TreatiseTreatise

Electronic Discovery Deskbook

 by Matthew A. Rooney, Anthony J. Diana, Ashish S. Prasad, Thomas Y. Allman, Mayer Brown LLP
 
 Copyright: 2009-2012
 Last Updated: October 2012

 Product Details >> 

Product Details

  • ISBN Number: 9781402411656
  • Page Count: 638
  • Number of Volumes: 1
  •  
  • The purchase of PLI titles may include Basic Upkeep Service, whereby
    supplements, replacement pages and new editions may be shipped
    to you immediately upon publication for a 30-day examination. This
    service is cancelable at any time.

The discovery stage in litigation is costly in terms of time and expense for attorneys and their clients. Today’s explosion of electronic technologies and data has made the process even more difficult.

Written by legal and technical experts in this specialized field, PLI’s new Electronic Discovery Deskbook helps you to reduce the cost and complexity of e-discovery by showing you how to more easily and quickly prepare, collect, prepare, and produce electronically-stored information (ESI) for discovery purposes.

Packed with step-by-step advice, Electronic Discovery Deskbook guides you on how to educate company personnel on the importance of preserving ESI; respond effectively to reasonable discovery requests; handle the unique demands of preserving different types of ESI, such as voice mail, instant messaging, and hard drives; use the latest technologies to speed the retrieval of ESI; and prevent the unintentional destruction of company data and other missteps and avoid potentially crippling lawsuits.

Updated at least annually, Electronic Discovery Deskbook is an indispensable resource for attorneys, company IT personnel, executives, managers, compliance officers, and government regulators.

