| |
|
|
Foreword |
|
|
|
Chapter 1: |
The 2006 Amendments to the Federal Rules of Civil Procedure, the 2008 Amendments to the Federal Rules of Evidence, and the Sedona Principles |
James Ancone ~ Mayer Brown LLP |
|
- § 1:1 : Introduction1-2
- § 1:2 : The 2006 E-Discovery Amendments1-6
- § 1:2.1 : Background1-6
- § 1:2.2 : Preservation and the Amendments1-8
- § 1:2.3 : Discovery of Electronically Stored Information1-11
- § 1:2.4 : Scope of Party-Managed Discovery: Inaccessible Sources of Information1-13
- § 1:2.5 : Discovery Management: Early Attention to Contentious Issues1-17
- § 1:2.6 : Discovery Management: Forms and Formats of Production1-18
- § 1:2.7 : Sanctions Practice: Limitations for Routine, Good Faith Losses1-20
- § 1:2.8 : Other Discovery Rules1-23
- [A] : Initial Disclosures1-23
- [B] : Clawback of Production of Privileged Communications or Trial Preparation Materials1-23
- [C] : Responses to Interrogatories Based on Business Records1-24
- [D] : Third-Party Practice1-25
- § 1:3 : E-Discovery in the United States Tax Court1-26
- § 1:4 : The 2008 Evidence Amendments1-29
- § 1:5 : E-Discovery in State Courts1-31
- § 1:6 : Other E-Discovery Rules1-37
- § 1:7 : The 2010 and 2011 Litigation Conferences1-38
|
|
Chapter 2: |
Information Management Policies and Procedures |
Mark Cuccaro ~ Mayer Brown LLP Rebecca Kahan ~ Mayer Brown LLP Tiasha Palikovic ~ Mayer Brown Megan Harmsen ~ Mayer Brown LLP |
|
- § 2:1 : Introduction2-3
- § 2:2 : Managing Data Systems to Anticipate Litigation2-4
- § 2:2.1 : Internal Witness Preparation2-4
- [A] : Questions About Email Storage2-5
- [B] : Questions About Laptops2-6
- [C] : Questions About Desktops2-7
- [D] : Questions About Procedures for Retaining Data for Departing Employees2-8
- [E] : Questions About Records Management and Document Retention Policies2-8
- [F] : Questions About Home Computers2-9
- [G] : Questions About Portable Media2-10
- [H] : Questions About Handheld Devices2-10
- [I] : Questions About Internet and Intranet Usage and Social Media2-11
- [J] : Questions About Web Meetings and Collaboration Tools2-12
- [K] : Questions About Backup Systems2-12
- [L] : Questions About Preservation2-14
- [M] : Questions About Collection2-15
- [N] : Questions About Group (Shared) Network Drives2-16
- [O] : Questions About Structured Databases2-17
- § 2:2.2 : Data Source Catalogs2-17
- § 2:3 : Records Management Policy2-20
- § 2:3.1 : Email and Other Communication2-20
- § 2:3.2 : Disaster Recovery Data2-24
- [A] : Implementing a Retention Plan2-26
- [B] : Consideration of Relevant Regulations2-26
- [C] : Regular Recycling and Destruction2-27
- [D] : Dealing with Litigation Holds2-28
- § 2:3.3 : Databases2-29
- § 2:3.4 : Data Privacy2-31
- § 2:4 : Remediation of Legacy Data2-32
- § 2:4.1 : Nature of Legacy Data2-32
- § 2:4.2 : Costs and Risks Associated with Legacy Data2-33
- [A] : Costs and Risks of Storage and Data Management2-33
- [B] : Costs and Risks of Disclosure2-34
- [C] : Costs and Risks of Production2-35
- § 2:4.3 : Remediation Prerequisites2-35
- § 2:4.4 : Measuring Success of Remediation2-36
- [A] : Litigation Holds Management System2-36
- [B] : Legacy Data Maintenance2-36
- § 2:4.5 : Remediation of Different Types of Data2-36
- [A] : Centralized Data2-37
- [A][1] : Matter-Specific Data2-37
- [A][2] : Custodian-Level Data2-37
- [A][3] : Organizational-Level Data2-38
- [A][4] : Media-Level Data (Including Backup Tapes)2-38
- [B] : Noncentralized Data2-38
- § 2:4.6 : Legal Standard for Knowledge About Legacy Data2-39
- § 2:4.7 : Remediation of Backup Tapes2-42
- [A] : Objectives2-42
- [B] : Steps2-43
- [B][1] : Gather Information2-44
- [B][1][a] : Tapes and Systems2-44
- [B][1][b] : Holds2-45
- [B][2] : Conduct a Backup Tape Sweep2-45
- [B][3] : Create a Taxonomy of Backup Tapes and Holds2-46
- [B][4] : Gather Information on Tape Use and Policies2-47
- [B][5] : Exclusion and Inclusion of Tapes or Tape Sets2-47
- [B][6] : Additional Inclusion and Exclusion Techniques2-48
- [C] : Results of the Inclusion-and-Exclusion Process2-49
- [D] : Resumption of Recycling of Daily Backup Tapes2-49
- § 2:4.8 : Remediation of Accumulated Images of Hard Drives and Other Custodian-Level Data2-49
- § 2:4.9 : Remediation of Legacy Data in Possession of Employees2-50
