TreatiseTreatise

Electronic Discovery Deskbook (3rd Edition)

 by Mayer Brown LLP
 
 Copyright: 2016-2017
 Last Updated: November 2017

 Product Details >> 

Product Details

  • ISBN Number: 9781402427510
  • Page Count: 838
  • Number of Volumes: 1
  •  

The Electronic Discovery Deskbook guides attorneys through the legal, procedural, and technical challenges of e-discovery while reducing its costs and risks. The Deskbook helps attorneys to develop information and litigation management policies and procedures for the identification, preservation, collection, preparation and production of discoverable, electronically-stored information (ESI) in cost-effective, legally defensible ways.

Written by some of today’s leading e-discovery practitioners, Electronic Discovery Deskbook offers a bounty of useful tips, from how to deal with near-identical files when collecting ESI, to when it’s safe to lift litigation holds in connection with government investigations or actions. It provides advice about potential perils, including the hazards inherent in “clawback” agreements for privileged material, and alerts readers to vital trends, focusing on new technologies, new compliance demands, and new legal vulnerabilities for counsel.
  Table of Contents
  Foreword
Chapter 1: The 2006 and 2015 Amendments to the Federal Rules of Civil Procedure, the 2008 Amendments to the Federal Rules of Evidence, and the Sedona Principles
  • § 1:1 : Introduction1-2
  • § 1:2 : The 2015 E-Discovery Amendments1-6
    • § 1:2.1 : Background1-6
    • § 1:2.2 : Scope and Proportionality1-7
    • § 1:2.3 : Failure to Preserve ESI1-7
    • § 1:2.4 : Other Discovery Rules1-8
      • [A] : Early Permissible Document Requests1-8
      • [B] : Promotion of Early Case Management1-8
      • [C] : Objection with Specificity1-9
  • § 1:3 : The 2006 E-Discovery Amendments1-9
    • § 1:3.1 : Background1-9
    • § 1:3.2 : Preservation and the Amendments1-10
    • § 1:3.3 : Discovery of Electronically Stored Information1-12
    • § 1:3.4 : Scope of Party-Managed Discovery: Inaccessible Sources of Information1-14
    • § 1:3.5 : Discovery Management: Early Attention to Contentious Issues1-17
    • § 1:3.6 : Discovery Management: Forms and Formats of Production1-19
    • § 1:3.7 : Other Discovery Rules1-20
      • [A] : Initial Disclosures1-20
      • [B] : Clawback of Production of Privileged Communications or Trial Preparation Materials1-21
      • [C] : Responses to Interrogatories Based on Business Records1-22
      • [D] : Third-Party Practice1-22
  • § 1:4 : The 2008 and 2017 Evidence Amendments1-22
  • § 1:5 : E-Discovery in State Courts1-25
  • § 1:6 : Other E-Discovery Rules1-31
Chapter 2: Information Management Policies and Procedures
  • § 2:1 : Introduction2-3
  • § 2:2 : Managing Data Systems to Anticipate Litigation2-4
    • § 2:2.1 : Internal Witness Preparation2-4
      • [A] : Questions About Email Storage2-5
      • [B] : Questions About Laptops2-6
      • [C] : Questions About Desktops2-7
      • [D] : Questions About Procedures for Retaining Data for Departing Employees2-8
      • [E] : Questions About Records Management and Document Retention Policies2-8
      • [F] : Questions About Home Computers2-10
      • [G] : Questions About Portable Media2-10
      • [H] : Questions About Handheld Devices2-10
      • [I] : Questions About Internet and Intranet Usage and Social Media2-11
      • [J] : Questions About Web Meetings and Collaboration Tools2-12
      • [K] : Questions About Backup Systems2-12
      • [L] : Questions About Preservation2-14
      • [M] : Questions About Collection2-15
      • [N] : Questions About Group (Shared) Network Drives2-16
      • [O] : Questions About Structured Databases2-17
    • § 2:2.2 : Data Source Catalogs2-18
  • § 2:3 : Records Management Policy2-20
    • § 2:3.1 : Email and Other Communication2-20
    • § 2:3.2 : Disaster Recovery Data2-24
      • [A] : Implementing a Retention Plan2-26
      • [B] : Consideration of Relevant Regulations2-27
      • [C] : Regular Recycling and Destruction2-27
      • [D] : Dealing with Litigation Holds2-28
    • § 2:3.3 : Databases2-30
    • § 2:3.4 : Data Privacy2-31
  • § 2:4 : Remediation of Legacy Data2-33
    • § 2:4.1 : Nature of Legacy Data2-33
    • § 2:4.2 : Costs and Risks Associated with Legacy Data2-33
      • [A] : Costs and Risks of Storage and Data Management2-34
      • [B] : Costs and Risks of Disclosure2-34
      • [C] : Costs and Risks of Production2-35
    • § 2:4.3 : Remediation Prerequisites2-35
    • § 2:4.4 : Measuring Success of Remediation2-36
      • [A] : Litigation Holds Management System2-36
      • [B] : Legacy Data Maintenance2-36
    • § 2:4.5 : Remediation of Different Types of Data2-37