  Foreword
Chapter 1: The 2006 Amendments to the Federal Rules of Civil Procedure, the 2008 Amendments to the Federal Rules of Evidence, and the Sedona Principles James Ancone ~ Mayer Brown LLP
  • § 1:1 : Introduction1-2
  • § 1:2 : The 2006 E-Discovery Amendments1-6
    • § 1:2.1 : Background1-6
    • § 1:2.2 : Preservation and the Amendments1-8
    • § 1:2.3 : Discovery of Electronically Stored Information1-11
    • § 1:2.4 : Scope of Party-Managed Discovery: Inaccessible Sources of Information1-13
    • § 1:2.5 : Discovery Management: Early Attention to Contentious Issues1-17
    • § 1:2.6 : Discovery Management: Forms and Formats of Production1-18
    • § 1:2.7 : Sanctions Practice: Limitations for Routine, Good Faith Losses1-20
    • § 1:2.8 : Other Discovery Rules1-23
      • [A] : Initial Disclosures1-23
      • [B] : Clawback of Production of Privileged Communications or Trial Preparation Materials1-23
      • [C] : Responses to Interrogatories Based on Business Records1-24
      • [D] : Third-Party Practice1-25
  • § 1:3 : E-Discovery in the United States Tax Court1-26
  • § 1:4 : The 2008 Evidence Amendments1-29
  • § 1:5 : E-Discovery in State Courts1-31
  • § 1:6 : Other E-Discovery Rules1-37
  • § 1:7 : The 2010 and 2011 Litigation Conferences1-38
Chapter 2: Information Management Policies and Procedures Mark Cuccaro ~ Mayer Brown LLP
Rebecca Kahan ~ Mayer Brown LLP
Tiasha Palikovic ~ Mayer Brown
Megan Harmsen ~ Mayer Brown LLP
  • § 2:1 : Introduction2-3
  • § 2:2 : Managing Data Systems to Anticipate Litigation2-4
    • § 2:2.1 : Internal Witness Preparation2-4
      • [A] : Questions About Email Storage2-5
      • [B] : Questions About Laptops2-6
      • [C] : Questions About Desktops2-7
      • [D] : Questions About Procedures for Retaining Data for Departing Employees2-8
      • [E] : Questions About Records Management and Document Retention Policies2-8
      • [F] : Questions About Home Computers2-9
      • [G] : Questions About Portable Media2-10
      • [H] : Questions About Handheld Devices2-10
      • [I] : Questions About Internet and Intranet Usage and Social Media2-11
      • [J] : Questions About Web Meetings and Collaboration Tools2-12
      • [K] : Questions About Backup Systems2-12
      • [L] : Questions About Preservation2-14
      • [M] : Questions About Collection2-15
      • [N] : Questions About Group (Shared) Network Drives2-16
      • [O] : Questions About Structured Databases2-17
    • § 2:2.2 : Data Source Catalogs2-17
  • § 2:3 : Records Management Policy2-20
    • § 2:3.1 : Email and Other Communication2-20
    • § 2:3.2 : Disaster Recovery Data2-24
      • [A] : Implementing a Retention Plan2-26
      • [B] : Consideration of Relevant Regulations2-26
      • [C] : Regular Recycling and Destruction2-27
      • [D] : Dealing with Litigation Holds2-28
    • § 2:3.3 : Databases2-29
    • § 2:3.4 : Data Privacy2-31
  • § 2:4 : Remediation of Legacy Data2-32
    • § 2:4.1 : Nature of Legacy Data2-32
    • § 2:4.2 : Costs and Risks Associated with Legacy Data2-33
      • [A] : Costs and Risks of Storage and Data Management2-33
      • [B] : Costs and Risks of Disclosure2-34
      • [C] : Costs and Risks of Production2-35
    • § 2:4.3 : Remediation Prerequisites2-35
    • § 2:4.4 : Measuring Success of Remediation2-36
      • [A] : Litigation Holds Management System2-36
      • [B] : Legacy Data Maintenance2-36
    • § 2:4.5 : Remediation of Different Types of Data2-36
      • [A] : Centralized Data2-37
        • [A][1] : Matter-Specific Data2-37
        • [A][2] : Custodian-Level Data2-37
        • [A][3] : Organizational-Level Data2-38
        • [A][4] : Media-Level Data (Including Backup Tapes)2-38
      • [B] : Noncentralized Data2-38
    • § 2:4.6 : Legal Standard for Knowledge About Legacy Data2-39
    • § 2:4.7 : Remediation of Backup Tapes2-42
      • [A] : Objectives2-42
      • [B] : Steps2-43
        • [B][1] : Gather Information2-44
          • [B][1][a] : Tapes and Systems2-44
          • [B][1][b] : Holds2-45
        • [B][2] : Conduct a Backup Tape Sweep2-45
        • [B][3] : Create a Taxonomy of Backup Tapes and Holds2-46
        • [B][4] : Gather Information on Tape Use and Policies2-47
        • [B][5] : Exclusion and Inclusion of Tapes or Tape Sets2-47
        • [B][6] : Additional Inclusion and Exclusion Techniques2-48
      • [C] : Results of the Inclusion-and-Exclusion Process2-49
      • [D] : Resumption of Recycling of Daily Backup Tapes2-49
    • § 2:4.8 : Remediation of Accumulated Images of Hard Drives and Other Custodian-Level Data2-49
    • § 2:4.9 : Remediation of Legacy Data in Possession of Employees2-50
      • [A] : Challenges2-51
      • [B] : Approaches2-51
        • [B][1] : Centralization2-52
        • [B][2] : Data Remediation by Personnel2-52
        • [B][3] : Office-by-Office, Person-by-Person Remediation2-53
        • [B][4] : Exclusion of Personnel Data from Any Remediation Project2-53
  • § 2:5 : Trends2-54
    • § 2:5.1 : Managing Risks of Deletion of ESI2-54
    • § 2:5.2 : Requiring Investment in Technology2-58
    • § 2:5.3 : Internal Social Media Policies2-59
Chapter 3: Litigation Management Policies and Procedures Vazantha Meyers ~ Mayer Brown LLP
Kim A. Leffert ~ Mayer Brown LLP
Zachary L. Ziliak ~ Mayer Brown LLP
  • § 3:1 : Introduction3-2
  • § 3:2 : Legal Department Role3-2
    • § 3:2.1 : Overview3-2
    • § 3:2.2 : Managing Risk3-3