- [A] : Challenges2-51
- [B] : Approaches2-51
- [B][1] : Centralization2-52
- [B][2] : Data Remediation by Personnel2-52
- [B][3] : Office-by-Office, Person-by-Person Remediation2-53
- [B][4] : Exclusion of Personnel Data from Any Remediation Project2-53
- § 2:5 : Trends2-54
- § 2:5.1 : Managing Risks of Deletion of ESI2-54
- § 2:5.2 : Requiring Investment in Technology2-58
- § 2:5.3 : Internal Social Media Policies2-59
|
|
Chapter 3: |
Litigation Management Policies and Procedures |
Vazantha Meyers ~ Mayer Brown LLP Kim A. Leffert ~ Mayer Brown LLP Zachary L. Ziliak ~ Mayer Brown LLP |
|
- § 3:1 : Introduction3-2
- § 3:2 : Legal Department Role3-2
- § 3:2.1 : Overview3-2
- § 3:2.2 : Managing Risk3-3
- § 3:2.3 : Achieving a Reasonable, Good Faith Approach to Preservation3-5
- § 3:3 : Corporate Policies3-7
- § 3:3.1 : Confidential Information3-7
- § 3:3.2 : Attorney-Client Privilege and Work Product Doctrine3-10
- § 3:3.3 : Preservation3-12
- § 3:3.4 : Collection3-13
- § 3:3.5 : Review and Production3-14
- § 3:4 : Litigation Holds3-16
- § 3:4.1 : Timing3-17
- § 3:4.2 : Process for Issuing a Hold3-18
- § 3:4.3 : Scope of the Hold3-19
- § 3:5 : Corporate Compliance3-20
- § 3:5.1 : Employee Training3-20
- § 3:5.2 : Monitoring and Updating3-21
- § 3:5.3 : Integration of Outside Counsel and E-Discovery Vendors3-21
|
|
Chapter 4: |
Preservation Obligations |
Therese Craparo ~ Mayer Brown Rowe & Maw LLP Andrew Calica ~ Mayer Brown Rowe & Maw Noah Liben ~ Mayer Brown LLP |
|
- § 4:1 : Introduction4-4
- § 4:2 : Boundaries of the Duty to Preserve4-4
- § 4:2.1 : Triggering of Preservation Obligations4-5
- [A] : Notice of the Duty to Preserve4-6
- [B] : Reasonably Anticipated Future Litigation4-7
- [B][1] : “Potential” Versus “Anticipated” Litigation4-7
- [B][2] : Factors That May Trigger a Duty to Preserve4-10
- [B][2][a] : Fear of Future Litigation4-10
- [B][2][b] : Retention of Counsel or Other Experts4-11
- [B][2][c] : Notice of Conduct Underlying a Potential Claim4-12
- [B][2][d] : Litigation Has Become Commonplace Under Similar Circumstances4-14
- [C] : Best Practices for Determining the Triggering of an Obligation4-14
- [C][1] : Develop Information About the Organization’s Exposure to Typical Triggering Events4-15
- [C][2] : Develop a Process for the Notification of In-House Counsel of Triggering Events4-15
- [C][3] : Take Steps to Analyze Costs and Risks to Organization4-15
- § 4:2.2 : Scope of Preservation Obligations4-16
- [A] : Types of ESI That Must Be Preserved4-18
- [B] : Identifying Sources of ESI Likely to Contain Discoverable Information4-22
- [B][1] : Accessible Versus Inaccessible Data4-23
- [B][2] : Routine Operations4-27
- [B][3] : Email4-29
- [B][4] : Handheld Devices4-30
- [B][5] : Websites4-31
- [B][6] : Group/Shared Drives4-31
- [B][7] : Determining Key Players and Relevant Time Frames4-32
- [B][8] : Former Employees4-33
- [B][9] : Custodians’ Personal Data4-34
- [B][10] : Data Sources Frequently Relevant in Similar Litigations4-36
- [C] : Raising Preservation Issues4-37
- § 4:2.3 : Search Technology4-38
- § 4:2.4 : Form of Preservation4-39
- § 4:2.5 : Methods of Preservation4-42
- [A] : Manual Copy4-43
- [B] : Active Data Copy4-43
- [C] : Forensic Image Process4-43
- [D] : End-User-Driven Process4-44
- [E] : Supervised Tape Archive Process4-44
- [F] : Records Management4-44
- [G] : Individual Computer Backup4-45
- § 4:3 : Types of ESI4-45
- § 4:3.1 : Voice Mail4-45
- [A] : Discoverability4-45
- [B] : Best Practices for Preservation4-46
- § 4:3.2 : Instant Messaging4-47
- [A] : What Is Instant Messaging?4-47
- [B] : How Does Instant Messaging Work?4-48
- [C] : Expansion into the Corporate World4-49
- [D] : Treatment of Instant Messaging in Discovery4-50
- [D][1] : Discoverability4-50
- [D][2] : Duty to Preserve4-51
- [D][3] : Regulatory Guidance4-53
- [D][4] : Practical Considerations4-53
- [E] : Best Practices for Preserving Instant Messages4-54
- [E][1] : Evaluate Need for an IM System4-54
- [E][2] : Install Corporate IM System and Prohibit Use of Public IM4-54
- [E][3] : Establish a General IM Policy4-55
- § 4:3.3 : Backup Media4-55
- [A] : The Nature of Backup Tapes and Their Limitations in Discovery4-56
- [B] : Duty to Preserve4-58