      • [A] : Centralized Data2-37
        • [A][1] : Matter-Specific Data2-37
        • [A][2] : Custodian-Level Data2-38
        • [A][3] : Organizational-Level Data2-38
        • [A][4] : Media-Level Data (Including Backup Tapes)2-38
      • [B] : Noncentralized Data2-39
    • § 2:4.6 : Legal Standard for Knowledge About Legacy Data2-39
    • § 2:4.7 : Remediation of Backup Tapes2-42
      • [A] : Objectives2-42
      • [B] : Steps2-43
        • [B][1] : Gather Information2-44
          • [B][1][a] : Tapes and Systems2-44
          • [B][1][b] : Holds2-45
        • [B][2] : Conduct a Backup Tape Sweep2-46
        • [B][3] : Create a Taxonomy of Backup Tapes and Holds2-46
        • [B][4] : Gather Information on Tape Use and Policies2-47
        • [B][5] : Exclusion and Inclusion of Tapes or Tape Sets2-47
        • [B][6] : Additional Inclusion and Exclusion Techniques2-48
      • [C] : Results of the Inclusion-and-Exclusion Process2-49
      • [D] : Resumption of Recycling of Daily Backup Tapes2-49
    • § 2:4.8 : Remediation of Accumulated Images of Hard Drives and Other Custodian-Level Data2-50
    • § 2:4.9 : Remediation of Legacy Data in Possession of Employees2-51
      • [A] : Challenges2-51
      • [B] : Approaches2-52
        • [B][1] : Centralization2-52
        • [B][2] : Data Remediation by Personnel2-53
        • [B][3] : Office-by-Office, Person-by-Person Remediation2-53
        • [B][4] : Exclusion of Personnel Data from Any Remediation Project2-54
  • § 2:5 : Trends2-54
    • § 2:5.1 : Managing Risks of Deletion of ESI2-54
    • § 2:5.2 : Requiring Investment in Technology2-58
    • § 2:5.3 : Internal Social Media Policies2-59
Chapter 3: Litigation Management Policies and Procedures
  • § 3:1 : Introduction3-2
  • § 3:2 : Legal Department Role3-2
    • § 3:2.1 : Overview3-2
    • § 3:2.2 : Managing Risk3-3
    • § 3:2.3 : Achieving a Reasonable, Good Faith Approach to Preservation3-6
  • § 3:3 : Corporate Policies3-7
    • § 3:3.1 : Confidential Information3-7
    • § 3:3.2 : Attorney-Client Privilege and Work Product Doctrine3-10
    • § 3:3.3 : Preservation3-12
    • § 3:3.4 : Collection3-13
    • § 3:3.5 : Review and Production3-14
  • § 3:4 : Litigation Holds3-16
    • § 3:4.1 : Timing3-17
    • § 3:4.2 : Process for Issuing a Hold3-18
    • § 3:4.3 : Scope of the Hold3-19
  • § 3:5 : Corporate Compliance3-20
    • § 3:5.1 : Employee Training3-20
    • § 3:5.2 : Monitoring and Updating3-21
    • § 3:5.3 : Integration of Outside Counsel and E-Discovery Vendors3-21
Chapter 4: Preservation Obligations
  • § 4:1 : Introduction4-4
  • § 4:2 : Boundaries of the Duty to Preserve4-4
    • § 4:2.1 : Triggering of Preservation Obligations4-5
      • [A] : Notice of the Duty to Preserve4-6
      • [B] : Reasonably Anticipated Future Litigation4-7
        • [B][1] : “Potential” Versus “Anticipated” Litigation4-7
        • [B][2] : Factors That May Trigger a Duty to Preserve4-10
          • [B][2][a] : Fear of Future Litigation4-10
          • [B][2][b] : Retention of Counsel or Other Experts4-11
          • [B][2][c] : Notice of Conduct Underlying a Potential Claim4-12
          • [B][2][d] : Litigation Has Become Commonplace Under Similar Circumstances4-13
      • [C] : Best Practices for Determining the Triggering of an Obligation4-14
        • [C][1] : Develop Information About the Organization’s Exposure to Typical Triggering Events4-15
        • [C][2] : Develop a Process for the Notification of In-House Counsel of Triggering Events4-15
        • [C][3] : Take Steps to Analyze Costs and Risks to Organization4-15
    • § 4:2.2 : Scope of Preservation Obligations4-16
      • [A] : Types of ESI That Must Be Preserved4-18
      • [B] : Identifying Sources of ESI Likely to Contain Discoverable Information4-22
        • [B][1] : Accessible Versus Inaccessible Data4-24
        • [B][2] : Routine Operations4-28
        • [B][3] : Email4-30
        • [B][4] : Handheld Devices4-31
        • [B][5] : Websites4-32
        • [B][6] : Group/Shared Drives4-32
        • [B][7] : Determining Key Players and Relevant Time Frames4-33
        • [B][8] : Former Employees4-34
        • [B][9] : Custodians’ Personal Data4-35
        • [B][10] : Data Sources Frequently Relevant in Similar Litigations4-36
      • [C] : Raising Preservation Issues4-38
    • § 4:2.3 : Search Technology4-39
    • § 4:2.4 : Form of Preservation4-40
    • § 4:2.5 : Methods of Preservation4-43
      • [A] : Manual Copy4-44
      • [B] : Active Data Copy4-44
      • [C] : Forensic Image Process4-44
      • [D] : End-User-Driven Process4-45
      • [E] : Supervised Tape Archive Process4-45
      • [F] : Records Management4-46
      • [G] : Individual Computer Backup4-46
  • § 4:3 : Types of ESI4-46