    • § 3:2.3 : Achieving a Reasonable, Good Faith Approach to Preservation3-5
  • § 3:3 : Corporate Policies3-7
    • § 3:3.1 : Confidential Information3-7
    • § 3:3.2 : Attorney-Client Privilege and Work Product Doctrine3-10
    • § 3:3.3 : Preservation3-12
    • § 3:3.4 : Collection3-13
    • § 3:3.5 : Review and Production3-14
  • § 3:4 : Litigation Holds3-16
    • § 3:4.1 : Timing3-17
    • § 3:4.2 : Process for Issuing a Hold3-18
    • § 3:4.3 : Scope of the Hold3-19
  • § 3:5 : Corporate Compliance3-20
    • § 3:5.1 : Employee Training3-20
    • § 3:5.2 : Monitoring and Updating3-21
    • § 3:5.3 : Integration of Outside Counsel and E-Discovery Vendors3-21
Chapter 4: Preservation Obligations Therese Craparo ~ Mayer Brown Rowe & Maw LLP
Andrew Calica ~ Mayer Brown Rowe & Maw
Noah Liben ~ Mayer Brown LLP
  • § 4:1 : Introduction4-4
  • § 4:2 : Boundaries of the Duty to Preserve4-4
    • § 4:2.1 : Triggering of Preservation Obligations4-5
      • [A] : Notice of the Duty to Preserve4-6
      • [B] : Reasonably Anticipated Future Litigation4-7
        • [B][1] : “Potential” Versus “Anticipated” Litigation4-7
        • [B][2] : Factors That May Trigger a Duty to Preserve4-10
          • [B][2][a] : Fear of Future Litigation4-10
          • [B][2][b] : Retention of Counsel or Other Experts4-11
          • [B][2][c] : Notice of Conduct Underlying a Potential Claim4-12
          • [B][2][d] : Litigation Has Become Commonplace Under Similar Circumstances4-14
      • [C] : Best Practices for Determining the Triggering of an Obligation4-14
        • [C][1] : Develop Information About the Organization’s Exposure to Typical Triggering Events4-15
        • [C][2] : Develop a Process for the Notification of In-House Counsel of Triggering Events4-15
        • [C][3] : Take Steps to Analyze Costs and Risks to Organization4-15
    • § 4:2.2 : Scope of Preservation Obligations4-16
      • [A] : Types of ESI That Must Be Preserved4-18
      • [B] : Identifying Sources of ESI Likely to Contain Discoverable Information4-22
        • [B][1] : Accessible Versus Inaccessible Data4-23
        • [B][2] : Routine Operations4-27
        • [B][3] : Email4-29
        • [B][4] : Handheld Devices4-30
        • [B][5] : Websites4-31
        • [B][6] : Group/Shared Drives4-31
        • [B][7] : Determining Key Players and Relevant Time Frames4-32
        • [B][8] : Former Employees4-33
        • [B][9] : Custodians’ Personal Data4-34
        • [B][10] : Data Sources Frequently Relevant in Similar Litigations4-36
      • [C] : Raising Preservation Issues4-37
    • § 4:2.3 : Search Technology4-38
    • § 4:2.4 : Form of Preservation4-39
    • § 4:2.5 : Methods of Preservation4-42
      • [A] : Manual Copy4-43
      • [B] : Active Data Copy4-43
      • [C] : Forensic Image Process4-43
      • [D] : End-User-Driven Process4-44
      • [E] : Supervised Tape Archive Process4-44
      • [F] : Records Management4-44
      • [G] : Individual Computer Backup4-45
  • § 4:3 : Types of ESI4-45
    • § 4:3.1 : Voice Mail4-45
      • [A] : Discoverability4-45
      • [B] : Best Practices for Preservation4-46
    • § 4:3.2 : Instant Messaging4-47
      • [A] : What Is Instant Messaging?4-47
      • [B] : How Does Instant Messaging Work?4-48
      • [C] : Expansion into the Corporate World4-49
      • [D] : Treatment of Instant Messaging in Discovery4-50
        • [D][1] : Discoverability4-50
        • [D][2] : Duty to Preserve4-51
        • [D][3] : Regulatory Guidance4-53
        • [D][4] : Practical Considerations4-53
      • [E] : Best Practices for Preserving Instant Messages4-54
        • [E][1] : Evaluate Need for an IM System4-54
        • [E][2] : Install Corporate IM System and Prohibit Use of Public IM4-54
        • [E][3] : Establish a General IM Policy4-55
    • § 4:3.3 : Backup Media4-55
      • [A] : The Nature of Backup Tapes and Their Limitations in Discovery4-56
      • [B] : Duty to Preserve4-58
        • [B][1] : Common Law Preservation Obligation4-58
        • [B][2] : Application of Preservation Duty to Backup Tapes4-59
      • [C] : Best Practices for Preserving Backup Media4-63
        • [C][1] : Obtain Comprehensive Understanding of Disaster Recovery Systems4-63
        • [C][2] : Develop Policies and Procedures for Backup Media, Including Preservation Guidelines4-64
        • [C][3] : Object to, and Consult About, Preservation of Backup Data As Soon As Practicable4-64
        • [C][4] : Develop Standard Disclosure Documents4-64
    • § 4:3.4 : Hard Drives and Images of Hard Drives4-65
      • [A] : Mirror Imaging4-66
      • [B] : Demands for Mirror Imaging4-66
      • [C] : Best Practices4-69
        • [C][1] : Develop and Follow Guidelines for When to Preserve Hard Drives or Take Images4-69
        • [C][2] : Develop a Process for Managing Hard Drives and Images4-69
    • § 4:3.5 : Data in Dynamic or Transitory Systems4-69
      • [A] : Preserving Dynamic Data4-69
      • [B] : Best Practices4-70
        • [B][1] : Obtain Comprehensive Understanding of Relevant Systems4-70
        • [B][2] : Develop and Follow Guidelines for When to Preserve Data4-71
        • [B][3] : Deal with the Preservation of Data from Dynamic and Transitory Systems As Soon As Practicable4-71
        • [B][4] : Develop Standard Disclosure Documents Regarding Data from Dynamic and Transitory Systems4-71
    • § 4:3.6 : Legacy Data4-72
      • [A] : Preservation4-72