- [B][1] : Common Law Preservation Obligation4-58
- [B][2] : Application of Preservation Duty to Backup Tapes4-59
- [C] : Best Practices for Preserving Backup Media4-63
- [C][1] : Obtain Comprehensive Understanding of Disaster Recovery Systems4-63
- [C][2] : Develop Policies and Procedures for Backup Media, Including Preservation Guidelines4-64
- [C][3] : Object to, and Consult About, Preservation of Backup Data As Soon As Practicable4-64
- [C][4] : Develop Standard Disclosure Documents4-64
- § 4:3.4 : Hard Drives and Images of Hard Drives4-65
- [A] : Mirror Imaging4-66
- [B] : Demands for Mirror Imaging4-66
- [C] : Best Practices4-69
- [C][1] : Develop and Follow Guidelines for When to Preserve Hard Drives or Take Images4-69
- [C][2] : Develop a Process for Managing Hard Drives and Images4-69
- § 4:3.5 : Data in Dynamic or Transitory Systems4-69
- [A] : Preserving Dynamic Data4-69
- [B] : Best Practices4-70
- [B][1] : Obtain Comprehensive Understanding of Relevant Systems4-70
- [B][2] : Develop and Follow Guidelines for When to Preserve Data4-71
- [B][3] : Deal with the Preservation of Data from Dynamic and Transitory Systems As Soon As Practicable4-71
- [B][4] : Develop Standard Disclosure Documents Regarding Data from Dynamic and Transitory Systems4-71
- § 4:3.6 : Legacy Data4-72
- [A] : Preservation4-72
- [B] : Best Practices4-72
- § 4:3.7 : Emerging Technologies: Social Networking and Other Web-Based Technologies4-73
- [A] : The Next Generation of ESI4-73
- [B] : Examples of Emerging Technologies4-73
- [B][1] : Social Networking and Video-Sharing Sites4-74
- [B][2] : Web-Based Collaboration Applications4-74
- [B][3] : Cloud Computing4-75
- [C] : Emerging Technologies in Discovery4-76
- [D] : Best Practices for Preservation4-76
- [D][1] : Understand How Emerging Technologies Are Used4-77
- [D][2] : Evaluate the Business Need4-77
- [D][3] : Educate Employees4-77
- [D][4] : Establish Policies Regarding the Use of Web-Based Technologies4-77
- [D][5] : Include Emerging Technologies in Legal Hold Notices4-77
- [D][6] : Negotiate Contractual Agreements with Cloud Computing Providers4-78
- [D][7] : Develop Procedures for Capturing Web-Based or Third-Party Hosted Data4-78
- [D][8] : Audit Compliance with Policies4-78
- § 4:4 : Legal Holds4-79
- § 4:4.1 : Executing Legal Holds4-79
- [A] : Contents of Preservation Notice4-81
- [B] : Recipients of Preservation Notice4-82
- [C] : Auditing Compliance with Preservation Notice4-84
- [D] : Best Practices4-85
- § 4:4.2 : Evergreen Holds4-86
- [A] : Determining Whether an Evergreen Hold Is Necessary4-86
- [B] : Best Practices4-87
- § 4:4.3 : Lifting Legal Holds4-88
- [A] : Termination When Matter Is Ultimately Concluded4-88
- [B] : Changes in Scope of the Legal Hold4-89
- [C] : Additional Considerations4-90
|
|
Chapter 5: |
Managing the Meet-and-Confer Process |
Therese Craparo ~ Mayer Brown Rowe & Maw LLP Jarman D. Russell ~ Mayer Brown LLP |
|
- § 5:1 : Introduction5-1
- § 5:2 : Responsibilities of Counsel5-4
- § 5:2.1 : Outside Counsel’s Responsibility5-4
- § 5:2.2 : Relationship Between In-House and Outside Counsel5-9
- § 5:2.3 : Best Practices in Preparing for a Meet and Confer5-12
- § 5:3 : Key Issues for Discussion5-14
- § 5:3.1 : Use of Search Terms and Advanced Search Technology5-17
- § 5:3.2 : Privilege Protocols5-20
- [A] : Clawback Agreements5-23
- [B] : Quick-Peek Agreements5-24
- [C] : Use of Search Terms or Data Analytics5-24
- [D] : Privilege Logs5-25
- [E] : Privilege and Metadata Review5-28
- § 5:3.3 : Form of Production5-29
- § 5:3.4 : Preservation5-33
- § 5:3.5 : Metadata5-39
- § 5:4 : Direct Access5-43
- § 5:5 : Identification Requirements5-46
- § 5:6 : Inaccessible Sources5-48
- § 5:7 : Initial Disclosures5-53
|
|
Chapter 6: |
Collection of Electronically Stored Information |
Michael E. Lackey, Jr. ~ Mayer Brown LLP Ethan Hastert ~ Mayer Brown LLP Zachary L. Ziliak ~ Mayer Brown LLP |
|
- § 6:1 : Introduction6-2
- § 6:2 : Legal Requirements6-2
- § 6:2.1 : Meeting Discovery Obligations6-3
- § 6:2.2 : Overcoming Claims of Under-Collection6-6
- § 6:2.3 : Ensuring the Admissibility of Collected ESI6-8
- § 6:3 : Overview of the Collection Process6-10
- § 6:3.1 : Who Should Collect?6-11
- § 6:3.2 : What Should Be Collected?6-11