    • § 4:3.1 : Voice Mail4-46
      • [A] : Discoverability4-46
      • [B] : Best Practices for Preservation4-48
    • § 4:3.2 : Instant Messaging4-48
      • [A] : What Is Instant Messaging?4-48
      • [B] : How Does Instant Messaging Work?4-50
      • [C] : Expansion into the Corporate World4-50
      • [D] : Treatment of Instant Messaging in Discovery4-51
        • [D][1] : Discoverability4-51
        • [D][2] : Duty to Preserve4-52
        • [D][3] : Regulatory Guidance4-54
        • [D][4] : Practical Considerations4-55
      • [E] : Best Practices for Preserving Instant Messages4-55
        • [E][1] : Evaluate Need for an IM System4-55
        • [E][2] : Install Corporate IM System and Prohibit Use of Public IM4-55
        • [E][3] : Establish a General IM Policy4-56
    • § 4:3.3 : Backup Media4-56
      • [A] : The Nature of Backup Tapes and Their Limitations in Discovery4-57
      • [B] : Duty to Preserve4-60
        • [B][1] : Common Law Preservation Obligation4-60
        • [B][2] : Application of Preservation Duty to Backup Tapes4-60
      • [C] : Best Practices for Preserving Backup Media4-65
        • [C][1] : Obtain Comprehensive Understanding of Disaster Recovery Systems4-65
        • [C][2] : Develop Policies and Procedures for Backup Media, Including Preservation Guidelines4-65
        • [C][3] : Object to, and Consult About, Preservation of Backup Data As Soon As Practicable4-66
        • [C][4] : Develop Standard Disclosure Documents4-66
    • § 4:3.4 : Hard Drives and Images of Hard Drives4-67
      • [A] : Mirror Imaging4-67
      • [B] : Demands for Mirror Imaging4-68
      • [C] : Best Practices4-70
        • [C][1] : Develop and Follow Guidelines for When to Preserve Hard Drives or Take Images4-70
        • [C][2] : Develop a Process for Managing Hard Drives and Images4-71
    • § 4:3.5 : Data in Dynamic or Transitory Systems4-71
      • [A] : Preserving Dynamic Data4-71
      • [B] : Best Practices4-72
        • [B][1] : Obtain Comprehensive Understanding of Relevant Systems4-72
        • [B][2] : Develop and Follow Guidelines for When to Preserve Data4-72
        • [B][3] : Deal with the Preservation of Data from Dynamic and Transitory Systems As Soon As Practicable4-73
        • [B][4] : Develop Standard Disclosure Documents Regarding Data from Dynamic and Transitory Systems4-73
    • § 4:3.6 : Legacy Data4-74
      • [A] : Preservation4-74
      • [B] : Best Practices4-74
    • § 4:3.7 : Emerging Technologies: Social Networking and Other Web-Based Technologies4-75
      • [A] : The Next Generation of ESI4-75
      • [B] : Examples of Emerging Technologies4-75
        • [B][1] : Social Networking and Video-Sharing Sites4-75
        • [B][2] : Web-Based Collaboration Applications4-76
        • [B][3] : Cloud Computing4-77
      • [C] : Emerging Technologies in Discovery4-78
      • [D] : Best Practices for Preservation4-78
        • [D][1] : Understand How Emerging Technologies Are Used4-79
        • [D][2] : Evaluate the Business Need4-79
        • [D][3] : Educate Employees4-79
        • [D][4] : Establish Policies Regarding the Use of Web-Based Technologies4-79
        • [D][5] : Include Emerging Technologies in Legal Hold Notices4-79
        • [D][6] : Negotiate Contractual Agreements with Cloud Computing Providers4-80
        • [D][7] : Develop Procedures for Capturing Web-Based or Third-Party Hosted Data4-80
        • [D][8] : Audit Compliance with Policies4-80
  • § 4:4 : Legal Holds4-81
    • § 4:4.1 : Executing Legal Holds4-81
      • [A] : Contents of Preservation Notice4-83
      • [B] : Recipients of Preservation Notice4-84
      • [C] : Auditing Compliance with Preservation Notice4-86
      • [D] : Best Practices4-87
    • § 4:4.2 : Evergreen Holds4-88
      • [A] : Determining Whether an Evergreen Hold Is Necessary4-88
      • [B] : Best Practices4-89
    • § 4:4.3 : Lifting Legal Holds4-90
      • [A] : Termination When Matter Is Ultimately Concluded4-90
      • [B] : Changes in Scope of the Legal Hold4-91
      • [C] : Additional Considerations4-92
Chapter 5: Managing the Meet-and-Confer Process
  • § 5:1 : Introduction5-1
  • § 5:2 : Responsibilities of Counsel5-4
    • § 5:2.1 : Outside Counsel’s Responsibility5-4
    • § 5:2.2 : Relationship Between In-House and Outside Counsel5-9
    • § 5:2.3 : Best Practices in Preparing for a Meet and Confer5-11
  • § 5:3 : Key Issues for Discussion5-14
    • § 5:3.1 : Use of Search Terms and Advanced Search Technology5-17
    • § 5:3.2 : Privilege Protocols5-20
      • [A] : Clawback Agreements5-24
      • [B] : Quick-Peek Agreements5-24
      • [C] : Use of Search Terms or Data Analytics5-25
      • [D] : Privilege Logs5-25
        • [A] : Privilege and Metadata Review5-29