      • [B] : Best Practices4-72
    • § 4:3.7 : Emerging Technologies: Social Networking and Other Web-Based Technologies4-73
      • [A] : The Next Generation of ESI4-73
      • [B] : Examples of Emerging Technologies4-73
        • [B][1] : Social Networking and Video-Sharing Sites4-74
        • [B][2] : Web-Based Collaboration Applications4-74
        • [B][3] : Cloud Computing4-75
      • [C] : Emerging Technologies in Discovery4-76
      • [D] : Best Practices for Preservation4-76
        • [D][1] : Understand How Emerging Technologies Are Used4-77
        • [D][2] : Evaluate the Business Need4-77
        • [D][3] : Educate Employees4-77
        • [D][4] : Establish Policies Regarding the Use of Web-Based Technologies4-77
        • [D][5] : Include Emerging Technologies in Legal Hold Notices4-77
        • [D][6] : Negotiate Contractual Agreements with Cloud Computing Providers4-78
        • [D][7] : Develop Procedures for Capturing Web-Based or Third-Party Hosted Data4-78
        • [D][8] : Audit Compliance with Policies4-78
  • § 4:4 : Legal Holds4-79
    • § 4:4.1 : Executing Legal Holds4-79
      • [A] : Contents of Preservation Notice4-81
      • [B] : Recipients of Preservation Notice4-82
      • [C] : Auditing Compliance with Preservation Notice4-84
      • [D] : Best Practices4-85
    • § 4:4.2 : Evergreen Holds4-86
      • [A] : Determining Whether an Evergreen Hold Is Necessary4-86
      • [B] : Best Practices4-87
    • § 4:4.3 : Lifting Legal Holds4-88
      • [A] : Termination When Matter Is Ultimately Concluded4-88
      • [B] : Changes in Scope of the Legal Hold4-89
      • [C] : Additional Considerations4-90
Chapter 5: Managing the Meet-and-Confer Process Therese Craparo ~ Mayer Brown Rowe & Maw LLP
Jarman D. Russell ~ Mayer Brown LLP
  • § 5:1 : Introduction5-1
  • § 5:2 : Responsibilities of Counsel5-4
    • § 5:2.1 : Outside Counsel’s Responsibility5-4
    • § 5:2.2 : Relationship Between In-House and Outside Counsel5-9
    • § 5:2.3 : Best Practices in Preparing for a Meet and Confer5-12
  • § 5:3 : Key Issues for Discussion5-14
    • § 5:3.1 : Use of Search Terms and Advanced Search Technology5-17
    • § 5:3.2 : Privilege Protocols5-20
      • [A] : Clawback Agreements5-23
      • [B] : Quick-Peek Agreements5-24
      • [C] : Use of Search Terms or Data Analytics5-24
      • [D] : Privilege Logs5-25
      • [E] : Privilege and Metadata Review5-28
    • § 5:3.3 : Form of Production5-29
    • § 5:3.4 : Preservation5-33
    • § 5:3.5 : Metadata5-39
  • § 5:4 : Direct Access5-43
  • § 5:5 : Identification Requirements5-46
  • § 5:6 : Inaccessible Sources5-48
  • § 5:7 : Initial Disclosures5-53
Chapter 6: Collection of Electronically Stored Information Michael E. Lackey, Jr. ~ Mayer Brown LLP
Ethan Hastert ~ Mayer Brown LLP
Zachary L. Ziliak ~ Mayer Brown LLP
  • § 6:1 : Introduction6-2
  • § 6:2 : Legal Requirements6-2
    • § 6:2.1 : Meeting Discovery Obligations6-3
    • § 6:2.2 : Overcoming Claims of Under-Collection6-6
    • § 6:2.3 : Ensuring the Admissibility of Collected ESI6-8
  • § 6:3 : Overview of the Collection Process6-10
    • § 6:3.1 : Who Should Collect?6-11
    • § 6:3.2 : What Should Be Collected?6-11
    • § 6:3.3 : When Should Collection Occur?6-12
    • § 6:3.4 : Where Should the Collection Team Look for Relevant ESI?6-13
  • § 6:4 : Basic Collection Process6-14
    • § 6:4.1 : Locating Relevant Files6-14
      • [A] : Overview of Automated Search Methods6-16
      • [B] : Choosing a Search Method6-18
      • [C] : Designing the Query6-19
    • § 6:4.2 : Common Data Types6-21
      • [A] : Basic Data Files6-21
      • [B] : Email Journaling6-22
      • [C] : Instant Message Logging6-22
      • [D] : Application Metadata and Version Control6-23
      • [E] : Databases6-24
    • § 6:4.3 : Handling Identical and Distinct Files6-26
    • § 6:4.4 : Storing Collected ESI6-27
  • § 6:5 : Challenges to Collection6-28
    • § 6:5.1 : Privacy Concerns6-28
    • § 6:5.2 : Reasonable Accessibility6-30
      • [A] : Active, Online Data6-32
      • [B] : Near-Line Data6-34
      • [C] : Offline Storage and Archives6-34
      • [D] : Backup Tapes6-36
      • [E] : Erased, Fragmented, or Damaged Data6-38
    • § 6:5.3 : Unsearchable Data6-40
      • [A] : Nontextual Data6-40
      • [B] : Unknown and Unsupported File Types6-42
      • [C] : Compressed and Encrypted Files6-42
      • [D] : Corrupt Files6-43
Chapter 7: Review and Production of Electronically Stored Information Allisa Vermillion ~
Patrick Garbe ~ Mayer Brown Rowe & Maw LLP
Michael E. Lackey, Jr. ~ Mayer Brown LLP
Gabrielle Butcher ~ Mayer Brown Rowe & Maw LLP
Rebecca Kahan ~ Mayer Brown LLP
  • § 7:1 : Introduction7-2
  • § 7:2 : Review Format Options7-3
    • § 7:2.1 : Native File Review in Native Application7-3
    • § 7:2.2 : Converting Native Files for Review7-3
    • § 7:2.3 : Managing Costs7-6
  • § 7:3 : Requests for Production and Responses7-9
    • § 7:3.1 : Requests for Production7-9
      • [A] : The 2006 Amendments7-10
      • [B] : Drafting the Request7-13
    • § 7:3.2 : Responses7-15
      • [A] : Applicable Rules7-15
      • [B] : Best Practices7-19
  • § 7:4 : Preemptive Court Access7-20
    • § 7:4.1 : Amended Federal Rules7-20
    • § 7:4.2 : Early Preservation Orders7-22
    • § 7:4.3 : Letter Requests and Expedited Discovery7-27
    • § 7:4.4 : Ex Parte Orders7-28
  • § 7:5 : Cost-Shifting and Allocation7-30
