SlideShare uma empresa Scribd logo
1 de 34
Laws Governing E-Data  and Seizure Presented by Ronald L. Hicks, Jr.
Discussion Topics 1. Zubulake v. USB Warburg, LLC   2. US v. Arthur Andersen 3. Sarbanes-Oxley Act   4. HIPAA   5. ECPA   6. Amended FRCP
General Information “ The Electronic Evidence and Discovery Handbook:  Forms, Checklists and Guidelines” published by the ABA LPM Sect. (http://www.abanet.org/abastore) LexisNexis ®  Applied Discovery ® (http://www.lexisnexis.com/applieddiscovery/)
Discussion Topics 1. Zubulake Decisions   No U.S. or Third Circuit decision exists re: preservation of electronic evidence or sanctions for failure. Zubulake  decisions are recognized as setting the benchmark standards. Zubulake  decisions have not been adopted by any PA federal or state court.
Zubulake Decisions Spoliation is “the destruction or significant alteration of evidence, or the failure to preserve property for another’s use as evidence in pending or reasonably foreseeable litigation.” Sanction determined on a “case-by-case” basis Authority to sanction arises under the FRCP and inherent powers.
Zubulake Decisions Duty to preserve arises when a party has notice or should have known that evidence may be relevant to litigation. Sanctions exist only if a party has a duty to preserve the destroyed evidence.
Zubulake Decisions Duty to preserve commonly arises when a demand letter or complaint is served. Duty to preserve may arise earlier if a party has sufficient notice or information re: a credible threat of future litigation.  Duty to preserve requires more than a mere possibility of litigation. Existence of duty to preserve determined by the facts of each case.
Zubulake Decisions Duty to preserve extends only to “key players” in the litigation. Not every piece of evidence must be preserved; only that which is relevant.
Zubulake Decisions Zubulake  holds that once litigation is reasonably anticipated, a party must suspend routine document destruction and put in place a “litigation hold” to ensure the preservation of relevant evidence.  Inaccessible back-up tapes do not need to be subject to the “litigation hold.” Accessible back-up tapes should be placed in the “litigation hold.”
Zubulake Decisions Zubulake  creates a duty upon both the party and its counsel to ensure that all sources of potentially relevant information are identified and placed “on hold.” Zubulake  creates a duty upon counsel to oversee and monitor a party’s compliance with “litigation hold.” Proper communication is the key.
Zubulake Decisions Zubulake  establishes guidelines that counsel should follow to avoid sanctions for electronic evidence spoliation.  The  Zubulake  guidelines are not meant to be onerous. Zubulake  holds that counsel’s actions in avoiding evidence spoliation are judged by a reasonableness standard.
Zubulake Decisions Use the form documents cautiously; avoid creating duties that you may not have as counsel under PA law. Forms documents should be tailored to your particular case.
Discussion Topics The act that led to Arthur Andersen’s conviction was not fraudulent accounting practices, but document destruction.  On appeal, the US Supreme Court addressed whether the jury’s conviction was in error under 18 USC  § 1512 which dealt with “corruptly persuades” the withholding or altering of documents. 2. US v. Arthur Andersen
US v. Arthur Andersen Compliance with a valid document retention policy is not a criminal act or violation of 18 USC  §1512 .  Document retention policies are common and are intended to keep information for others, including the government.
US v. Arthur Andersen 18 USC  §1512 requires “knowingly ... corruptly persuading” another to destroy documents to impede an “official proceeding.”  Merely complying with a document retention policy does not give rise to a violation of 18 USC  § 1512 which dealt with “corruptly persuades” the withholding or altering of documents.
Discussion Topics Created an independent Public Accounting Oversight Board to oversee conduct of auditors and accountants. One of its most important effects is its impact on document and data retention. 3. Sarbanes-Oxley Act
Sarbanes-Oxley Act US v. Trauger,  No. 3-03-30371 (N.D.Cal. Sept. 24, 2003)   Failure to comply may result in fines up to $25 Million and 20 years imprisonment.
Discussion Topics Goal of HIPAA is to improve privacy and security of patients’ medical information.  HIPAA Security Final Rule emphasizes security management principles and broad management controls to protect patient health information. 4. HIPAA HIPAA Privacy Rule addresses the use and disclosure of patient health information.
HIPAA Penalties not as severe as Sarbanes-Oxley Act, but include civil penalties of $100/violation.  No notice required to be given to government if privacy or security breach discovered.
Discussion Topics ECPA consists of three parts:  The Wiretap Act, the Pen Register Act and the Stored Wired and Electronic Communications Act.  Under the Wire Tap Act, liability requires proof of specific intent, presence of a “wire, oral or electronic communication” and an “interception.” 5. ECPA
ECPA Fraser v. Nationwide Mut. Ins. , 352 F.3d 107 (3d Cir. 2003) &  US v. Councilman , 418 F.3d 67 (1 st  Cir. 2005)(en banc)  Cookies or other web server data do not constitute an “interception.”
ECPA Pen Register Act initially intended to address telephone communications.   Pen registers record all numbers dialed from a particular telephone line (outgoing calls), whereas trap and trace devices record what numbers called a particular telephone (incoming calls). US v. Forrester , 2007 U.S. App. LEXIS 16147 (9 th  Cir. 2007)
ECPA Snow v. DirecTV, Inc. , 450 F.3d 1314 (11 th  Cir. 2006)  Stored Communications Act addresses the privacy of electronic communications while “in storage”
Discussion Topics Rationale behind “meet and confer” requirement is early discussion and counsel involvement helps to avoid evidence spoliation.  F.R.C.P. 26(f)(3) & 16(b)(5) set forth the “meet and confer” requirement. 6. FRCP
FRCP – “Meet and Confer” The “meet and confer” conference requires you to think about what the relevant sources of evidence will be in your case.  Every case has different issues that should be addressed at the “meet and confer” conference.
FRCP – Discovery Requests Three most common methods are interrogatories, document requests and depositions. Using more than one of these three methods is common when performing e-discovery.
FRCP - Discovery Strategies Interrogatories should be used to identify systems, information and people with knowledge Absent agreement or court order, F.R.C.P. 33(a) limits the  # of interrogatories to 25, including subparts.
FRCP - Discovery Strategies Unlike interrogatories, document requests are not subject to an express numerical limitation; they are subject to Rule 26 admonition re: abusive discovery. Document requests directed to a party can be done independently or as part of a deposition notice. Document requests can be directed to non-parties by way of a subpoena.
FRCP - Discovery Strategies Consult with an e-discovery vendor or computer forensics expert. Electronically stored data should be produced in its native format with metadata.
FRCP - Discovery Strategies Depositions ordinarily are used to verify that you have gathered all the relevant evidence through interrogatories and document requests.  Depositions also enable a party to prepare any necessary e-discovery-related motions, including motions in limine and sanctions  for spoliation of evidence. Using an e-discovery expert may be prudent.
FRCP - Protocols To prepare a well-structured e-discovery protocol, you must understand in advance what the quantity and variety of data that your client has so that you can talk to the correct “key players.”  Understanding what your client’s business operations are will enable you to advocate for an e-discovery protocol that is not overly burdensome.
Structuring Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions & Answers
Laws Governing E-Data  and Seizure Presented by Ronald L. Hicks, Jr.