    • § 5:3.3 : Form of Production5-30
    • § 5:3.4 : Preservation5-34
    • § 5:3.5 : Metadata5-39
  • § 5:4 : Direct Access5-43
  • § 5:5 : Identification Requirements5-47
  • § 5:6 : Inaccessible Sources5-49
  • § 5:7 : Initial Disclosures5-53
Chapter 6: Collection of Electronically Stored Information
  • § 6:1 : Introduction6-2
  • § 6:2 : Legal Requirements6-2
    • § 6:2.1 : Meeting Discovery Obligations6-3
    • § 6:2.2 : Overcoming Claims of Under-Collection6-6
    • § 6:2.3 : Ensuring the Admissibility of Collected ESI6-8
  • § 6:3 : Overview of the Collection Process6-10
    • § 6:3.1 : Who Should Collect?6-11
    • § 6:3.2 : What Should Be Collected?6-11
    • § 6:3.3 : When Should Collection Occur?6-12
    • § 6:3.4 : Where Should the Collection Team Look for Relevant ESI?6-13
  • § 6:4 : Basic Collection Process6-14
    • § 6:4.1 : Locating Relevant Files6-14
      • [A] : Overview of Automated Search Methods6-17
      • [B] : Choosing a Search Method6-18
      • [C] : Designing the Query6-20
    • § 6:4.2 : Common Data Types6-22
      • [A] : Basic Data Files6-22
      • [B] : Email Journaling6-22
      • [C] : Instant Message Logging6-23
      • [D] : Application Metadata and Version Control6-24
      • [E] : Databases6-24
    • § 6:4.3 : Handling Identical and Distinct Files6-27
    • § 6:4.4 : Storing Collected ESI6-28
  • § 6:5 : Challenges to Collection6-29
    • § 6:5.1 : Privacy Concerns6-29
    • § 6:5.2 : Reasonable Accessibility6-31
      • [A] : Active, Online Data6-33
      • [B] : Near-Line Data6-35
      • [C] : Offline Storage and Archives6-36
      • [D] : Backup Tapes6-37
      • [E] : Erased, Fragmented, or Damaged Data6-39
    • § 6:5.3 : Unsearchable Data6-41
      • [A] : Nontextual Data6-42
      • [B] : Unknown and Unsupported File Types6-43
      • [C] : Compressed and Encrypted Files6-44
      • [D] : Corrupt Files6-44
Chapter 7: Review and Production of Electronically Stored Information
  • § 7:1 : Introduction7-2
  • § 7:2 : Review Application Options7-3
    • § 7:2.1 : Pre-Review Considerations7-3
    • § 7:2.2 : Selecting a Review Tool7-4
    • § 7:2.3 : Technology-Assisted Review and Predictive Coding7-5
    • § 7:2.4 : Managing Costs7-8
  • § 7:3 : Requests for Production and Responses7-11
    • § 7:3.1 : Requests for Production7-11
      • [A] : The 2006 Amendments7-12
      • [B] : The 2015 Amendments7-14
      • [C] : Drafting the Request7-15
    • § 7:3.2 : Responses7-17
      • [A] : Applicable Rules7-17
      • [B] : Best Practices7-22
  • § 7:4 : Preemptive Court Access7-23
    • § 7:4.1 : The Federal Rules7-23
    • § 7:4.2 : Early Preservation Orders7-25
    • § 7:4.3 : Letter Requests and Expedited Discovery7-30
    • § 7:4.4 : Ex Parte Orders7-31
  • § 7:5 : Cost-Shifting and Allocation7-33
    • § 7:5.1 : Rule 267-33
    • § 7:5.2 : The Zubulake and McPeek Tests7-34
    • § 7:5.3 : Cost-Shifting Trends7-36
    • § 7:5.4 : Award of Costs for E-Discovery Under Rule 54(d)(1) and 28 U.S.C. § 1920(4)7-40
    • § 7:5.5 : Best Practices7-42
  • § 7:6 : Privilege and Work Product Review7-44
    • § 7:6.1 : Pre-Review Preparation7-45
      • [A] : ESI Collection7-46
      • [B] : Privilege Review Work Flow7-46
    • § 7:6.2 : Defining the Privilege7-48
      • [A] : Attorney-Client Privilege7-48
      • [B] : Work Product Doctrine7-51
    • § 7:6.3 : Privilege Log7-51
    • § 7:6.4 : Waiver7-53
  • § 7:7 : Form of Production7-56
  • § 7:8 : Production of ESI to Multiple Parties, Including Public Entities7-59
    • § 7:8.1 : Applicable Rules7-59
    • § 7:8.2 : Risks7-60
    • § 7:8.3 : Selective Waiver Doctrine7-62
    • § 7:8.4 : Centralization and Continued Retention7-67
    • § 7:8.5 : Production Protocol7-68
  • § 7:9 : Expedited and Time-Sensitive Reviews7-69
    • § 7:9.1 : Preliminary Assessment7-69
    • § 7:9.2 : Selecting a Review Option7-70
    • § 7:9.3 : Review Phase7-70
      • [A] : Meet with Integrated Review Team7-70
      • [B] : Meet with Electronic Vendor7-71
      • [C] : Establish a Quality Control Procedure7-71
    • § 7:9.4 : Production Phase7-72
Chapter 8: Third-Party Practice
  • § 8:1 : Introduction8-2
  • § 8:2 : Preservation Obligations of a Third Party8-3
    • § 8:2.1 : The Obligation Is Limited8-3
    • § 8:2.2 : Triggering the Obligation8-5
    • § 8:2.3 : Scope of the Obligation8-6
  • § 8:3 : Production Obligations of a Third Party8-8
    • § 8:3.1 : Rule 45 and Requests for Production of ESI8-8
    • § 8:3.2 : Third-Party Production of ESI and Cost-Shifting8-13
  • § 8:4 : Lifting Legal Holds for Third-Party Subpoenas8-17
  • § 8:5 : Best Practices8-19
    • § 8:5.1 : Best Practices for Third Parties Subject to Subpoena8-19
      • [A] : Consider Whether the Organization Will Become a Party to the Litigation8-19