    • § 7:5.1 : Rule 267-30
    • § 7:5.2 : The Zubulake and McPeek Tests7-32
    • § 7:5.3 : Cost-Shifting Trends7-34
    • § 7:5.4 : Award of Costs for E-Discovery Under Rule 54(d)(1) and 28 U.S.C. § 1920(4)7-38
    • § 7:5.5 : Best Practices7-39
  • § 7:6 : Privilege and Work Product Review7-41
    • § 7:6.1 : Pre-Review Preparation7-43
      • [A] : ESI Collection7-43
      • [B] : Privilege Review Work Flow7-43
    • § 7:6.2 : Defining the Privilege7-45
      • [A] : Attorney-Client Privilege7-45
      • [B] : Work Product Doctrine7-48
    • § 7:6.3 : Privilege Log7-49
    • § 7:6.4 : Waiver7-50
  • § 7:7 : Form of Production7-53
  • § 7:8 : Production of ESI to Multiple Parties, Including Public Entities7-55
    • § 7:8.1 : Applicable Rules7-56
    • § 7:8.2 : Risks7-57
    • § 7:8.3 : Selective Waiver Doctrine7-59
    • § 7:8.4 : Centralization and Continued Retention7-63
    • § 7:8.5 : Production Protocol7-64
  • § 7:9 : Expedited and Time-Sensitive Reviews7-65
    • § 7:9.1 : Preliminary Assessment7-65
    • § 7:9.2 : Selecting a Review Option7-66
    • § 7:9.3 : Review Phase7-67
      • [A] : Meet with Integrated Review Team7-67
      • [B] : Meet with Electronic Vendor7-67
      • [C] : Establish a Quality Control Procedure7-68
    • § 7:9.4 : Production Phase7-68
Chapter 8: Third-Party Practice Therese Craparo ~ Mayer Brown Rowe & Maw LLP
Andrew Calica ~ Mayer Brown Rowe & Maw
Jarman D. Russell ~ Mayer Brown LLP
  • § 8:1 : Introduction8-2
  • § 8:2 : Preservation Obligations of a Third Party8-3
    • § 8:2.1 : The Obligation Is Limited8-3
    • § 8:2.2 : Triggering the Obligation8-5
    • § 8:2.3 : Scope of the Obligation8-6
  • § 8:3 : Production Obligations of a Third Party8-8
    • § 8:3.1 : Rule 45 and Requests for Production of ESI8-8
    • § 8:3.2 : Third-Party Production of ESI and Cost-Shifting8-12
  • § 8:4 : Lifting Legal Holds for Third-Party Subpoenas8-17
  • § 8:5 : Best Practices8-19
    • § 8:5.1 : Best Practices for Third Parties Subject to Subpoena8-19
      • [A] : Consider Whether the Organization Will Become a Party to the Litigation8-19
      • [B] : Raise Objections Quickly8-19
      • [C] : Act Promptly to Comply with the Subpoena8-20
      • [D] : Negotiate Limitations on Preservation and Production8-20
      • [E] : Take Appropriate Steps to Lift Legal Holds Related to the Subpoena8-20
    • § 8:5.2 : Best Practices for Party Requesting Documents from a Third Party8-20
      • [A] : Use a Court Order to Preserve Documents8-20
      • [B] : Negotiate Scope of a Request Before It Is Served8-21
      • [C] : Draft Narrow Requests8-21
      • [D] : Negotiate Limitations on Preservation and Production8-21
Chapter 9: Regulatory and Government Investigations and Actions Therese Craparo ~ Mayer Brown Rowe & Maw LLP
Andrew Calica ~ Mayer Brown Rowe & Maw
Michael E. Lackey, Jr. ~ Mayer Brown LLP
Michelle N Webster ~ Mayer Brown LLP
Patrick M. Kellermann ~ Mayer Brown LLP
  • § 9:1 : Introduction9-1
  • § 9:2 : Preservation Obligations9-4
    • § 9:2.1 : Criminal Penalties As a Means of Enforcement9-6
    • § 9:2.2 : Record-Keeping Regulations As a Means of Enforcement9-7
  • § 9:3 : Formulating a Preservation and Collection Plan9-11
    • § 9:3.1 : Planning to Respond to a Government Subpoena9-12
    • § 9:3.2 : Planning to Respond to a Second Request9-13
  • § 9:4 : Meet-and-Confer Process9-14
  • § 9:5 : Productions9-15
  • § 9:6 : Lifting Legal Holds9-16
  • § 9:7 : Development of a Discovery Protocol9-18
  • § 9:8 : Criminal Investigations9-19
Chapter 10: Managing Spoilation Claims and Defenses Michael J Gill ~ Mayer Brown LLP
Robert E. Entwisle ~ Mayer Brown LLP
  • § 10:1 : Introduction10-2
  • § 10:2 : Legal Standards10-4
    • § 10:2.1 : Court Authority to Impose Spoliation Sanctions10-4
      • [A] : Federal Rules of Civil Procedure10-4
      • [B] : Inherent Authority10-5
      • [C] : Statutory Authority10-6
    • § 10:2.2 : Due Process Limitations10-8
    • § 10:2.3 : The Spoliation Standard10-9
      • [A] : Culpability10-10
        • [A][1] : Willful or Bad Faith Spoliation10-10
        • [A][2] : Negligent Spoliation10-11
      • [B] : Prejudice10-12
      • [C] : Rule 37 Safe Harbor10-12
  • § 10:3 : Prosecution of Spoliation Claims10-14
    • § 10:3.1 : Potential Impact of Spoliation Claims10-14
      • [A] : Tactical Effects10-14
      • [B] : Spoliator’s Loss of Credibility10-15
      • [C] : Sanctions10-16
        • [C][1] : Monetary Sanctions10-17
          • [C][1][a] : Fines10-18
          • [C][1][b] : Fees10-19
          • [C][1][c] : Cost-Shifting10-20
        • [C][2] : Adverse Inference10-21
          • [C][2][a] : Intent10-24
          • [C][2][b] : Content10-26
        • [C][3] : Striking Pleadings10-26
        • [C][4] : Exclusion of Evidence10-27
        • [C][5] : Loss of Attorney-Client Privilege or Work Product Protection10-28
        • [C][6] : Dismissal or Default Judgment10-29
    • § 10:3.2 : Discovery and Perfection of Spoliation Claims10-32
      • [A] : First Day Letters10-32
      • [B] : Court Orders and Preservation Statutes10-33
      • [C] : Depositions and Third-Party Discovery10-34
      • [D] : Experts10-36
  • § 10:4 : Defending Spoliation Claims10-36
    • § 10:4.1 : Scope of Preservation Obligation10-36
      • [A] : Implementation of the Litigation Hold10-37
      • [B] : Timing and Scope of the Litigation Hold10-38