Mais conteúdo relacionado

Mais procurados

Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrmcinderella1961
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Richard Austin
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Seth Row
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer WorkshopJohn Jablonski
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
 
Preventing Inadvertent Disclosure Chicago Lawyer Article
Preventing Inadvertent Disclosure  Chicago Lawyer ArticlePreventing Inadvertent Disclosure  Chicago Lawyer Article
Preventing Inadvertent Disclosure Chicago Lawyer ArticleKellyKubacki
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
Informal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective LitigationInformal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective LitigationAmy Morgan
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law UpdateLogikcull.com
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Casesandresmedrano249
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Casesannskowronski
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 

Mais procurados (20)

Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrm
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Patent Suit Drop Has Lawyers Mulling Future | Daily Journal
Patent Suit Drop Has Lawyers Mulling Future | Daily JournalPatent Suit Drop Has Lawyers Mulling Future | Daily Journal
Patent Suit Drop Has Lawyers Mulling Future | Daily Journal
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015
 
Forensic data investigations in China
Forensic data investigations in ChinaForensic data investigations in China
Forensic data investigations in China
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
 
Meet and Confer Workshop
Meet and Confer WorkshopMeet and Confer Workshop
Meet and Confer Workshop
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
This Year's Top Ten IP Cases
This Year's Top Ten IP CasesThis Year's Top Ten IP Cases
This Year's Top Ten IP Cases
 
2015 Intellectual Property (IP) Year in Review
2015 Intellectual Property (IP) Year in Review2015 Intellectual Property (IP) Year in Review
2015 Intellectual Property (IP) Year in Review
 