- § 6:3.3 : When Should Collection Occur?6-12
- § 6:3.4 : Where Should the Collection Team Look for Relevant ESI?6-13
- § 6:4 : Basic Collection Process6-14
- § 6:4.1 : Locating Relevant Files6-14
- [A] : Overview of Automated Search Methods6-16
- [B] : Choosing a Search Method6-18
- [C] : Designing the Query6-19
- § 6:4.2 : Common Data Types6-21
- [A] : Basic Data Files6-21
- [B] : Email Journaling6-22
- [C] : Instant Message Logging6-22
- [D] : Application Metadata and Version Control6-23
- [E] : Databases6-24
- § 6:4.3 : Handling Identical and Distinct Files6-26
- § 6:4.4 : Storing Collected ESI6-27
- § 6:5 : Challenges to Collection6-28
- § 6:5.1 : Privacy Concerns6-28
- § 6:5.2 : Reasonable Accessibility6-30
- [A] : Active, Online Data6-32
- [B] : Near-Line Data6-34
- [C] : Offline Storage and Archives6-34
- [D] : Backup Tapes6-36
- [E] : Erased, Fragmented, or Damaged Data6-38
- § 6:5.3 : Unsearchable Data6-40
- [A] : Nontextual Data6-40
- [B] : Unknown and Unsupported File Types6-42
- [C] : Compressed and Encrypted Files6-42
- [D] : Corrupt Files6-43
|
|
Chapter 7: |
Review and Production of Electronically Stored Information |
Allisa Vermillion ~ Patrick Garbe ~ Mayer Brown Rowe & Maw LLP Michael E. Lackey, Jr. ~ Mayer Brown LLP Gabrielle Butcher ~ Mayer Brown Rowe & Maw LLP Rebecca Kahan ~ Mayer Brown LLP |
|
- § 7:1 : Introduction7-2
- § 7:2 : Review Format Options7-3
- § 7:2.1 : Native File Review in Native Application7-3
- § 7:2.2 : Converting Native Files for Review7-3
- § 7:2.3 : Managing Costs7-6
- § 7:3 : Requests for Production and Responses7-9
- § 7:3.1 : Requests for Production7-9
- [A] : The 2006 Amendments7-10
- [B] : Drafting the Request7-13
- § 7:3.2 : Responses7-15
- [A] : Applicable Rules7-15
- [B] : Best Practices7-19
- § 7:4 : Preemptive Court Access7-20
- § 7:4.1 : Amended Federal Rules7-20
- § 7:4.2 : Early Preservation Orders7-22
- § 7:4.3 : Letter Requests and Expedited Discovery7-27
- § 7:4.4 : Ex Parte Orders7-28
- § 7:5 : Cost-Shifting and Allocation7-30
- § 7:5.1 : Rule 267-30
- § 7:5.2 : The Zubulake and McPeek Tests7-32
- § 7:5.3 : Cost-Shifting Trends7-34
- § 7:5.4 : Award of Costs for E-Discovery Under Rule 54(d)(1) and 28 U.S.C. § 1920(4)7-38
- § 7:5.5 : Best Practices7-39
- § 7:6 : Privilege and Work Product Review7-41
- § 7:6.1 : Pre-Review Preparation7-43
- [A] : ESI Collection7-43
- [B] : Privilege Review Work Flow7-43
- § 7:6.2 : Defining the Privilege7-45
- [A] : Attorney-Client Privilege7-45
- [B] : Work Product Doctrine7-48
- § 7:6.3 : Privilege Log7-49
- § 7:6.4 : Waiver7-50
- § 7:7 : Form of Production7-53
- § 7:8 : Production of ESI to Multiple Parties, Including Public Entities7-55
- § 7:8.1 : Applicable Rules7-56
- § 7:8.2 : Risks7-57
- § 7:8.3 : Selective Waiver Doctrine7-59
- § 7:8.4 : Centralization and Continued Retention7-63
- § 7:8.5 : Production Protocol7-64
- § 7:9 : Expedited and Time-Sensitive Reviews7-65
- § 7:9.1 : Preliminary Assessment7-65
- § 7:9.2 : Selecting a Review Option7-66
- § 7:9.3 : Review Phase7-67
- [A] : Meet with Integrated Review Team7-67
- [B] : Meet with Electronic Vendor7-67
- [C] : Establish a Quality Control Procedure7-68
- § 7:9.4 : Production Phase7-68
|
|
Chapter 8: |
Third-Party Practice |
Therese Craparo ~ Mayer Brown Rowe & Maw LLP Andrew Calica ~ Mayer Brown Rowe & Maw Jarman D. Russell ~ Mayer Brown LLP |
|
- § 8:1 : Introduction8-2
- § 8:2 : Preservation Obligations of a Third Party8-3
- § 8:2.1 : The Obligation Is Limited8-3
- § 8:2.2 : Triggering the Obligation8-5
- § 8:2.3 : Scope of the Obligation8-6
- § 8:3 : Production Obligations of a Third Party8-8
- § 8:3.1 : Rule 45 and Requests for Production of ESI8-8
- § 8:3.2 : Third-Party Production of ESI and Cost-Shifting8-12
- § 8:4 : Lifting Legal Holds for Third-Party Subpoenas8-17
- § 8:5 : Best Practices8-19
- § 8:5.1 : Best Practices for Third Parties Subject to Subpoena8-19
- [A] : Consider Whether the Organization Will Become a Party to the Litigation8-19
- [B] : Raise Objections Quickly8-19
- [C] : Act Promptly to Comply with the Subpoena8-20
- [D] : Negotiate Limitations on Preservation and Production8-20
- [E] : Take Appropriate Steps to Lift Legal Holds Related to the Subpoena8-20
- § 8:5.2 : Best Practices for Party Requesting Documents from a Third Party8-20
