29.10.2014 Views

Six Articles on Electronic - Craig Ball

Six Articles on Electronic - Craig Ball

Six Articles on Electronic - Craig Ball

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Craig</strong> <strong>Ball</strong> © 2007<br />

native applicati<strong>on</strong>. Once again, decide if metadata is important and require its preservati<strong>on</strong><br />

when appropriate.<br />

PowerPoint Presentati<strong>on</strong>s:<br />

You can produce a simple PowerPoint presentati<strong>on</strong> as an electr<strong>on</strong>ically searchable image file in<br />

PDF or TIFF, but if the presentati<strong>on</strong> is animated, it’s a poor candidate for producti<strong>on</strong> as an<br />

image because animated objects may be invisible or displayed as incomprehensible layers.<br />

Instead, native or hosted producti<strong>on</strong> is appropriate. Like spreadsheets, native producti<strong>on</strong><br />

necessitates preservati<strong>on</strong> of original metadata, which may change by viewing the presentati<strong>on</strong>.<br />

Voice Mail<br />

Often overlooked in e-discovery, voice mail messages and taped c<strong>on</strong>versati<strong>on</strong>s (such as<br />

recorded broker-client transacti<strong>on</strong>s) may be vitally important evidence. As voice mail c<strong>on</strong>verges<br />

with e-mail in so-called integrated messaging systems, it’s increasingly comm<strong>on</strong> to see voice<br />

mail messages in e-mail boxes. Seek producti<strong>on</strong> of voice mail in comm<strong>on</strong> sound formats such<br />

as .WAV or .MP3, and be certain to obtain voice mail metadata correlated with the audio<br />

because informati<strong>on</strong> about, e.g., the intended recipient of the voice message or time of its<br />

receipt, is typically not a part of the voice message.<br />

Instant Messaging<br />

Instant messaging or IM is similar to e-mail except that exchanges are in real-time and<br />

messages generally aren’t stored unless the user activates logging or the network captures<br />

traffic. IM use in business is growing explosively despite corporate policies discouraging it.<br />

Some companies take the head-in-the-sand posture that n<strong>on</strong>e of their employees use IM and,<br />

pretending IM doesn’t exist, take no steps to preserve IM transacti<strong>on</strong>s. But in certain regulated<br />

envir<strong>on</strong>ments, notably securities brokerage, the law requires preservati<strong>on</strong> of IM traffic. Still,<br />

requests for discovery of IM exchanges are comm<strong>on</strong>ly met with the resp<strong>on</strong>se, “We d<strong>on</strong>’t have<br />

any.” Because individual users c<strong>on</strong>trol whether or note to log IM exchanges, a resp<strong>on</strong>ding party<br />

can’t make global asserti<strong>on</strong>s about the existence of IM threads without examining each user’s<br />

local machine. Although IM applicati<strong>on</strong>s use proprietary formats and protocols, most IM traffic<br />

easily c<strong>on</strong>verts to plain text and can be produced as an ASCII- or word processor-compatible<br />

files.<br />

Databases<br />

Enterprises increasingly rely <strong>on</strong> databases to manage business processes. Resp<strong>on</strong>sive<br />

evidence may exist <strong>on</strong>ly as answers obtained by querying a database. Databases present<br />

enormous e-discovery challenges. Specify producti<strong>on</strong> of the underlying dataset and applicati<strong>on</strong><br />

and you’ll likely face objecti<strong>on</strong>s that the request for producti<strong>on</strong> is overbroad or intrudes into trade<br />

secrets or the privacy rights of third parties. Producing parties may refuse to furnish copies of<br />

database applicati<strong>on</strong>s arguing that doing so violates user licenses. But getting your own license<br />

for applicati<strong>on</strong>s like Oracle or SAP and assembling the hardware needed to run them can be<br />

prohibitive.<br />

If you seek the dataset, specify in your request for producti<strong>on</strong> the appropriate back up procedure<br />

for the database applicati<strong>on</strong> geared to capture all of the data libraries, templates and<br />

c<strong>on</strong>figurati<strong>on</strong> files required to load and run the database. If you simply request the data without<br />

securing a backup of the entire database envir<strong>on</strong>ment, you may find yourself missing an<br />

essential comp<strong>on</strong>ent. By demanding that data be backed up according to the publisher’s<br />

recommended methodology, you’ll have an easier time restoring that data, but be sure the<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!