Preventing Inadvertent Disclosure Chicago Lawyer Article
Preventing Inadvertent Disclosure  Chicago Lawyer ArticlePreventing Inadvertent Disclosure  Chicago Lawyer Article
Preventing Inadvertent Disclosure Chicago Lawyer Article
 
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Discovery Practice (Series: Newbie Litigator School - Fall Edition)
Discovery Practice (Series: Newbie Litigator School - Fall Edition)
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Informal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective LitigationInformal Discovery - Simple Strategies for Cost-Effective Litigation
Informal Discovery - Simple Strategies for Cost-Effective Litigation
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Cases
 
Litigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law CasesLitigation Tips for Complex Administrative Law Cases
Litigation Tips for Complex Administrative Law Cases
 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 

Destaque

Restrictive Covenants in Employment Agreements: Do They Really Work?
Restrictive Covenants in Employment Agreements: Do They Really Work?Restrictive Covenants in Employment Agreements: Do They Really Work?
Restrictive Covenants in Employment Agreements: Do They Really Work?rlhicksjr
 
Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2Melissa Morris
 
Designing A Compliant Record Retention Policy
Designing A Compliant Record Retention PolicyDesigning A Compliant Record Retention Policy
Designing A Compliant Record Retention Policyrlhicksjr
 
Subpoena Response Protocols
Subpoena Response ProtocolsSubpoena Response Protocols
Subpoena Response Protocolsrlhicksjr
 
Bad Faith Insurance Coverage
Bad Faith Insurance CoverageBad Faith Insurance Coverage
Bad Faith Insurance Coveragerlhicksjr
 
Lettre ouverte au Président Sarkozy
Lettre ouverte au Président SarkozyLettre ouverte au Président Sarkozy
Lettre ouverte au Président SarkozyPaul Quilès
 

Destaque (6)

Restrictive Covenants in Employment Agreements: Do They Really Work?
Restrictive Covenants in Employment Agreements: Do They Really Work?Restrictive Covenants in Employment Agreements: Do They Really Work?
Restrictive Covenants in Employment Agreements: Do They Really Work?
 
Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2
 
Designing A Compliant Record Retention Policy
Designing A Compliant Record Retention PolicyDesigning A Compliant Record Retention Policy
Designing A Compliant Record Retention Policy
 
Subpoena Response Protocols
Subpoena Response ProtocolsSubpoena Response Protocols
Subpoena Response Protocols
 
Bad Faith Insurance Coverage
Bad Faith Insurance CoverageBad Faith Insurance Coverage
Bad Faith Insurance Coverage
 
Lettre ouverte au Président Sarkozy
Lettre ouverte au Président SarkozyLettre ouverte au Président Sarkozy
Lettre ouverte au Président Sarkozy
 

Semelhante a Laws Governing E Data And Seizure

E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Waiver of Privilege for Documents Inadvertently Disclosed During Discovery
Waiver of Privilege for Documents Inadvertently Disclosed During DiscoveryWaiver of Privilege for Documents Inadvertently Disclosed During Discovery
Waiver of Privilege for Documents Inadvertently Disclosed During DiscoveryAndrew N. Plasz
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored InformationSethRandle
 
Responding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsResponding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsNexsen Pruet
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Electric Insurance RM and ESI
Electric Insurance   RM and ESIElectric Insurance   RM and ESI
Electric Insurance RM and ESIJohn Jablonski
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryKirby Drake
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNsJohn Trigg
 
Cross-Border E-discovery: Navigating Rules and Regulations Across Multiple J...
Cross-Border E-discovery: Navigating Rules and Regulations  Across Multiple J...Cross-Border E-discovery: Navigating Rules and Regulations  Across Multiple J...
Cross-Border E-discovery: Navigating Rules and Regulations Across Multiple J...rashbaum
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008John Jablonski
 
Professionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic DiscoveryProfessionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic DiscoveryParsons Behle & Latimer
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border DisputesJ. David Morris
 

Semelhante a Laws Governing E Data And Seizure (20)

E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Daniel day
Daniel dayDaniel day
Daniel day
 
Waiver of Privilege for Documents Inadvertently Disclosed During Discovery
Waiver of Privilege for Documents Inadvertently Disclosed During DiscoveryWaiver of Privilege for Documents Inadvertently Disclosed During Discovery
Waiver of Privilege for Documents Inadvertently Disclosed During Discovery
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Managing Electronically Stored Information
Managing Electronically Stored InformationManaging Electronically Stored Information
Managing Electronically Stored Information
 