      • [B] : Raise Objections Quickly8-19
      • [C] : Act Promptly to Comply with the Subpoena8-20
      • [D] : Negotiate Limitations on Preservation and Production8-20
      • [E] : Take Appropriate Steps to Lift Legal Holds Related to the Subpoena8-20
    • § 8:5.2 : Best Practices for Party Requesting Documents from a Third Party8-21
      • [A] : Use a Court Order to Preserve Documents8-21
      • [B] : Do Basic Homework to Narrow Objections Before You Draft Your Requests8-21
      • [C] : Draft Narrow Requests8-21
      • [D] : Negotiate Limitations on Preservation and Production8-21
Chapter 9: Regulatory and Government Investigations and Actions
  • § 9:1 : Introduction9-1
  • § 9:2 : Preservation Obligations9-4
    • § 9:2.1 : Criminal Penalties As a Means of Enforcement9-6
    • § 9:2.2 : Record-Keeping Regulations As a Means of Enforcement9-7
  • § 9:3 : Formulating a Preservation and Collection Plan9-11
    • § 9:3.1 : Planning to Respond to a Government Subpoena9-13
    • § 9:3.2 : Planning to Respond to a Second Request9-13
  • § 9:4 : Meet-and-Confer Process9-14
  • § 9:5 : Productions9-15
  • § 9:6 : Lifting Legal Holds9-16
  • § 9:7 : Development of a Discovery Protocol9-19
  • § 9:8 : Criminal Investigations9-20
Chapter 10: Managing Spoliation Claims and Defenses
  • § 10:1 : Introduction10-2
  • § 10:2 : Legal Standards10-4
    • § 10:2.1 : Court Authority to Impose Spoliation Sanctions10-4
      • [A] : Federal Rules of Civil Procedure10-4
      • [B] : Inherent Authority10-6
      • [C] : Statutory Authority10-7
    • § 10:2.2 : Due Process Limitations10-9
    • § 10:2.3 : The Spoliation Standard10-10
      • [A] : Culpability10-12
        • [A][1] : Willful or Bad-Faith Spoliation10-12
        • [A][2] : Negligent Spoliation10-13
      • [B] : Prejudice10-13
  • § 10:3 : Prosecution of Spoliation Claims10-14
    • § 10:3.1 : Potential Impact of Spoliation Claims10-14
      • [A] : Tactical Effects10-14
      • [B] : Spoliator’s Loss of Credibility10-15
      • [C] : Sanctions10-17
        • [C][1] : Monetary Sanctions10-17
          • [C][1][a] : Fines10-18
          • [C][1][b] : Fees10-19
          • [C][1][c] : Cost-Shifting10-20
        • [C][2] : Adverse Inference10-21
          • [C][2][a] : Intent10-24
          • [C][2][b] : Content10-27
        • [C][3] : Striking Pleadings10-27
        • [C][4] : Exclusion of Evidence10-28
        • [C][5] : Loss of Attorney-Client Privilege or Work Product Protection10-29
        • [C][6] : Dismissal or Default Judgment10-30
    • § 10:3.2 : Discovery and Perfection of Spoliation Claims10-32
      • [A] : Court Orders and Preservation Statutes10-32
      • [B] : Depositions and Third-Party Discovery10-34
      • [C] : Experts10-35
  • § 10:4 : Defending Spoliation Claims10-36
    • § 10:4.1 : Scope of Preservation Obligation10-36
      • [A] : Implementation of the Litigation Hold10-36
      • [B] : Timing and Scope of the Litigation Hold10-38
        • [B][1] : Audio Recordings10-38
        • [B][2] : Metadata10-39
        • [B][3] : Backup Tapes10-39
    • § 10:4.2 : Traps for the Unwary Litigator10-40
      • [A] : Work Product Protection10-40
      • [B] : Automated Email Deletion10-41
      • [C] : Ephemeral Storage Issues10-41
      • [D] : “Control” over ESI10-43
    • § 10:4.3 : Proper Documentation10-44
  • § 10:5 : Expedited Access to Courts10-45
Chapter 11: Electronic Discovery in Specific Areas of Practice
  • § 11:1 : Introduction11-2
  • § 11:2 : Accountants’ Liability11-3
    • § 11:2.1 : Nature of Discovery11-3
    • § 11:2.2 : Relevant Data Sources11-3
    • § 11:2.3 : Issues Regarding Preservation and Production11-4
  • § 11:3 : Antitrust11-5
    • § 11:3.1 : Nature of Discovery11-5
    • § 11:3.2 : Relevant Data Sources11-6
    • § 11:3.3 : Issues Regarding Preservation and Production11-6
  • § 11:4 : Bankruptcy11-7
    • § 11:4.1 : Nature of Discovery11-7
    • § 11:4.2 : Relevant Data Sources11-8
    • § 11:4.3 : Issues Regarding Preservation and Production11-9
  • § 11:5 : Class Actions11-11
    • § 11:5.1 : Nature of Discovery11-11
    • § 11:5.2 : Relevant Data Sources11-12
    • § 11:5.3 : Issues Regarding Preservation and Production11-12
  • § 11:6 : Construction11-13
    • § 11:6.1 : Nature of Discovery11-13
    • § 11:6.2 : Relevant Data Sources11-13
    • § 11:6.3 : Issues Regarding Preservation and Production11-14
  • § 11:7 : Contracts11-14
    • § 11:7.1 : Nature of Discovery11-14
    • § 11:7.2 : Relevant Data Sources11-15
    • § 11:7.3 : Issues Regarding Preservation and Production11-15
  • § 11:8 : Divorce11-16
    • § 11:8.1 : Nature of Discovery11-16
    • § 11:8.2 : Relevant Data Sources11-16
    • § 11:8.3 : Issues Regarding Preservation and Production11-17