- [A] : Use a Court Order to Preserve Documents8-20
- [B] : Negotiate Scope of a Request Before It Is Served8-21
- [C] : Draft Narrow Requests8-21
- [D] : Negotiate Limitations on Preservation and Production8-21
|
|
Chapter 9: |
Regulatory and Government Investigations and Actions |
Therese Craparo ~ Mayer Brown Rowe & Maw LLP Andrew Calica ~ Mayer Brown Rowe & Maw Michael E. Lackey, Jr. ~ Mayer Brown LLP Michelle N Webster ~ Mayer Brown LLP Patrick M. Kellermann ~ Mayer Brown LLP |
|
- § 9:1 : Introduction9-1
- § 9:2 : Preservation Obligations9-4
- § 9:2.1 : Criminal Penalties As a Means of Enforcement9-6
- § 9:2.2 : Record-Keeping Regulations As a Means of Enforcement9-7
- § 9:3 : Formulating a Preservation and Collection Plan9-11
- § 9:3.1 : Planning to Respond to a Government Subpoena9-12
- § 9:3.2 : Planning to Respond to a Second Request9-13
- § 9:4 : Meet-and-Confer Process9-14
- § 9:5 : Productions9-15
- § 9:6 : Lifting Legal Holds9-16
- § 9:7 : Development of a Discovery Protocol9-18
- § 9:8 : Criminal Investigations9-19
|
|
Chapter 10: |
Managing Spoilation Claims and Defenses |
Michael J Gill ~ Mayer Brown LLP Robert E. Entwisle ~ Mayer Brown LLP |
|
- § 10:1 : Introduction10-2
- § 10:2 : Legal Standards10-4
- § 10:2.1 : Court Authority to Impose Spoliation Sanctions10-4
- [A] : Federal Rules of Civil Procedure10-4
- [B] : Inherent Authority10-5
- [C] : Statutory Authority10-6
- § 10:2.2 : Due Process Limitations10-8
- § 10:2.3 : The Spoliation Standard10-9
- [A] : Culpability10-10
- [A][1] : Willful or Bad Faith Spoliation10-10
- [A][2] : Negligent Spoliation10-11
- [B] : Prejudice10-12
- [C] : Rule 37 Safe Harbor10-12
- § 10:3 : Prosecution of Spoliation Claims10-14
- § 10:3.1 : Potential Impact of Spoliation Claims10-14
- [A] : Tactical Effects10-14
- [B] : Spoliator’s Loss of Credibility10-15
- [C] : Sanctions10-16
- [C][1] : Monetary Sanctions10-17
- [C][1][a] : Fines10-18
- [C][1][b] : Fees10-19
- [C][1][c] : Cost-Shifting10-20
- [C][2] : Adverse Inference10-21
- [C][2][a] : Intent10-24
- [C][2][b] : Content10-26
- [C][3] : Striking Pleadings10-26
- [C][4] : Exclusion of Evidence10-27
- [C][5] : Loss of Attorney-Client Privilege or Work Product Protection10-28
- [C][6] : Dismissal or Default Judgment10-29
- § 10:3.2 : Discovery and Perfection of Spoliation Claims10-32
- [A] : First Day Letters10-32
- [B] : Court Orders and Preservation Statutes10-33
- [C] : Depositions and Third-Party Discovery10-34
- [D] : Experts10-36
- § 10:4 : Defending Spoliation Claims10-36
- § 10:4.1 : Scope of Preservation Obligation10-36
- [A] : Implementation of the Litigation Hold10-37
- [B] : Timing and Scope of the Litigation Hold10-38
- [B][1] : Audio Recordings10-39
- [B][2] : Metadata10-39
- [B][3] : Backup Tapes10-39
- § 10:4.2 : Traps for the Unwary Litigator10-40
- [A] : Work Product Protection10-40
- [B] : Automated Email Deletion10-41
- [C] : Ephemeral Storage Issues10-42
- [D] : “Control” over ESI10-43
- § 10:4.3 : Proper Documentation10-45
- § 10:5 : Expedited Access to Courts10-45
|
|
Chapter 11: |
Electronic Discovery in Specific Areas of Practice; And Chapter 11A: Arbitration; And Chapter 11B: The Next Generation of ESI: Social Media, Web-Based Collaboration Applications, Cloud Computing, and Mobile Technologies |
Sharon A Israel ~ Jenkens & Gilchrist Therese Craparo ~ Mayer Brown Rowe & Maw LLP Sarah Sterken Jackson ~ Mayer Brown LLP Michael E. Lackey, Jr. ~ Mayer Brown LLP Violeta I Balan ~ Mayer Brown LLP Justin Dillon ~ Mayer Brown LLP Menachem Hasofer ~ Mayer Brown JSM Kyle E. Friesen ~ Mayer Brown LLP Joseph Minta ~ Mayer Brown LLP |
|
- § 11:1 : Introduction11-2
- § 11:2 : Accountants’ Liability11-3
- § 11:2.1 : Nature of Discovery11-3
- § 11:2.2 : Relevant Data Sources11-3
- § 11:2.3 : Issues Regarding Preservation and Production11-4
- § 11:3 : Antitrust11-5
- § 11:3.1 : Nature of Discovery11-5
- § 11:3.2 : Relevant Data Sources11-6
- § 11:3.3 : Issues Regarding Preservation and Production11-6
- § 11:4 : Bankruptcy11-7
- § 11:4.1 : Nature of Discovery11-7
- § 11:4.2 : Relevant Data Sources11-8
- § 11:4.3 : Issues Regarding Preservation and Production11-9
- § 11:5 : Class Actions11-11
- § 11:5.1 : Nature of Discovery11-11
