Six Articles on Electronic - Craig Ball
Six Articles on Electronic - Craig Ball
Six Articles on Electronic - Craig Ball
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Craig</strong> <strong>Ball</strong> © 2007<br />
The Path to Producti<strong>on</strong>: Retenti<strong>on</strong> Policies That Work<br />
(Part II of IV)<br />
By <strong>Craig</strong> <strong>Ball</strong><br />
[Originally published in Law Technology News, November 2005]<br />
In this sec<strong>on</strong>d in a series, we c<strong>on</strong>tinue down the path to producti<strong>on</strong> of electr<strong>on</strong>ic mail. Last<br />
m<strong>on</strong>th, I reminded you to look bey<strong>on</strong>d the e-mail server to the many other places e-mail hides.<br />
Now, having identified the evidence, we're obliged to protect it from deleti<strong>on</strong>, alterati<strong>on</strong> and<br />
corrupti<strong>on</strong>.<br />
Preservati<strong>on</strong><br />
Anticipati<strong>on</strong> of a claim is all that's required to trigger a duty to preserve potentially relevant<br />
evidence, including fragile, ever-changing electr<strong>on</strong>ic data. Preservati<strong>on</strong> allows backtracking <strong>on</strong><br />
the path to producti<strong>on</strong>, but fail to preserve evidence and you've burned your bridges.<br />
Complicating our preservati<strong>on</strong> effort is the aut<strong>on</strong>omy afforded e-mail users. They create quirky<br />
folder structures, commingle pers<strong>on</strong>al and business communicati<strong>on</strong>s and — most dangerous of<br />
all — c<strong>on</strong>trol deleti<strong>on</strong> and retenti<strong>on</strong> of messages.<br />
Best practices dictate that we instruct e-mail custodians to retain potentially relevant messages<br />
and that we regularly c<strong>on</strong>vey to them sufficient informati<strong>on</strong> to assess relevance in a c<strong>on</strong>sistent<br />
manner. In real life, hold directives al<strong>on</strong>e are insufficient. Users find it irresistibly easy to delete<br />
data, so anticipate human frailty and act to protect evidence from spoliati<strong>on</strong> at the hands of<br />
those inclined to destroy it. D<strong>on</strong>'t leave the fox guarding the henhouse.<br />
C<strong>on</strong>sider the following as parts of an effective e-mail preservati<strong>on</strong> effort:<br />
• Litigati<strong>on</strong> hold notices to custodians, including clear, practical and specific<br />
retenti<strong>on</strong> directives. Notices should remind custodians of relevant places where e-<br />
mail resides, but not serve as a blueprint for destructi<strong>on</strong>. Be sure to provide for<br />
notificati<strong>on</strong> to new hires and collecti<strong>on</strong> from departing employees.<br />
• Suspensi<strong>on</strong> of retenti<strong>on</strong> policies that call for purging e-mail.<br />
• Suspensi<strong>on</strong> of re-use (rotati<strong>on</strong>) of back up media c<strong>on</strong>taining e-mail.<br />
• Suspensi<strong>on</strong> of hardware and software changes which make e-mail inaccessible.<br />
• Replacing back up systems without retaining the means to read older media.<br />
• Re-tasking or re-imaging systems for new users.<br />
• Selling, giving away or otherwise disposing of systems and media.<br />
• Preventing custodians from deleting/ altering/corrupting e-mail.<br />
• Immediate and periodic "snapshots" of relevant e-mail accounts.<br />
• Modifying user privileges settings <strong>on</strong> local systems and networks.<br />
• Archival by auto-forwarding selected e-mail traffic to protected storage.<br />
• Restricting activity like moving or copying files tending to irreparably alter file<br />
metadata.<br />
• Packet capture of Instant Messaging (traffic or effective enforcement of IM<br />
prohibiti<strong>on</strong>.<br />
82