        • [B][1] : Audio Recordings10-39
        • [B][2] : Metadata10-39
        • [B][3] : Backup Tapes10-39
    • § 10:4.2 : Traps for the Unwary Litigator10-40
      • [A] : Work Product Protection10-40
      • [B] : Automated Email Deletion10-41
      • [C] : Ephemeral Storage Issues10-42
      • [D] : “Control” over ESI10-43
    • § 10:4.3 : Proper Documentation10-45
  • § 10:5 : Expedited Access to Courts10-45
Chapter 11: Electronic Discovery in Specific Areas of Practice; And Chapter 11A: Arbitration; And Chapter 11B: The Next Generation of ESI: Social Media, Web-Based Collaboration Applications, Cloud Computing, and Mobile Technologies Sharon A Israel ~ Jenkens & Gilchrist
Therese Craparo ~ Mayer Brown Rowe & Maw LLP
Sarah Sterken Jackson ~ Mayer Brown LLP
Michael E. Lackey, Jr. ~ Mayer Brown LLP
Violeta I Balan ~ Mayer Brown LLP
Justin Dillon ~ Mayer Brown LLP
Menachem Hasofer ~ Mayer Brown JSM
Kyle E. Friesen ~ Mayer Brown LLP
Joseph Minta ~ Mayer Brown LLP
  • § 11:1 : Introduction11-2
  • § 11:2 : Accountants’ Liability11-3
    • § 11:2.1 : Nature of Discovery11-3
    • § 11:2.2 : Relevant Data Sources11-3
    • § 11:2.3 : Issues Regarding Preservation and Production11-4
  • § 11:3 : Antitrust11-5
    • § 11:3.1 : Nature of Discovery11-5
    • § 11:3.2 : Relevant Data Sources11-6
    • § 11:3.3 : Issues Regarding Preservation and Production11-6
  • § 11:4 : Bankruptcy11-7
    • § 11:4.1 : Nature of Discovery11-7
    • § 11:4.2 : Relevant Data Sources11-8
    • § 11:4.3 : Issues Regarding Preservation and Production11-9
  • § 11:5 : Class Actions11-11
    • § 11:5.1 : Nature of Discovery11-11
    • § 11:5.2 : Relevant Data Sources11-12
    • § 11:5.3 : Issues Regarding Preservation and Production11-12
  • § 11:6 : Construction11-13
    • § 11:6.1 : Nature of Discovery11-13
    • § 11:6.2 : Relevant Data Sources11-13
    • § 11:6.3 : Issues Regarding Preservation and Production11-14
  • § 11:7 : Contracts11-14
    • § 11:7.1 : Nature of Discovery11-14
    • § 11:7.2 : Relevant Data Sources11-15
    • § 11:7.3 : Issues Regarding Preservation and Production11-15
  • § 11:8 : Divorce11-15
    • § 11:8.1 : Nature of Discovery11-15
    • § 11:8.2 : Relevant Data Sources11-16
    • § 11:8.3 : Issues Regarding Preservation and Production11-17
  • § 11:9 : Employment11-17
    • § 11:9.1 : Nature of Discovery11-17
    • § 11:9.2 : Relevant Data Sources11-18
    • § 11:9.3 : Issues Regarding Preservation and Production11-19
  • § 11:10 : Government Contracting11-21
    • § 11:10.1 : Nature of Discovery11-21
    • § 11:10.2 : Relevant Data Sources11-24
    • § 11:10.3 : Issues Regarding Preservation and Production11-25
  • § 11:11 : Intellectual Property11-25
    • § 11:11.1 : Nature of Discovery11-25
    • § 11:11.2 : Relevant Data Sources11-27
    • § 11:11.3 : Issues Regarding Preservation and Production11-28
  • § 11:12 : Pharmaceuticals11-31
    • § 11:12.1 : Nature of Discovery11-31
    • § 11:12.2 : Relevant Data Sources11-32
    • § 11:12.3 : Issues Regarding Preservation and Production11-32
      • [A] : Product Liability Cases11-32
      • [B] : Patent and Regulatory Cases11-34
  • § 11:13 : Product Liability11-34
    • § 11:13.1 : Nature of Discovery11-34
    • § 11:13.2 : Relevant Data Sources11-34
    • § 11:13.3 : Issues Regarding Preservation and Production11-35
  • § 11:14 : Securities11-35
    • § 11:14.1 : Nature of Discovery11-35
    • § 11:14.2 : Relevant Data Sources11-36
    • § 11:14.3 : Issues Regarding Preservation and Production11-37
  • § 11:15 : Tax11-37
    • § 11:15.1 : Nature of Discovery11-37
    • § 11:15.2 : Relevant Data Sources11-38
    • § 11:15.3 : Issues Regarding Preservation and Production11-38
  • § 11A:1 : Introduction11A-2
  • § 11A:2 : Arbitral Institution Rules11A-2
    • § 11A:2.1 : American Arbitration Association (AAA)11A-3
      • [A] : Document Exchange11A-3
      • [B] : Costs11A-4
    • § 11A:2.2 : International Centre for Dispute Resolution (ICDR)11A-4
      • [A] : Document Exchange11A-4
      • [B] : Costs11A-5
    • § 11A:2.3 : International Chamber of Commerce International Court of Arbitration (ICC)11A-5
      • [A] : Document Exchange11A-5
      • [B] : Costs11A-5
    • § 11A:2.4 : London Court of International Arbitration (LCIA)11A-6
      • [A] : Document Exchange11A-6
      • [B] : Costs11A-6
    • § 11A:2.5 : International Centre for Settlement of Investment Disputes (ICSID)11A-6
      • [A] : Document Exchange11A-7
      • [B] : Costs11A-7
  • § 11A:3 : Arbitration Associations’ Guidelines11A-7
    • § 11A:3.1 : International Bar Association (IBA)11A-7
      • [A] : Document Exchange11A-8
      • [B] : Costs11A-8
    • § 11A:3.2 : Chartered Institute of Arbitrators (CIArb)11A-9
      • [A] : Document Exchange11A-9
      • [B] : Costs11A-9
    • § 11A:3.3 : International Institute for Conflict Prevention and Resolution (CPR)11A-10
      • [A] : Document Exchange11A-10
      • [B] : Costs11A-11
    • § 11A:3.4 : College of Commercial Arbitrators (CCA)11A-11
      • [A] : Document Exchange11A-11
      • [B] : Costs11A-12
  • § 11A:4 : Best Practices11A-12
    • § 11A:4.1 : Contracting11A-12
    • § 11A:4.2 : When a Dispute Arises11A-13
      • [A] : Notification of Arbitration11A-13
      • [B] : Negotiations with Opposing Counsel11A-14
      • [C] : Constitution of Arbitral Tribunal11A-15
      • [D] : Prehearing Conference11A-16
    • § 11A:4.3 : Disclosure11A-16