Responding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsResponding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search Warrants
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Electric Insurance RM and ESI
Electric Insurance   RM and ESIElectric Insurance   RM and ESI
Electric Insurance RM and ESI
 
Michael Legg
Michael LeggMichael Legg
Michael Legg
 
EDI 2009- Government Investigations
EDI 2009- Government InvestigationsEDI 2009- Government Investigations
EDI 2009- Government Investigations
 
E Discovery
E DiscoveryE Discovery
E Discovery
 
PASCCO - Principles of E-Discovery
PASCCO - Principles of E-DiscoveryPASCCO - Principles of E-Discovery
PASCCO - Principles of E-Discovery
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNs
 
Cross-Border E-discovery: Navigating Rules and Regulations Across Multiple J...
Cross-Border E-discovery: Navigating Rules and Regulations  Across Multiple J...Cross-Border E-discovery: Navigating Rules and Regulations  Across Multiple J...
Cross-Border E-discovery: Navigating Rules and Regulations Across Multiple J...
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
Legal Hold Workshop - ARMA International - Las Vegas - Oct 23, 2008
 
Professionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic DiscoveryProfessionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic Discovery
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border Disputes
 

Laws Governing E Data And Seizure

  • 1. Laws Governing E-Data and Seizure Presented by Ronald L. Hicks, Jr.
  • 2. Discussion Topics 1. Zubulake v. USB Warburg, LLC 2. US v. Arthur Andersen 3. Sarbanes-Oxley Act 4. HIPAA 5. ECPA 6. Amended FRCP
  • 3. General Information “ The Electronic Evidence and Discovery Handbook: Forms, Checklists and Guidelines” published by the ABA LPM Sect. (http://www.abanet.org/abastore) LexisNexis ® Applied Discovery ® (http://www.lexisnexis.com/applieddiscovery/)
  • 4. Discussion Topics 1. Zubulake Decisions No U.S. or Third Circuit decision exists re: preservation of electronic evidence or sanctions for failure. Zubulake decisions are recognized as setting the benchmark standards. Zubulake decisions have not been adopted by any PA federal or state court.
  • 5. Zubulake Decisions Spoliation is “the destruction or significant alteration of evidence, or the failure to preserve property for another’s use as evidence in pending or reasonably foreseeable litigation.” Sanction determined on a “case-by-case” basis Authority to sanction arises under the FRCP and inherent powers.
  • 6. Zubulake Decisions Duty to preserve arises when a party has notice or should have known that evidence may be relevant to litigation. Sanctions exist only if a party has a duty to preserve the destroyed evidence.
  • 7. Zubulake Decisions Duty to preserve commonly arises when a demand letter or complaint is served. Duty to preserve may arise earlier if a party has sufficient notice or information re: a credible threat of future litigation. Duty to preserve requires more than a mere possibility of litigation. Existence of duty to preserve determined by the facts of each case.
  • 8. Zubulake Decisions Duty to preserve extends only to “key players” in the litigation. Not every piece of evidence must be preserved; only that which is relevant.
  • 9. Zubulake Decisions Zubulake holds that once litigation is reasonably anticipated, a party must suspend routine document destruction and put in place a “litigation hold” to ensure the preservation of relevant evidence. Inaccessible back-up tapes do not need to be subject to the “litigation hold.” Accessible back-up tapes should be placed in the “litigation hold.”
  • 10. Zubulake Decisions Zubulake creates a duty upon both the party and its counsel to ensure that all sources of potentially relevant information are identified and placed “on hold.” Zubulake creates a duty upon counsel to oversee and monitor a party’s compliance with “litigation hold.” Proper communication is the key.
  • 11. Zubulake Decisions Zubulake establishes guidelines that counsel should follow to avoid sanctions for electronic evidence spoliation. The Zubulake guidelines are not meant to be onerous. Zubulake holds that counsel’s actions in avoiding evidence spoliation are judged by a reasonableness standard.
  • 12. Zubulake Decisions Use the form documents cautiously; avoid creating duties that you may not have as counsel under PA law. Forms documents should be tailored to your particular case.
  • 13. Discussion Topics The act that led to Arthur Andersen’s conviction was not fraudulent accounting practices, but document destruction. On appeal, the US Supreme Court addressed whether the jury’s conviction was in error under 18 USC § 1512 which dealt with “corruptly persuades” the withholding or altering of documents. 2. US v. Arthur Andersen