  • § 11:9 : Employment11-17
    • § 11:9.1 : Nature of Discovery11-17
    • § 11:9.2 : Relevant Data Sources11-18
    • § 11:9.3 : Issues Regarding Preservation and Production11-19
  • § 11:10 : Government Contracting11-21
    • § 11:10.1 : Nature of Discovery11-21
    • § 11:10.2 : Relevant Data Sources11-24
    • § 11:10.3 : Issues Regarding Preservation and Production11-25
  • § 11:11 : Intellectual Property11-25
    • § 11:11.1 : Nature of Discovery11-25
    • § 11:11.2 : Relevant Data Sources11-28
    • § 11:11.3 : Issues Regarding Preservation and Production11-29
  • § 11:12 : Pharmaceuticals11-34
    • § 11:12.1 : Nature of Discovery11-34
    • § 11:12.2 : Relevant Data Sources11-34
    • § 11:12.3 : Issues Regarding Preservation and Production11-35
      • [A] : Product Liability Cases11-35
      • [B] : Patent and Regulatory Cases11-36
  • § 11:13 : Product Liability11-37
    • § 11:13.1 : Nature of Discovery11-37
    • § 11:13.2 : Relevant Data Sources11-37
    • § 11:13.3 : Issues Regarding Preservation and Production11-37
  • § 11:14 : Securities11-38
    • § 11:14.1 : Nature of Discovery11-38
    • § 11:14.2 : Relevant Data Sources11-38
    • § 11:14.3 : Issues Regarding Preservation and Production11-39
  • § 11:15 : Tax11-40
    • § 11:15.1 : Nature of Discovery11-40
    • § 11:15.2 : Relevant Data Sources11-40
    • § 11:15.3 : Issues Regarding Preservation and Production11-41
Chapter 12: Arbitration
  • § 12:1 : Introduction12-2
  • § 12:2 : Arbitral Institution Rules12-2
    • § 12:2.1 : American Arbitration Association (AAA)12-3
      • [A] : Document Exchange12-4
      • [B] : Costs12-4
    • § 12:2.2 : International Centre for Dispute Resolution (ICDR)12-5
      • [A] : Document Exchange12-5
      • [B] : Costs12-5
    • § 12:2.3 : International Chamber of Commerce International Court of Arbitration (ICC)12-6
      • [A] : Document Exchange12-6
      • [B] : Costs12-6
    • § 12:2.4 : London Court of International Arbitration (LCIA)12-7
      • [A] : Document Exchange12-7
      • [B] : Costs12-7
    • § 12:2.5 : International Centre for Settlement of Investment Disputes (ICSID)12-7
      • [A] : Document Exchange12-8
      • [B] : Costs12-8
  • § 12:3 : Arbitration Associations’ Guidelines12-8
    • § 12:3.1 : International Bar Association (IBA)12-8
      • [A] : Document Exchange12-9
      • [B] : Costs12-9
    • § 12:3.2 : Chartered Institute of Arbitrators (CIArb)12-10
      • [A] : Document Exchange12-10
      • [B] : Costs12-10
    • § 12:3.3 : International Institute for Conflict Prevention and Resolution (CPR)12-11
      • [A] : Document Exchange12-11
      • [B] : Costs12-12
    • § 12:3.4 : College of Commercial Arbitrators (CCA)12-12
      • [A] : Document Exchange12-13
      • [B] : Costs12-13
  • § 12:4 : Best Practices12-13
    • § 12:4.1 : Contracting12-13
    • § 12:4.2 : When a Dispute Arises12-14
      • [A] : Notification of Arbitration12-14
      • [B] : Negotiations with Opposing Counsel12-16
      • [C] : Constitution of Arbitral Tribunal12-17
      • [D] : Prehearing Conference12-17
    • § 12:4.3 : Disclosure12-17
Chapter 13: The Next Generation of ESI: Social Media, Web-Based Collaboration Applications, Cloud Computing, and Mobile Technologies
  • § 13:1 : Introduction13-2
  • § 13:2 : Emerging Technologies at the Forefront of ESI13-3
    • § 13:2.1 : Social Media and Video-Sharing Sites13-3
    • § 13:2.2 : Web-Based Collaboration Applications13-4
    • § 13:2.3 : Cloud Computing13-5
    • § 13:2.4 : Mobile Technologies13-7
  • § 13:3 : Emerging Technologies and Business Operations13-8
    • § 13:3.1 : The Line Between Business and Personal Communications13-8
    • § 13:3.2 : Evaluating the Business Need and Legal Implications13-9
      • [A] : Social Media13-9
      • [B] : Web-Based Collaboration Applications13-11
      • [C] : Cloud Computing13-11
      • [D] : Mobile and Wearable Technologies13-12
    • § 13:3.3 : Establishing Policies and Educating Employees13-13
    • § 13:3.4 : Auditing Compliance and Reviewing Policies13-14
  • § 13:4 : Emerging Technologies in Discovery13-14
    • § 13:4.1 : Use of Data from Emerging Technologies in Litigation13-14
    • § 13:4.2 : Applicable Statutes, Rules, and Regulations13-18
      • [A] : Electronic Communications Privacy Act13-18
      • [B] : Regulatory Guidance13-20
    • § 13:4.3 : Possession, Custody, and Control13-21
      • [A] : Control of Data Hosted or Managed by Third Parties13-22
      • [B] : Shared Services and Affiliated Company Data13-24
    • § 13:4.4 : Data Privacy13-25
    • § 13:4.5 : Ethical Issues and Attorney-Client Privilege13-26
      • [A] : Factual Investigations13-26
      • [B] : Attorney-Client Privilege13-27