  • § 11B:1 : Introduction11B-2
  • § 11B:2 : Emerging Technologies at the Forefront of ESI11B-3
    • § 11B:2.1 : Social Media and Video-Sharing Sites11B-3
    • § 11B:2.2 : Web-Based Collaboration Applications11B-4
    • § 11B:2.3 : Cloud Computing11B-5
    • § 11B:2.4 : Mobile Technologies11B-7
  • § 11B:3 : Emerging Technologies and Business Operations11B-8
    • § 11B:3.1 : The Line Between Business and Personal Communications11B-8
    • § 11B:3.2 : Evaluating the Business Need and Legal Implications11B-9
      • [A] : Social Media11B-9
      • [B] : Web-Based Collaboration Applications11B-10
      • [C] : Cloud Computing11B-11
      • [D] : Mobile Technologies11B-12
    • § 11B:3.3 : Establishing Policies and Educating Employees11B-12
    • § 11B:3.4 : Auditing Compliance and Reviewing Policies11B-13
  • § 11B:4 : Emerging Technologies in Discovery11B-14
    • § 11B:4.1 : Use of Data from Emerging Technologies in Litigation11B-14
    • § 11B:4.2 : Applicable Statutes, Rules, and Regulations11B-17
      • [A] : Electronic Communications Privacy Act11B-17
      • [B] : Regulatory Guidance11B-19
    • § 11B:4.3 : Possession, Custody, and Control11B-20
      • [A] : Control of Data Hosted or Managed by Third Parties11B-20
      • [B] : Shared Services and Affiliated Company Data11B-22
    • § 11B:4.4 : Data Privacy11B-24
    • § 11B:4.5 : Ethical Issues and Attorney-Client Privilege11B-25
      • [A] : Factual Investigations11B-25
      • [B] : Attorney-Client Privilege11B-25
  • § 11B:5 : Best Practices for Managing Emerging Technologies in Discovery11B-26
    • § 11B:5.1 : Develop Policies and Procedures Before Litigation Arises11B-26
    • § 11B:5.2 : Consider Collection Options11B-27
    • § 11B:5.3 : Negotiate with Third-Party Providers11B-28
    • § 11B:5.4 : Consider Production Strategies11B-29
Chapter 12: International Issues Matthew Ingber ~ Mayer Brown LLP
Mark C Hilgard ~ Mayer Brown LLP
Joseph Baker ~ Mayer Brown LLP
Menachem Hasofer ~ Mayer Brown JSM
Edmund Sautter ~ Mayer Brown LLP
  • § 12:1 : Introduction12-4
  • § 12:2 : International Electronic Discovery Issues from a U.S. Perspective12-4
    • § 12:2.1 : Possession, Custody, or Control of ESI12-5
      • [A] : General Standard12-5
      • [B] : Standard for Companies with International Offices12-5
        • [B][1] : Parent-Subsidiary12-6
        • [B][2] : Other Relationships12-8
    • § 12:2.2 : Is Release of ESI Blocked by Foreign Law?12-10
      • [A] : Foreign Blocking Statutes and Data Protection and Privacy Laws12-10
      • [B] : Resolution of Conflicts of Discovery Laws: Aerospatiale International Comity Factors12-11
      • [C] : Additional Factors12-14
      • [D] : Discovery Procedures: Hague Convention Versus Federal Rules12-16
  • § 12:3 : Electronic Discovery in England and Wales12-17
    • § 12:3.1 : Early Developments12-17
    • § 12:3.2 : Civil Procedure Rules of 199912-18
    • § 12:3.3 : Initial Recognition of Electronic Disclosure12-19
    • § 12:3.4 : Practice Direction Paragraph 2A12-20
    • § 12:3.5 : Case Law12-21
    • § 12:3.6 : Practice Direction 31B12-25
      • [A] : The Questionnaire12-26
      • [B] : Proportionality12-26
    • § 12:3.7 : Duty to Preserve ESI12-27
    • § 12:3.8 : Sanctions12-29
    • § 12:3.9 : Waiver12-31
    • § 12:3.10 : Obtaining ESI from a Party in the U.K. for Use in U.S. Proceedings12-32
  • § 12:4 : Electronic Discovery in Germany12-34
    • § 12:4.1 : Introduction12-34
    • § 12:4.2 : Obtaining Electronic Evidence Under German Law12-35
      • [A] : Principle of Party Presentation12-35
      • [B] : Introduction of Facts into the Court Proceeding12-35
      • [C] : Scope of Evidence Taking12-36
      • [D] : Evidence-Taking Procedure12-36
      • [E] : Means to Obtain Evidence from the Adverse Party12-37
        • [E][1] : Examination of the Adverse Party12-37
        • [E][2] : Proof by Witness Testimony12-37
        • [E][3] : Production of Documents in Possession of Adverse Party12-38
        • [E][4] : Production of Documents in Possession of Third Party12-38
        • [E][5] : Production of Electronically Stored Information12-39
      • [F] : Enforcement Procedure12-40
        • [F][1] : Disclosure Only If Claimant Has Substantive Claim12-40
          • [F][1][a] : Principle of Good Faith12-40
          • [F][1][b] : Obligation Annexed to Contract12-41
          • [F][1][c] : Obligation of Equal Disclosure12-41
          • [F][1][d] : Inspection of Documents12-41
          • [F][1][e] : Right to Inventory12-42
          • [F][1][f] : Assignment of Claims12-42
        • [F][2] : Summary of Disclosure Requirements12-42
      • [G] : Production of Documents upon Court’s Discretion12-42
    • § 12:4.3 : Obtaining Evidence from Germany for U.S. Discovery Proceedings12-43
      • [A] : The EU Situation: EC 1206/200112-43
      • [B] : The Hague Convention12-44
    • § 12:4.4 : Privileges and Exceptions to Disclosure12-47
      • [A] : Correspondence Between a Party and Close Relatives12-48
      • [B] : Attorney-Client Privilege Under German Law12-48
        • [B][1] : Does the Attorney-Client Privilege Cover In-House Lawyers?12-50
        • [B][2] : Confidentiality of Communication with In-House Lawyers in U.S. Discovery Proceedings12-53
      • [C] : Business and Trade Secrets12-53
      • [D] : Financial Loss; Disgrace or Self-Incrimination12-54
  • § 12:5 : Electronic Discovery in the Hong Kong Special Administrative Region12-55