- § 11:5.2 : Relevant Data Sources11-12
- § 11:5.3 : Issues Regarding Preservation and Production11-12
- § 11:6 : Construction11-13
- § 11:6.1 : Nature of Discovery11-13
- § 11:6.2 : Relevant Data Sources11-13
- § 11:6.3 : Issues Regarding Preservation and Production11-14
- § 11:7 : Contracts11-14
- § 11:7.1 : Nature of Discovery11-14
- § 11:7.2 : Relevant Data Sources11-15
- § 11:7.3 : Issues Regarding Preservation and Production11-15
- § 11:8 : Divorce11-15
- § 11:8.1 : Nature of Discovery11-15
- § 11:8.2 : Relevant Data Sources11-16
- § 11:8.3 : Issues Regarding Preservation and Production11-17
- § 11:9 : Employment11-17
- § 11:9.1 : Nature of Discovery11-17
- § 11:9.2 : Relevant Data Sources11-18
- § 11:9.3 : Issues Regarding Preservation and Production11-19
- § 11:10 : Government Contracting11-21
- § 11:10.1 : Nature of Discovery11-21
- § 11:10.2 : Relevant Data Sources11-24
- § 11:10.3 : Issues Regarding Preservation and Production11-25
- § 11:11 : Intellectual Property11-25
- § 11:11.1 : Nature of Discovery11-25
- § 11:11.2 : Relevant Data Sources11-27
- § 11:11.3 : Issues Regarding Preservation and Production11-28
- § 11:12 : Pharmaceuticals11-31
- § 11:12.1 : Nature of Discovery11-31
- § 11:12.2 : Relevant Data Sources11-32
- § 11:12.3 : Issues Regarding Preservation and Production11-32
- [A] : Product Liability Cases11-32
- [B] : Patent and Regulatory Cases11-34
- § 11:13 : Product Liability11-34
- § 11:13.1 : Nature of Discovery11-34
- § 11:13.2 : Relevant Data Sources11-34
- § 11:13.3 : Issues Regarding Preservation and Production11-35
- § 11:14 : Securities11-35
- § 11:14.1 : Nature of Discovery11-35
- § 11:14.2 : Relevant Data Sources11-36
- § 11:14.3 : Issues Regarding Preservation and Production11-37
- § 11:15 : Tax11-37
- § 11:15.1 : Nature of Discovery11-37
- § 11:15.2 : Relevant Data Sources11-38
- § 11:15.3 : Issues Regarding Preservation and Production11-38
- § 11A:1 : Introduction11A-2
- § 11A:2 : Arbitral Institution Rules11A-2
- § 11A:2.1 : American Arbitration Association (AAA)11A-3
- [A] : Document Exchange11A-3
- [B] : Costs11A-4
- § 11A:2.2 : International Centre for Dispute Resolution (ICDR)11A-4
- [A] : Document Exchange11A-4
- [B] : Costs11A-5
- § 11A:2.3 : International Chamber of Commerce International Court of Arbitration (ICC)11A-5
- [A] : Document Exchange11A-5
- [B] : Costs11A-5
- § 11A:2.4 : London Court of International Arbitration (LCIA)11A-6
- [A] : Document Exchange11A-6
- [B] : Costs11A-6
- § 11A:2.5 : International Centre for Settlement of Investment Disputes (ICSID)11A-6
- [A] : Document Exchange11A-7
- [B] : Costs11A-7
- § 11A:3 : Arbitration Associations’ Guidelines11A-7
- § 11A:3.1 : International Bar Association (IBA)11A-7
- [A] : Document Exchange11A-8
- [B] : Costs11A-8
- § 11A:3.2 : Chartered Institute of Arbitrators (CIArb)11A-9
- [A] : Document Exchange11A-9
- [B] : Costs11A-9
- § 11A:3.3 : International Institute for Conflict Prevention and Resolution (CPR)11A-10
- [A] : Document Exchange11A-10
- [B] : Costs11A-11
- § 11A:3.4 : College of Commercial Arbitrators (CCA)11A-11
- [A] : Document Exchange11A-11
- [B] : Costs11A-12
- § 11A:4 : Best Practices11A-12
- § 11A:4.1 : Contracting11A-12
- § 11A:4.2 : When a Dispute Arises11A-13
- [A] : Notification of Arbitration11A-13
- [B] : Negotiations with Opposing Counsel11A-14
- [C] : Constitution of Arbitral Tribunal11A-15
- [D] : Prehearing Conference11A-16
- § 11A:4.3 : Disclosure11A-16
- § 11B:1 : Introduction11B-2
- § 11B:2 : Emerging Technologies at the Forefront of ESI11B-3
- § 11B:2.1 : Social Media and Video-Sharing Sites11B-3
- § 11B:2.2 : Web-Based Collaboration Applications11B-4
- § 11B:2.3 : Cloud Computing11B-5
- § 11B:2.4 : Mobile Technologies11B-7
- § 11B:3 : Emerging Technologies and Business Operations11B-8
- § 11B:3.1 : The Line Between Business and Personal Communications11B-8
- § 11B:3.2 : Evaluating the Business Need and Legal Implications11B-9
- [A] : Social Media11B-9
- [B] : Web-Based Collaboration Applications11B-10
- [C] : Cloud Computing11B-11
- [D] : Mobile Technologies11B-12
- § 11B:3.3 : Establishing Policies and Educating Employees11B-12
- § 11B:3.4 : Auditing Compliance and Reviewing Policies11B-13
- § 11B:4 : Emerging Technologies in Discovery11B-14