  • § 13:5 : Best Practices for Managing Emerging Technologies in Discovery13-28
    • § 13:5.1 : Develop Policies and Procedures Before Litigation Arises13-28
    • § 13:5.2 : Consider Collection Options13-29
    • § 13:5.3 : Negotiate with Third-Party Providers13-30
    • § 13:5.4 : Consider Production Strategies13-31
Chapter 14: International Issues
  • § 14:1 : Introduction14-4
  • § 14:2 : International Electronic Discovery Issues from a U.S. Perspective14-4
    • § 14:2.1 : Possession, Custody, or Control of ESI14-5
      • [A] : General Standard14-5
      • [B] : Standard for Companies with International Offices14-6
        • [B][1] : Parent-Subsidiary14-6
        • [B][2] : Other Relationships14-9
    • § 14:2.2 : Is Release of ESI Blocked by Foreign Law?14-10
      • [A] : Foreign Blocking Statutes and Data Protection and Privacy Laws14-10
      • [B] : Resolution of Conflicts of Discovery Laws: Aerospatiale International Comity Factors14-12
      • [C] : Additional Factors14-14
      • [D] : Discovery Procedures: Hague Convention Versus Federal Rules14-16
  • § 14:3 : Electronic Discovery in England and Wales14-17
    • § 14:3.1 : Early Developments14-17
    • § 14:3.2 : Civil Procedure Rules of 199914-18
    • § 14:3.3 : Initial Recognition of Electronic Disclosure14-19
    • § 14:3.4 : Practice Direction Paragraph 2A14-20
    • § 14:3.5 : Case Law14-21
    • § 14:3.6 : Practice Direction 31B14-25
      • [A] : The Questionnaire14-26
      • [B] : Proportionality14-26
    • § 14:3.7 : Duty to Preserve ESI14-27
    • § 14:3.8 : Sanctions14-29
    • § 14:3.9 : Waiver14-31
    • § 14:3.10 : Obtaining ESI from a Party in the U.K. for Use in U.S. Proceedings14-33
  • § 14:4 : Electronic Discovery in Germany14-35
    • § 14:4.1 : Introduction14-35
    • § 14:4.2 : Obtaining Electronic Evidence Under German Law14-35
      • [A] : Principle of Party Presentation14-35
      • [B] : Introduction of Facts into the Court Proceeding14-36
      • [C] : Scope of Evidence Taking14-36
      • [D] : Evidence-Taking Procedure14-37
      • [E] : Means to Obtain Evidence from the Adverse Party14-37
        • [E][1] : Examination of the Adverse Party14-37
        • [E][2] : Proof by Witness Testimony14-38
        • [E][3] : Production of Documents in Possession of Adverse Party14-38
        • [E][4] : Production of Documents in Possession of Third Party14-39
        • [E][5] : Production of Electronically Stored Information14-39
      • [F] : Enforcement Procedure14-40
        • [F][1] : Disclosure Only If Claimant Has Substantive Claim14-41
          • [F][1][a] : Principle of Good Faith14-41
          • [F][1][b] : Obligation Annexed to Contract14-41
          • [F][1][c] : Obligation of Equal Disclosure14-41
          • [F][1][d] : Inspection of Documents14-42
          • [F][1][e] : Right to Inventory14-42
          • [F][1][f] : Assignment of Claims14-42
        • [F][2] : Summary of Disclosure Requirements14-43
      • [G] : Production of Documents upon Court’s Discretion14-43
    • § 14:4.3 : Obtaining Evidence from Germany for U.S. Discovery Proceedings14-44
      • [A] : The EU Situation: EC 1206/200114-44
      • [B] : The Hague Convention14-45
    • § 14:4.4 : Privileges and Exceptions to Disclosure14-48
      • [A] : Correspondence Between a Party and Close Relatives14-49
      • [B] : Attorney-Client Privilege Under German Law14-49
        • [B][1] : Does the Attorney-Client Privilege Cover In-House Lawyers?14-51
        • [B][2] : Confidentiality of Communication with In-House Lawyers in U.S. Discovery Proceedings14-53
      • [C] : Business and Trade Secrets14-54
      • [D] : Financial Loss; Disgrace or Self-Incrimination14-55
  • § 14:5 : Electronic Discovery in the Hong Kong Special Administrative Region14-56
    • § 14:5.1 : Introduction—The System of Law and Courts of the Hong Kong Special Administrative Region14-56
      • [A] : “One Country, Two Systems”14-56
      • [B] : Legal System14-57
      • [C] : Courts14-57
      • [D] : Arbitration14-58
    • § 14:5.2 : Civil Justice Reforms in Hong Kong14-59
      • [A] : Framework14-59
      • [B] : Underlying Objectives and Case Management14-59
      • [C] : Practice Direction SL1.214-61
      • [D] : ESI14-62
    • § 14:5.3 : Definitions of “Document” in Hong Kong Law14-62
    • § 14:5.4 : Scope of Relevance for Discovery14-63
      • [A] : Automatic “General Discovery”14-63
      • [B] : Peruvian Guano Test of Relevance14-63
      • [C] : Discovery Reforms Canvassed During the CJR Consultation14-65
      • [D] : Discovery of Electronic Documents Under the E-Discovery Practice Direction14-66
    • § 14:5.5 : List of Documents, Verifying Affidavit and Orders Compelling Discovery14-67
      • [A] : List of Documents14-67
