29.10.2014 Views

Six Articles on Electronic - Craig Ball

Six Articles on Electronic - Craig Ball

Six Articles on Electronic - Craig Ball

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Craig</strong> <strong>Ball</strong> © 2007<br />

• E-mail in forensically accessible areas of local hard drives<br />

Deleted e-mail<br />

Internet cache<br />

Unallocated clusters<br />

The issues in the case, key players, relevant times, agreements between the parties and orders<br />

of the court determine the extent to which locati<strong>on</strong>s must be examined; however, the failure to<br />

identify all relevant e-mail carries such peril that cauti<strong>on</strong> should be the watchword. Isn’t it wiser<br />

to invest more to know exactly what the client has than c<strong>on</strong>cede at the sancti<strong>on</strong>s hearing the<br />

client failed to preserve and produce evidence it didn’t know it had because no <strong>on</strong>e bothered to<br />

look for it?<br />

What’s more, thorough identificati<strong>on</strong> of both accessible and inaccessible electr<strong>on</strong>ically stored<br />

informati<strong>on</strong> isn’t just sound practice; it’s a tenet of federal procedure. Effective December 1,<br />

2006, the Federal Rules of Civil Procedure require a party to provide, without a discovery<br />

request, “a copy of, or a descripti<strong>on</strong> by category and locati<strong>on</strong> of, all documents, electr<strong>on</strong>ically<br />

stored informati<strong>on</strong>, and tangible things that are in the possessi<strong>on</strong>, custody, or c<strong>on</strong>trol of the<br />

party and that the disclosing party may use to support its claims or defenses, unless solely for<br />

impeachment.” FRCP Amended Rule 26(a)(1)(B) [emphasis added]. Amended Rule<br />

26(b)(2)(B) requires a party to identify electr<strong>on</strong>ically stored informati<strong>on</strong> [ESI] it deems “not<br />

reas<strong>on</strong>ably accessible because of undue burden or cost.” The commentary to the new Rules<br />

makes clear that the duty to identify attaches to every item of potentially resp<strong>on</strong>sive ESI:<br />

“The resp<strong>on</strong>ding party must also identify, by category or type, the sources<br />

c<strong>on</strong>taining potentially resp<strong>on</strong>sive informati<strong>on</strong> that it is neither searching nor<br />

producing. The identificati<strong>on</strong> should, to the extent possible, provide enough detail<br />

to enable the requesting party to evaluate the burdens and costs of providing the<br />

discovery and the likelihood of finding resp<strong>on</strong>sive informati<strong>on</strong> <strong>on</strong> the identified<br />

sources.”<br />

FRCP, Comments to Amended Rule 26, subdivisi<strong>on</strong> (b)(2).<br />

Preservati<strong>on</strong><br />

The duty to preserve potentially relevant evidence is generally triggered by the anticipati<strong>on</strong> of a<br />

claim. Fulfilling a preservati<strong>on</strong> duty with respect to e-mail is made harder by the c<strong>on</strong>trol reposed<br />

in individual users, who establish quirky folder structures, commingle pers<strong>on</strong>al and business<br />

communicati<strong>on</strong>s and—most dangerous of all—c<strong>on</strong>trol deleti<strong>on</strong> and retenti<strong>on</strong> of their messages.<br />

Individual users who may hold resp<strong>on</strong>sive ESI must be directed to retain all potentially relevant<br />

messages and be furnished sufficient informati<strong>on</strong> at appropriate intervals to assess relevance<br />

c<strong>on</strong>sistently. You’ve got to guard against human frailty in your preservati<strong>on</strong> strategy, so d<strong>on</strong>’t<br />

leave the fox guarding the henhouse. Act promptly to protect data from spoliati<strong>on</strong> at the hands<br />

of users most inclined to sweep it under the rug.<br />

C<strong>on</strong>sider the following as parts of an effective e-mail preservati<strong>on</strong> effort:<br />

• Litigati<strong>on</strong> hold notices to users, including clear, practical and specific retenti<strong>on</strong><br />

directives<br />

Notices should remind users of relevant places where their email may reside<br />

Be sure to provide for notificati<strong>on</strong> to new hires and collecti<strong>on</strong> from departing<br />

employees<br />

• Suspensi<strong>on</strong> of “retenti<strong>on</strong>” policies that call for purging email<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!