    • § 12:5.1 : Introduction—The System of Law and Courts of the Hong Kong Special Administrative Region12-55
      • [A] : “One Country, Two Systems”12-55
      • [B] : Legal System12-56
      • [C] : Courts12-56
      • [D] : Arbitration12-57
    • § 12:5.2 : Civil Justice Reforms in Hong Kong12-58
      • [A] : Framework12-58
      • [B] : Underlying Objectives and Case Management12-59
      • [C] : ESI12-60
    • § 12:5.3 : Definitions of “Document” in Hong Kong Law12-60
    • § 12:5.4 : Scope of Relevance for Discovery12-61
      • [A] : Automatic “General Discovery”12-61
      • [B] : Peruvian Guano Test of Relevance12-61
      • [C] : Discovery Reforms Canvassed During the CJR Consultation12-63
    • § 12:5.5 : List of Documents, Verifying Affidavit and Orders Compelling Discovery12-64
      • [A] : List of Documents12-64
      • [B] : Verifying Affidavit12-64
      • [C] : Order Compelling Filing and Sanctions for Non-Compliance12-65
      • [D] : Difficulties in Filing the List of Documents and Verifying Affidavit12-66
    • § 12:5.6 : Courts’ Power to Manage Cases by Limiting or Modifying Scope and Manner of Discovery12-67
      • [A] : Existing Powers Under “Retained” RHC12-67
      • [B] : Case Management Discovery Under CJR12-68
      • [C] : Summary of Rules Applicable to Discovery of ESI Under CJR12-69
    • § 12:5.7 : Duty to Preserve12-69
    • § 12:5.8 : Sanctions for Failure to Preserve ESI12-70
      • [A] : Destruction of ESI12-70
      • [B] : Adverse Inferences12-71
    • § 12:5.9 : Hong Kong Case Law on ESI12-71
    • § 12:5.10 : Likely Developments Under CJR in Relation to E-Discovery12-73
      • [A] : Case Management Summons and Conferences12-73
      • [B] : Adopting Procedures from Other Jurisdictions12-74
        • [B][1] : United States12-74
        • [B][2] : England and Wales12-75
        • [B][3] : Australia12-75
        • [B][4] : Singapore12-76
  • § 12:6 : Data Protection in Europe12-76
    • § 12:6.1 : The Data Protection Directive12-76
    • § 12:6.2 : Safe Harbor12-79
    • § 12:6.3 : Transfer; Consent; Transfer Necessary for the Establishment, Exercise, or Defense of Legal Claims12-79
  • § 12:7 : Data Protection in the United Kingdom12-81
    • § 12:7.1 : Personal Data12-81
    • § 12:7.2 : Export of Personal Data for Legal Proceedings12-81
  • § 12:8 : German Federal Data Protection Act12-83
    • § 12:8.1 : Personal Data12-83
    • § 12:8.2 : Cross-Border Transfers of Personal Data12-85
  • § 12:9 : European Data Protection and U.S. Discovery12-92
Chapter 13: Technology Considerations; And Appendix 13A: Metadata Anthony Reid ~ Deloitte & Touche LLP
Bruce Hartley ~ Deloitte
William Farwell ~ Deloitte
Jeff Seymour ~ Deloitte
  • § 13:1 : Introduction13-2
  • § 13:2 : Strategic Issues13-3
    • § 13:2.1 : Continual Technology Developments13-3
    • § 13:2.2 : Dealing with Metadata13-4
    • § 13:2.3 : The Vendor Landscape13-5
  • § 13:3 : Records and Information Management13-6
    • § 13:3.1 : Challenges13-6
    • § 13:3.2 : ERM/ECM Software Features13-8
    • § 13:3.3 : Questions for ERM/ECM Software Vendors13-9
  • § 13:4 : Defining the Scope of Electronic Discovery13-11
    • § 13:4.1 : Challenges13-11
    • § 13:4.2 : Typical Scope Limiters13-12
      • [A] : Custodians (ESI Owners)13-12
      • [B] : Media Purposes13-13
      • [C] : Media Types13-13
      • [D] : Data Types13-13
      • [E] : Data Ownership13-14
      • [F] : Time Frames13-14
  • § 13:5 : Identification of Data13-14
    • § 13:5.1 : Early Case Assessment (ECA)13-15
    • § 13:5.2 : Challenges13-16
  • § 13:6 : Preserving Data13-17
    • § 13:6.1 : Collection As a Means of Preservation13-18
    • § 13:6.2 : Challenges13-19
  • § 13:7 : Collecting Data13-21
    • § 13:7.1 : Challenges13-22
    • § 13:7.2 : Making Collection Easier13-23
      • [A] : Imaging13-23
      • [B] : Archiving Collected Data13-24
      • [C] : Voice Mail and Video13-24
      • [D] : Chain of Custody13-24
      • [E] : Filters13-24
  • § 13:8 : Culling Data13-25
  • § 13:9 : Processing Data13-25
    • § 13:9.1 : Challenges13-26
    • § 13:9.2 : Note on Searching13-26
  • § 13:10 : Reviewing and Analyzing Data13-27
    • § 13:10.1 : Challenges13-27
  • § 13:11 : Producing Data13-28
    • § 13:11.1 : Challenges13-29
  • Appendix 13A : MetadataApp. 13A-1
Chapter 14: The Next Wave: Emerging Issues
  • § 14:1 : Introduction14-1
  • § 14:2 : Discoverability14-2
  • § 14:3 : Policies and Procedures14-5
  • § 14:4 : Technology14-8
  • § 14:5 : Automated Search Tools14-10
  • § 14:6 : Counsel Responsibilities14-14
  • § 14:7 : Disproportionate Review Costs14-17
Chapter 15: Table of Authorities
Chapter 16: Index to Electronic Discovery Deskbook

  Please click here to view the latest update information for this title: Last Update Information  
 


  Please click here to view the Table of Authorities: Table of Authorities  
 

Print Share Email
News & Expert Analysis

August 1, 2013

Beat the Summer Heat with Patents

From: Patent Law Practice Center

We are in the throes of summer, which any more mea...

July 29, 2013

Federal Circuit Affirms Tossed $18 Million Jury Verdict

From: Patent Law Practice Center

The United States Court of Appeals for the Federal...

July 25, 2013

The Wright Brothers Would Be a Patent Troll Today

From: Patent Law Practice Center

On July 1, 2013, I had the opportunity to once aga...