      • [B] : Verifying Affidavit14-68
      • [C] : Order Compelling Filing and Sanctions for Non-Compliance14-68
      • [D] : Difficulties in Filing the List of Documents and Verifying Affidavit14-69
      • [E] : Changes in the Manner of Discovering Electronic Documents Under the E-Discovery Practice Direction14-70
    • § 14:5.6 : Courts’ Power to Manage Cases by Limiting or Modifying Scope and Manner of Discovery14-73
      • [A] : Existing Powers Under “Retained” RHC14-73
      • [B] : Case Management Discovery Under CJR14-74
      • [C] : Summary of Rules Applicable to Discovery of ESI Under CJR and the Development of the E-Discovery Practice Direction14-76
    • § 14:5.7 : Duty to Preserve14-76
    • § 14:5.8 : Sanctions for Failure to Preserve ESI14-77
      • [A] : Destruction of ESI14-77
      • [B] : Adverse Inferences14-78
    • § 14:5.9 : Hong Kong Case Law on ESI14-78
      • [A] : Cases Before the Introduction of the E-Discovery Practice Direction14-78
      • [B] : Case Law on the E-Discovery Practice Direction14-80
    • § 14:5.10 : Likely Future Developments in Relation to E-Discovery14-83
      • [A] : Case Management Summons and Conferences14-83
      • [B] : Adopting Procedures from Other Jurisdictions14-83
        • [B][1] : United States14-83
        • [B][2] : England and Wales14-84
        • [B][3] : Australia14-84
        • [B][4] : Singapore14-85
  • § 14:6 : Data Protection in Europe14-86
    • § 14:6.1 : The Data Protection Directive14-86
    • § 14:6.2 : Safe Harbor and Privacy Shield14-88
    • § 14:6.3 : Transfer; Consent; Transfer Necessary for the Establishment, Exercise, or Defense of Legal Claims14-89
  • § 14:7 : Data Protection in the United Kingdom14-90
    • § 14:7.1 : Personal Data14-90
    • § 14:7.2 : Export of Personal Data for Legal Proceedings14-91
  • § 14:8 : German Federal Data Protection Act14-93
    • § 14:8.1 : Personal Data14-93
    • § 14:8.2 : Cross-Border Transfers of Personal Data14-95
  • § 14:9 : European Data Protection and U.S. Discovery14-102
Chapter 15: Technology Considerations; and Appendix 15A
  • § 15:1 : Introduction15-2
  • § 15:2 : Strategic Issues15-3
    • § 15:2.1 : Continual Technology Developments15-3
    • § 15:2.2 : Dealing with Metadata15-4
    • § 15:2.3 : Dealing with Sensor Data15-6
    • § 15:2.4 : The Service Provider Landscape15-6
  • § 15:3 : Information Governance15-7
    • § 15:3.1 : Challenges15-8
    • § 15:3.2 : ERM/ECM Software Features15-10
    • § 15:3.3 : Questions for ERM/ECM Software Vendors15-11
  • § 15:4 : Defining the Scope of Electronic Discovery15-13
    • § 15:4.1 : Challenges15-13
    • § 15:4.2 : Typical Scope Limiters and Considerations15-14
      • [A] : Custodians (ESI “Owners”)15-14
      • [B] : Media Purposes15-15
      • [C] : Media Types15-15
      • [D] : Data Types15-15
      • [E] : Data “Ownership”15-16
      • [F] : Time Frames15-16
  • § 15:5 : Identification of Data15-16
    • § 15:5.1 : Early Case Assessment (ECA)15-17
    • § 15:5.2 : Challenges15-18
  • § 15:6 : Preserving Data15-19
    • § 15:6.1 : Collection As a Means of Preservation15-20
    • § 15:6.2 : Challenges15-21
  • § 15:7 : Collecting Data15-23
    • § 15:7.1 : Challenges15-24
    • § 15:7.2 : Making Collection Easier15-25
      • [A] : Imaging15-25
      • [B] : Archiving Collected Data15-26
      • [C] : Mobile Devices15-26
      • [D] : Voice Mail and Video15-26
      • [E] : Chain of Custody15-26
      • [F] : Filters15-27
  • § 15:8 : Culling Data15-27
  • § 15:9 : Processing Data15-27
    • § 15:9.1 : Challenges15-28
    • § 15:9.2 : Note on Searching15-28
  • § 15:10 : Reviewing and Analyzing Data15-29
    • § 15:10.1 : Challenges15-30
  • § 15:11 : Producing Data15-31
    • § 15:11.1 : Challenges15-32
  • Appendix 15A : MetadataApp. 15A-1
  Table of Authorities
  Index

  Please click here to view the latest update information for this title: Last Update Information  
 

Share
Email
UPKEEP SERVICE
Your purchase will also sign you up for “Upkeep Service,” whereby you will receive future automatic shipments of updates, new editions and supplements to this edition, as they become available, for a 30-day preview. Updates, new editions and supplements published within 90 days of your purchase will be issued free of charge; all other updates will be subject to an additional charge if kept beyond the preview period, invoiced at the time of delivery. This service will continue until canceled by you at any time. See here.

  • FOLLOW PLI:
  • twitter
  • LinkedIn
  • GooglePlus
  • RSS

All Contents Copyright © 1996-2017 Practising Law Institute. Continuing Legal Education since 1933.

© 2017 PLI PRACTISING LAW INSTITUTE. All rights reserved. The PLI logo is a service mark of PLI.