  • 14. US v. Arthur Andersen Compliance with a valid document retention policy is not a criminal act or violation of 18 USC §1512 . Document retention policies are common and are intended to keep information for others, including the government.
  • 15. US v. Arthur Andersen 18 USC §1512 requires “knowingly ... corruptly persuading” another to destroy documents to impede an “official proceeding.” Merely complying with a document retention policy does not give rise to a violation of 18 USC § 1512 which dealt with “corruptly persuades” the withholding or altering of documents.
  • 16. Discussion Topics Created an independent Public Accounting Oversight Board to oversee conduct of auditors and accountants. One of its most important effects is its impact on document and data retention. 3. Sarbanes-Oxley Act
  • 17. Sarbanes-Oxley Act US v. Trauger, No. 3-03-30371 (N.D.Cal. Sept. 24, 2003) Failure to comply may result in fines up to $25 Million and 20 years imprisonment.
  • 18. Discussion Topics Goal of HIPAA is to improve privacy and security of patients’ medical information. HIPAA Security Final Rule emphasizes security management principles and broad management controls to protect patient health information. 4. HIPAA HIPAA Privacy Rule addresses the use and disclosure of patient health information.
  • 19. HIPAA Penalties not as severe as Sarbanes-Oxley Act, but include civil penalties of $100/violation. No notice required to be given to government if privacy or security breach discovered.
  • 20. Discussion Topics ECPA consists of three parts: The Wiretap Act, the Pen Register Act and the Stored Wired and Electronic Communications Act. Under the Wire Tap Act, liability requires proof of specific intent, presence of a “wire, oral or electronic communication” and an “interception.” 5. ECPA
  • 21. ECPA Fraser v. Nationwide Mut. Ins. , 352 F.3d 107 (3d Cir. 2003) & US v. Councilman , 418 F.3d 67 (1 st Cir. 2005)(en banc) Cookies or other web server data do not constitute an “interception.”
  • 22. ECPA Pen Register Act initially intended to address telephone communications. Pen registers record all numbers dialed from a particular telephone line (outgoing calls), whereas trap and trace devices record what numbers called a particular telephone (incoming calls). US v. Forrester , 2007 U.S. App. LEXIS 16147 (9 th Cir. 2007)
  • 23. ECPA Snow v. DirecTV, Inc. , 450 F.3d 1314 (11 th Cir. 2006) Stored Communications Act addresses the privacy of electronic communications while “in storage”
  • 24. Discussion Topics Rationale behind “meet and confer” requirement is early discussion and counsel involvement helps to avoid evidence spoliation. F.R.C.P. 26(f)(3) & 16(b)(5) set forth the “meet and confer” requirement. 6. FRCP
  • 25. FRCP – “Meet and Confer” The “meet and confer” conference requires you to think about what the relevant sources of evidence will be in your case. Every case has different issues that should be addressed at the “meet and confer” conference.
  • 26. FRCP – Discovery Requests Three most common methods are interrogatories, document requests and depositions. Using more than one of these three methods is common when performing e-discovery.
  • 27. FRCP - Discovery Strategies Interrogatories should be used to identify systems, information and people with knowledge Absent agreement or court order, F.R.C.P. 33(a) limits the # of interrogatories to 25, including subparts.
  • 28. FRCP - Discovery Strategies Unlike interrogatories, document requests are not subject to an express numerical limitation; they are subject to Rule 26 admonition re: abusive discovery. Document requests directed to a party can be done independently or as part of a deposition notice. Document requests can be directed to non-parties by way of a subpoena.
  • 29. FRCP - Discovery Strategies Consult with an e-discovery vendor or computer forensics expert. Electronically stored data should be produced in its native format with metadata.
  • 30. FRCP - Discovery Strategies Depositions ordinarily are used to verify that you have gathered all the relevant evidence through interrogatories and document requests. Depositions also enable a party to prepare any necessary e-discovery-related motions, including motions in limine and sanctions for spoliation of evidence. Using an e-discovery expert may be prudent.
  • 31. FRCP - Protocols To prepare a well-structured e-discovery protocol, you must understand in advance what the quantity and variety of data that your client has so that you can talk to the correct “key players.” Understanding what your client’s business operations are will enable you to advocate for an e-discovery protocol that is not overly burdensome.
  • 32.
  • 34. Laws Governing E-Data and Seizure Presented by Ronald L. Hicks, Jr.