- Who We Are
- News & Events
As anyone who has been involved in litigation within the past 10 years can attest, eDiscovery has the potential of consuming a case in at least two ways. First, depending on the level of civility and collaboration between adversaries and the amount of Electronically Stored Information ("ESI") the parties possess, the costs of production and related motion practice can dwarf those related to litigation on the merits. Second, allegations of spoliation and who failed to preserve ESI can quickly overshadow all other aspects of the case.
The dimensions and complexity of the challenge grow daily. According to digital consultant International Data Corporation, in 2010, the amount of digital information created in the world exceeded a zettabyte for the first time. A zettabyte is one trillion gigabytes. According to this same source - which has carefully studied data storage, handling and analysis trends since 2007 - the size of the digital universe is doubling every two years and the growth of the digital universe continues to outpace the growth of available storage capacity.
The implications of this data explosion for litigators and litigants alike is that old-style document review and production - commonly referred to as "linear document review" - is giving way to a new kind of automated review, conducted with the aid of litigation-changing technologies. Linear document review, by which individual reviewers manually review and tag documents ordered by date, keyword, custodian or other identifier, has been the accepted standard within the legal industry for decades. Linear document review was more than ample when documents were stored in file cabinets or warehouses, and even later when typical ESI volumes were measured in megabytes or perhaps a few gigabytes. The proliferation of digitally stored data over the past decade, however, has exposed the limitations of traditional linear review and even of such time-honored document management tools as Bates-stamping. As a result, linear review is increasingly regarded as inefficient, cost-prohibitive and less reliable than newly available alternatives.
Enter the third-party vendors and the eDiscovery specialists many companies and law firms have brought in-house. Wielding tools and technology unheard of even a few years ago, these technicians - who often times are lawyers - are charged with taming digital chaos in order to allow for meaningful discovery during litigation. Through cutting edge resources like predictive coding - a computer-assisted, attorney-driven review process by which a system of ESI is "trained" through search term iterations to code documents with various levels of relevance - more and more companies are seeing significant litigation cost-savings and, in most cases, dramatically improved accuracy over traditional "keyword" searches, and certainly over manual human review.
At the same time, courts are becoming increasingly conversant in both the practical challenges of modern-day eDiscovery and the technologies that have emerged to address them.
A recent gender discrimination case
involving more than three million documents in the Southern District of New
York, Da Silva Moore v. Publicis Groupe
& MSL Group, 11 Civ. 1279 (S.D.N.Y. Feb. 22, 2012), illustrates this
Against this backdrop are the following best practices for managing - or rather not mismanaging - your company's ESI, both before and after you reasonably anticipate litigation.
consider relying on internal IT departments to collect and preserve ESI
Many companies elect to have their own internal IT departments collect relevant data needed for litigation. This can be problematic on a number of levels. Generally speaking, corporate IT departments treat data as data, not as "evidence," but courts and opposing counsel often take a decidedly different view. In most cases, IT departments do not have the proper software, knowledge, skills or experience to collect and preserve data as "evidence." As a result, they may inadvertently contaminate, modify or alter the data they collect, creating authenticity, admissibility or even spoliation issues down the road. By the same token, corporate IT personnel often overlook data that may reside at third-party locations, such as telecom providers, outsourced email providers, internet cloud data and most importantly the hard drives of employee devices such as laptops, desktops and smart phones. Lastly, there is a very real "independence" issue when individuals on the company payroll either "don't" or "can't" find relevant data.
affirmative steps to avoid under-collection
Cost concerns often outweigh evidentiary and discovery concerns when it comes to scoping out litigation data collection. Not identifying and producing critical data that may be subject to discovery demands can result in sanctions, including adverse inferences, fines or even the striking of pleadings. The collection phase has become extremely inexpensive and is often priced at a fixed rate (often per gigabyte) schedule due to the commodity nature of that task. As a result, courts are exhibiting less and less patience with litigants that have not properly segregated and collected their own data, regardless of the excuse.
sure IT/Legal education is a two-way street
Many eDiscovery failures result from a lack of communication between the lawyers and the IT professionals, such that the lawyers don't understand the technology and the IT people don't know the law (and in particular, the company's discovery obligations). As a matter of company policy and ongoing education, it is critical that these gaps be bridged. Otherwise, it is almost certain that collection and preservation problems will develop. For example, often times, there is ancillary data that is created on an IT infrastructure that may be central to the litigation. These data sets may include firewall logs, telephone logs, router and switch logs, anti-virus logs and other non-standard data repositories. Yet many lawyers have never heard of these locations and many IT professional don't sufficiently understand discovery obligations to know the value of information residing there. In addition, coordination of the collection of the more standard data such as the hard drives of devices issued to employees, smart phones, tablets such as Ipad's, network file share data, network email data and server application data can be cumbersome to properly obtain and collect correctly without complete support from the corporate IT department, support that is possible only if they understand what is important and why.