- § 11B:4.1 : Use of Data from Emerging Technologies in Litigation11B-14
- § 11B:4.2 : Applicable Statutes, Rules, and Regulations11B-17
- [A] : Electronic Communications Privacy Act11B-17
- [B] : Regulatory Guidance11B-19
- § 11B:4.3 : Possession, Custody, and Control11B-20
- [A] : Control of Data Hosted or Managed by Third Parties11B-20
- [B] : Shared Services and Affiliated Company Data11B-22
- § 11B:4.4 : Data Privacy11B-24
- § 11B:4.5 : Ethical Issues and Attorney-Client Privilege11B-25
- [A] : Factual Investigations11B-25
- [B] : Attorney-Client Privilege11B-25
- § 11B:5 : Best Practices for Managing Emerging Technologies in Discovery11B-26
- § 11B:5.1 : Develop Policies and Procedures Before Litigation Arises11B-26
- § 11B:5.2 : Consider Collection Options11B-27
- § 11B:5.3 : Negotiate with Third-Party Providers11B-28
- § 11B:5.4 : Consider Production Strategies11B-29
|
|
Chapter 12: |
International Issues |
Matthew Ingber ~ Mayer Brown LLP Mark C Hilgard ~ Mayer Brown LLP Joseph Baker ~ Mayer Brown LLP Menachem Hasofer ~ Mayer Brown JSM Edmund Sautter ~ Mayer Brown LLP |
|
- § 12:1 : Introduction12-4
- § 12:2 : International Electronic Discovery Issues from a U.S. Perspective12-4
- § 12:2.1 : Possession, Custody, or Control of ESI12-5
- [A] : General Standard12-5
- [B] : Standard for Companies with International Offices12-5
- [B][1] : Parent-Subsidiary12-6
- [B][2] : Other Relationships12-8
- § 12:2.2 : Is Release of ESI Blocked by Foreign Law?12-10
- [A] : Foreign Blocking Statutes and Data Protection and Privacy Laws12-10
- [B] : Resolution of Conflicts of Discovery Laws: Aerospatiale International Comity Factors12-11
- [C] : Additional Factors12-14
- [D] : Discovery Procedures: Hague Convention Versus Federal Rules12-16
- § 12:3 : Electronic Discovery in England and Wales12-17
- § 12:3.1 : Early Developments12-17
- § 12:3.2 : Civil Procedure Rules of 199912-18
- § 12:3.3 : Initial Recognition of Electronic Disclosure12-19
- § 12:3.4 : Practice Direction Paragraph 2A12-20
- § 12:3.5 : Case Law12-21
- § 12:3.6 : Practice Direction 31B12-25
- [A] : The Questionnaire12-26
- [B] : Proportionality12-26
- § 12:3.7 : Duty to Preserve ESI12-27
- § 12:3.8 : Sanctions12-29
- § 12:3.9 : Waiver12-31
- § 12:3.10 : Obtaining ESI from a Party in the U.K. for Use in U.S. Proceedings12-32
- § 12:4 : Electronic Discovery in Germany12-34
- § 12:4.1 : Introduction12-34
- § 12:4.2 : Obtaining Electronic Evidence Under German Law12-35
- [A] : Principle of Party Presentation12-35
- [B] : Introduction of Facts into the Court Proceeding12-35
- [C] : Scope of Evidence Taking12-36
- [D] : Evidence-Taking Procedure12-36
- [E] : Means to Obtain Evidence from the Adverse Party12-37
- [E][1] : Examination of the Adverse Party12-37
- [E][2] : Proof by Witness Testimony12-37
- [E][3] : Production of Documents in Possession of Adverse Party12-38
- [E][4] : Production of Documents in Possession of Third Party12-38
- [E][5] : Production of Electronically Stored Information12-39
- [F] : Enforcement Procedure12-40
- [F][1] : Disclosure Only If Claimant Has Substantive Claim12-40
- [F][1][a] : Principle of Good Faith12-40
- [F][1][b] : Obligation Annexed to Contract12-41
- [F][1][c] : Obligation of Equal Disclosure12-41
- [F][1][d] : Inspection of Documents12-41
- [F][1][e] : Right to Inventory12-42
- [F][1][f] : Assignment of Claims12-42
- [F][2] : Summary of Disclosure Requirements12-42
- [G] : Production of Documents upon Court’s Discretion12-42
- § 12:4.3 : Obtaining Evidence from Germany for U.S. Discovery Proceedings12-43
- [A] : The EU Situation: EC 1206/200112-43
- [B] : The Hague Convention12-44
- § 12:4.4 : Privileges and Exceptions to Disclosure12-47
- [A] : Correspondence Between a Party and Close Relatives12-48
- [B] : Attorney-Client Privilege Under German Law12-48
- [B][1] : Does the Attorney-Client Privilege Cover In-House Lawyers?12-50
- [B][2] : Confidentiality of Communication with In-House Lawyers in U.S. Discovery Proceedings12-53
- [C] : Business and Trade Secrets12-53
- [D] : Financial Loss; Disgrace or Self-Incrimination12-54
- § 12:5 : Electronic Discovery in the Hong Kong Special Administrative Region12-55
- § 12:5.1 : Introduction—The System of Law and Courts of the Hong Kong Special Administrative Region12-55
