2)Logical Data (RAM) [1]source: http://en.wikipedia.org/wiki/Electronically_stored_information_(Federal_Rules_of_Civil_Procedure) [2] Electronically Stored Information: The December 2006 Amendments to the Federal Rules of Civil Procedure http://www.law.northwestern.edu/journals/njtip/v4/n2/3/
  • 8. e-Discovery as Experienced The process as experienced: • Requesting attorney/party issues legal hold (usually broad), or requests financial impact information for the legal hold they are about to request. • Responding attorney/party rebuts request as too broad or implements legal hold on electronic information to the specified requirements of the request. • Parties conference and discovery requirements are mandated. • Responding party performs discovery on the data specified in the time frame required. • Information/documents produced from the discovery are given to counsel to review for privileged information. • Non-privileged information is given to requesting party in the specified required formats. Note: IT Department staff may be depositioned by requesting party counsel to assist them in developing their discovery requirements. • Typically this is a “data hunt” by the complainant counsel to discover what types of data are available, any data retention policies that exist, and in what formats the data is in. • This may even get into “known” information such as if the IT personnel is aware of any data destruction that has occurred since a legal hold has been requested. Or, if the IT personnel has assisted any specific employees in question with data deletion.
  • 9. Legal Hold • With changes to the Federal Rules, the landmark Zubulake and Morgan Stanley cases, and the Supreme Court analyzing how document retention policies are enforced, corporate practices around the retention/ destruction of electronically stored information (ESI) have never been more important. • The “legal hold” operates at the intersection of litigation and corporate retention practices, and it has emerged as an almost-obligatory component of a company's response to notice or reasonable anticipation of litigation. The basis of this obligation is the common law duty against spoilation; that is, the duty to avoid the loss of, destruction of, or failure to preserve information that may be relevant to pending or potential proceedings. • In a pre-digital age, this duty was fairly straightforward: Don’t burn or shred the documents in your desk drawers or file cabinets. But modern businesses generate massive amounts of digital information, which is created and stored in an ever- expanding number of devices and locations, and which can be destroyed without any affirmative action. As a result, effective legal hold practices involve significantly more than merely issuing an internal letter and sitting back until the official discover process begins. * source : http://www.lexisnexis.com/applieddiscovery/lawlibrary/whitePapers/ADI_WP_LegalHolds.pdf
  • 10. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 1. Electronically stored information is potentially discoverable under Fed. R. Civ. P. 34 or its state equivalents. Organizations must properly preserve electronically stored information that can reasonably be anticipated to be relevant to litigation. 2. When balancing the cost, burden, and need for electronically stored information, courts and parties should apply the proportionality standard embodied in Fed. R. Civ. P. 26(b)(2)(C) and its state equivalents, which require consideration of the technological feasibility and realistic costs of preserving, retrieving, reviewing, and producing electronically stored information, as well as the nature of the litigation and the amount in controversy 3. Parties should confer early in discovery regarding the preservation and production of electronically stored information when these matters are at issue in the litigation and seek to agree on the scope of each party’s rights and responsibilities 4. Discovery requests for electronically stored information should be as clear as possible, while responses and objections to discovery should disclose the scope and limits of the production 5. The obligation to preserve electronically stored information requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation. However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant electronically stored information 6. Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information 7. The requesting party has the burden on a motion to compel to show that the responding party’s steps to preserve and produce relevant electronically stored information were inadequate
  • 11. The Sedona Conference® Best Practices Recommendations & Principles for Addressing Electronic Document Production 8. The primary source of electronically stored information for production should be active data and information. Resort to disaster recovery backup tapes and other sources of electronically stored information that are not reasonably accessible requires the requesting party to demonstrate need and relevance that outweigh the costs and burdens of retrieving and processing the electronically stored information from such sources, including the disruption of business and information management activities 9. Absent a showing of special need and relevance, a responding party should not be required to preserve, review, or produce deleted, shadowed, fragmented, or residual electronically stored information 10. A responding party should follow reasonable procedures to protect privileges and objections in connection with the production of electronically stored information 11. A responding party may satisfy its good faith obligation to preserve and produce relevant electronically stored information by using electronic tools and processes, such as data sampling, searching, or the use of selection criteria, to identify data reasonably likely to contain relevant information 12. Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and the needs of the case 13. Absent a specific objection, party agreement or court order, the reasonable costs of retrieving and reviewing electronically stored information should be borne by the responding party, unless the information sought is not reasonably available to the responding party in the ordinary course of business. If the information sought is not reasonably available to the responding party in the ordinary course of business, then, absent special circumstances, the costs of retrieving and reviewing such electronic information may be shared by or shifted to the requesting party 14. Sanctions, including spoliation findings, should be considered by the court only if it finds that there was a clear duty to preserve, a culpable failure to preserve and produce relevant electronically stored information, and a reasonable probability that the loss of the evidence has materially prejudiced the adverse party
  • 12. Discussion Points • Legal professionals don’t fully understand information technology and the extent of their requests. How does this impact IT/IS? • Using cost-shifting as an effective tool to reducing e- Discovery requests. • Why would my company need a data retention policy? • Is data governance important to managing litigious corporate data? • Ethical, practical, and efficient data retention • Does it exist? • Who’s managing it?