is your friend - really
With the advent of more advanced and intelligent eDiscovery processing applications, which cull and filter large data sets down to smaller, more responsive data sets, reasonably priced and highly effective automated review alternatives are readily available to litigators and litigants. As with any new technology, these applications may cost slightly more to deploy on the front end than traditional methods. Moreover, because most lawyers remain, as one eDiscovery blogger puts it, "paper lawyers in a digital world," the legal team often looks for reasons not to leverage cutting edge technology. But technologies such as predictive coding are increasingly being embraced for their efficiencies, in terms of both dollars and time. In document-intensive cases, manual review can cost millions and take many months to complete. Exacerbating the runaway costs for attorneys and anachronistic computerized searches, keyword searches can leave up to 80 percent of relevant ESI undiscovered. Thus, a carefully calibrated, technology-based ESI management system will inevitably lead to more complete collection, more efficient review and more accurate disclosures during litigation. At the same time, developing this system before it must perform in the heat of litigation will allow for all the necessary stakeholders to weigh in - and buy in.
your specialists early on in litigation
As made clear in points 1-3 above, and just as with traditional fact investigation, the data collection phase of litigation is critical for evaluating the strength or weakness of the case. Because of the inherent limitations of most corporate IT departments, consideration should be given to bringing in experienced consultants early on in the process. While, just as with new technology, there are some costs associated with this exercise, the stakes most often are sufficiently high to warrant the investment, which, like most technology-related products and services, is becoming more and more reasonable.
implement and enforce comprehensive document destruction/preservation policies
Internal data retention/destruction policies are growing in importance, for purposes of corporate governance and litigation. Too often, companies do not have a sound data retention policy or are inconsistently applying their policy. Key elements of a robust data retention scheme that often go unaddressed are: email policies, social media policies, smart phone/PDA policies and litigation hold policies. While the process of updating, documenting and communicating corporate policies can be tedious and time-consuming, the long-term benefit will be invaluable when litigation arises.
on production of ESI in its native format
Many times litigators will agree on the format of production without talking to their clients or their vendors/consultant. This often results in the production by your adversary of PDF documents that have no useful metadata. As a result, the PDF's have to be re-processed for extractable text, searching and review. By contrast, documents produced as TIFF with metadata and text arrive in an optimal format to be loaded up for review and have all the fields that allow for enhanced searching and review. Your opponent may well object to your request, but savvy judges are increasingly open to requests for data in its native format. Indeed, this issue arose in a recent case out of the Southern District of Ohio, in which the plaintiffs requested that the defendant produced its ESI in native format together with associated metadata. The defendant objected to the plaintiffs' request on the ground that the native format "invites significant control risks in such documents can be altered after production... and cannot be Bates numbered, thus leading to significant monitoring costs." The defendant proposed providing its ESI in PDF or tiff format and to produce specific documents in native format only after the plaintiffs showed relevance. Citing FRCP 34 (b)(1)(C), the court determined that the plaintiffs were entitled to specify production form, regardless of relevance, unless the defendant demonstrated undue burden in complying with the request. Given the relatively small amount of ESI at issue, the court ruled that the defendants' concerns did not demonstrate undue burden. Accordingly, the court granted the plaintiffs' motion and ordered the defendant to follow plaintiffs' production request. Because much of an electronic document's value exists "behind the scenes," your insistence on native-format production is critical in today's litigation.
This publication is provided as a service to clients and friends of Harter Secrest & Emery LLP and DIGITS LLC. It is intended for general information purposes only and should not be considered as legal advice. The contents are neither an exhaustive discussion nor do they purport to cover all developments in the area. The reader should consult with legal counsel to determine how applicable laws relate to specific situations. © 2012 Harter Secrest & Emery LLP and DIGITS LLC
 Final Report on the Joint Project of the
 On March 16, 2012, the
District Judge in the
 Ralph Losey, http://e-discoveryteam.com/
 The Sedona Conference Best Practices Commentary on the Use of Search and Information Retrieval Methods in EDiscovery, at 206, August 2007.
 In re Porsche Cars N. Am. Inc. Plastic Coolant Tubes Prods. Liab. Litib.,2012 WL 203493 (S.D.