- [A] : “One Country, Two Systems”12-55
- [B] : Legal System12-56
- [C] : Courts12-56
- [D] : Arbitration12-57
- § 12:5.2 : Civil Justice Reforms in Hong Kong12-58
- [A] : Framework12-58
- [B] : Underlying Objectives and Case Management12-59
- [C] : ESI12-60
- § 12:5.3 : Definitions of “Document” in Hong Kong Law12-60
- § 12:5.4 : Scope of Relevance for Discovery12-61
- [A] : Automatic “General Discovery”12-61
- [B] : Peruvian Guano Test of Relevance12-61
- [C] : Discovery Reforms Canvassed During the CJR Consultation12-63
- § 12:5.5 : List of Documents, Verifying Affidavit and Orders Compelling Discovery12-64
- [A] : List of Documents12-64
- [B] : Verifying Affidavit12-64
- [C] : Order Compelling Filing and Sanctions for Non-Compliance12-65
- [D] : Difficulties in Filing the List of Documents and Verifying Affidavit12-66
- § 12:5.6 : Courts’ Power to Manage Cases by Limiting or Modifying Scope and Manner of Discovery12-67
- [A] : Existing Powers Under “Retained” RHC12-67
- [B] : Case Management Discovery Under CJR12-68
- [C] : Summary of Rules Applicable to Discovery of ESI Under CJR12-69
- § 12:5.7 : Duty to Preserve12-69
- § 12:5.8 : Sanctions for Failure to Preserve ESI12-70
- [A] : Destruction of ESI12-70
- [B] : Adverse Inferences12-71
- § 12:5.9 : Hong Kong Case Law on ESI12-71
- § 12:5.10 : Likely Developments Under CJR in Relation to E-Discovery12-73
- [A] : Case Management Summons and Conferences12-73
- [B] : Adopting Procedures from Other Jurisdictions12-74
- [B][1] : United States12-74
- [B][2] : England and Wales12-75
- [B][3] : Australia12-75
- [B][4] : Singapore12-76
- § 12:6 : Data Protection in Europe12-76
- § 12:6.1 : The Data Protection Directive12-76
- § 12:6.2 : Safe Harbor12-79
- § 12:6.3 : Transfer; Consent; Transfer Necessary for the Establishment, Exercise, or Defense of Legal Claims12-79
- § 12:7 : Data Protection in the United Kingdom12-81
- § 12:7.1 : Personal Data12-81
- § 12:7.2 : Export of Personal Data for Legal Proceedings12-81
- § 12:8 : German Federal Data Protection Act12-83
- § 12:8.1 : Personal Data12-83
- § 12:8.2 : Cross-Border Transfers of Personal Data12-85
- § 12:9 : European Data Protection and U.S. Discovery12-92
|
|
Chapter 13: |
Technology Considerations; And Appendix 13A: Metadata |
Anthony Reid ~ Deloitte & Touche LLP Bruce Hartley ~ Deloitte William Farwell ~ Deloitte Jeff Seymour ~ Deloitte |
|
- § 13:1 : Introduction13-2
- § 13:2 : Strategic Issues13-3
- § 13:2.1 : Continual Technology Developments13-3
- § 13:2.2 : Dealing with Metadata13-4
- § 13:2.3 : The Vendor Landscape13-5
- § 13:3 : Records and Information Management13-6
- § 13:3.1 : Challenges13-6
- § 13:3.2 : ERM/ECM Software Features13-8
- § 13:3.3 : Questions for ERM/ECM Software Vendors13-9
- § 13:4 : Defining the Scope of Electronic Discovery13-11
- § 13:4.1 : Challenges13-11
- § 13:4.2 : Typical Scope Limiters13-12
- [A] : Custodians (ESI Owners)13-12
- [B] : Media Purposes13-13
- [C] : Media Types13-13
- [D] : Data Types13-13
- [E] : Data Ownership13-14
- [F] : Time Frames13-14
- § 13:5 : Identification of Data13-14
- § 13:5.1 : Early Case Assessment (ECA)13-15
- § 13:5.2 : Challenges13-16
- § 13:6 : Preserving Data13-17
- § 13:6.1 : Collection As a Means of Preservation13-18
- § 13:6.2 : Challenges13-19
- § 13:7 : Collecting Data13-21
- § 13:7.1 : Challenges13-22
- § 13:7.2 : Making Collection Easier13-23
- [A] : Imaging13-23
- [B] : Archiving Collected Data13-24
- [C] : Voice Mail and Video13-24
- [D] : Chain of Custody13-24
- [E] : Filters13-24
- § 13:8 : Culling Data13-25
- § 13:9 : Processing Data13-25
- § 13:9.1 : Challenges13-26
- § 13:9.2 : Note on Searching13-26
- § 13:10 : Reviewing and Analyzing Data13-27
- § 13:10.1 : Challenges13-27
- § 13:11 : Producing Data13-28
- § 13:11.1 : Challenges13-29
- Appendix 13A : MetadataApp. 13A-1
|
|
Chapter 14: |
The Next Wave: Emerging Issues |
|
|
- § 14:1 : Introduction14-1
- § 14:2 : Discoverability14-2
- § 14:3 : Policies and Procedures14-5
- § 14:4 : Technology14-8
- § 14:5 : Automated Search Tools14-10
- § 14:6 : Counsel Responsibilities14-14
- § 14:7 : Disproportionate Review Costs14-17
|
|
Chapter 15: |
Table of Authorities |
|
|
|
Chapter 16: |
Index to Electronic Discovery Deskbook |
|
|