Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Similar documents
Managing Your Record Retention Policy Safely

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Federal Rules of Civil Procedure IT Obligations For

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

IMPORTANT NOTICE: This Publication Has Been Superseded. See the Most Current Publication at

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

Enterprise Vault & e-discovery

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

Preservation of Electronic Records for Litigation University Operations - Administrative

PROVIDING INVESTIGATIVE SOLUTIONS

SECURITY & PRIVACY DOCUMENTATION

Case 1:05-cv SLR Document 160 Filed 01/04/2006 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

Case 1:07-cv HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR

The Legal Health Record and E-Discovery: Where You Need to Be

Order F19-04 OFFICE OF THE PREMIER. Celia Francis Adjudicator. January 29, 2019

DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM

CONFLICT OF INTEREST SYSTEMS

Discovery of Electronic Evidence

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]

Understanding Computer Forensics

Building Information Modeling and Digital Data Exhibit

Records Retention Policy

PRACTICE DIRECTION GUIDELINES FOR THE USE OF TECHNOLOGY IN CIVIL LITIGATION

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Electronic Evidence and Discovery

PRIVACY POLICY TABLE OF CONTENTS. Last updated October 05, 2018

Solving Exchange and.pst Management Problems in Microsoft Environments An Osterman Research White Paper

Information Security Policy

Privacy Shield Policy

This Policy applies to all staff and other authorised users in St Therese School.

SAMPLE LITIGATION HOLD NOTICES

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

Documenting a Digital Forensic Investigation - Guide

Meta-Discovery Presents Challenges for Producing Parties

Open Data Policy City of Irving

Practical ESI Discovery Iowa Defense Counsel. Phil A. Burian 6/10/14 1

December 6, Rachel Perrin Rogers NOTICE OF DEMAND FOR EVIDENCE PRESERVATION

AAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO

Records Management and Retention

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Managing and Electronic Records: A Transition Priority

8/28/2017. What Is a Federal Record? What is Records Management?

International Standard on Auditing (Ireland) 505 External Confirmations

Making a Request for records from The Town of Gordonsville

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018

AACE Certified Forensic Claims Consultant Certification

Management: A Guide For Harvard Administrators

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel

EU Data Protection Agreement

Michael McCartney, President

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

DIGITAL EVIDENCE TOOL BOX

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

PRIVACY POLICY Last Updated May, 2018

IRCH Methodology for Creating Legally-Defensible Retention Schedules

Discovery of Databases in Litigation

TERMS OF ENGAGEMENT TO PROVIDE ACCESSIBILITY CONSULTING SERVICES BY A CERTIFIED ACCESS SPECIALIST (CASp)

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

Community Unit School District No. 1. School Board

Records Information Management

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

Illinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.

The Trail of Electrons

ediscovery: Tips and Traps Mary Lou Flynn-Dupart David S. Curcio Jennifer Bryant Jackson Walker LLP

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

NASD NOTICE TO MEMBERS 97-58

Management Case Study. Kapil Lohia

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs

Data Curation Handbook Steps

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

Checklist and guidance for a Data Management Plan, v1.0

Subject access policy and template response letters

Record Keeping Best Practice. Distinguish between University and Non-University Records

Electronic Discovery

Symantec Document Retention and Discovery

E-Discovery in the US: Overview

Supersedes Policy previously approved by TBM

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

University Policies and Procedures ELECTRONIC MAIL POLICY

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION

Internet, , and Computer Usage Policy

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

DETERRING DISCOVERY-DRIVEN DATA DELETION

Data Management Plan Generic Template Zach S. Henderson Library

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES

Excerpt from Best Practices Guide for ESI Pretrial Discovery - Strategy and Tactics ( ), ESI Discovery, Type and Storage.

Data Preservation Checklists

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Transcription:

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules of Civil Procedure permit topics and issues pertaining to the discovery of electronic information to be addressed during a pretrial conference. The following checklist is a comprehensive agenda outlining many of the possible topics, questions, and concerns that can be addressed during such a pretrial conference: I. When is a Detailed Rule 16 Notice Most Appropriate? When the substantive allegations involve computer-generated records, e.g., software development, e-commerce, unlawful Internet trafficking, etc. When the authenticity or completeness of computer records is likely to be contested When a substantial amount of disclosure or discovery will involve information or records in electronic form, e.g., e-mail, word processing, spreadsheets, and databases When one or both parties is an organization that routinely used computers in its day-today business operations during the period relevant to the facts of the case When one or both parties has converted substantial numbers of potentially relevant records to digital form for management or archival purposes When expert witnesses will develop testimony based in large part on computer data and/or modeling, or when either party plans to present a substantial amount of evidence in digital form at trial In any potential big document case in which cost associated with managing paper discovery could be avoided by encouraging exchange of digital or imaged documents (especially if multiple parties are involved) The purpose of a detailed Rule 16 notice is to save the parties time and expense by anticipating the most common issues of computer-based discovery, developing a reasonable discovery plan, and avoiding unnecessary conflict. A detailed Rule 16 notice would not be appropriate if, in the opinion of the judge, the notice might serve to alarm the parties needlessly, raise unreasonable expectations or demands, or encourage the parties to engage in wasteful discovery. II. Preservation of Evidence A. What steps have counsel taken to ensure that likely discovery material in their clients possession (or in the possession of third parties) will be preserved until the

discovery process is complete? If counsel have not yet identified all material that should be disclosed or may be discoverable, what steps have been taken to ensure that material will not be destroyed or changed before counsels investigations are complete? If more specific direction is needed: B. Have counsel identified computer records relevant to the subject matter of the action, e.g., Word processing documents, including drafts or versions not necessarily in paper form Databases or spreadsheets containing relevant information E-mail, voicemail, or other computer-mediated communications Relevant system records, such as logs, Internet use history files, and access records C. Have counsel located the following computer records: Active computer files on network servers Computer files on desktop or local hard drives Backup tapes or disks, wherever located Archival tapes or disks, wherever located Laptop computers, home computers, and other satellite locations Media or hardware on which relevant records may have been deleted but are recoverable using reasonable efforts D. Have counsel made sure all relevant computer records at all relevant locations are secure, e.g., Suspended all routine electronic document deletion and media recycling Segregated and secured backup and archival media Created mirror copies of all active network servers, desktop hard drives, laptops, and similar hardware E. Have counsel considered entering into an agreement to preserve evidence? F. Does either party plan to seek a preservation order from the court? III. Disclosure and Preliminary Discovery A. Have counsel designated technical point-persons who know about their clients computer systems to assist in managing computer records and answering discovery requests? B. Have counsel prepared a description of their respective parties computer systems for exchange? Does either party need to know more before discovery can proceed? Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Page 2

If, after considering whether the hints in the following list may do more harm than good, the judge determines that the parties are unclear as to what they need to know at this stage and should get further guidance, the judge may suggest that they exchange information on the following points: Number, types, and locations of computers currently in use Number, types, and locations of computers no longer in use, but relevant to the facts of the case Operating system and application software currently in use Operating system and application software no longer in use, but relevant to the facts of the case Name and version of network operating system currently in use Names and versions of network operating systems no longer in use, but relevant to the facts of the case File-naming and location-saving conventions Disk or tape labeling conventions Backup and archival disk or tape inventories or schedules Most likely locations of records relevant to the subject matter of the action Backup rotation schedules and archiving procedures, including any backup programs in use at any relevant time Electronic records management policies and procedures Corporate policies regarding employee use of company computers and data Identities of all current and former personnel who had access to network administration, backup, archiving, or other system operations during any relevant time C. Do counsel anticipate the need to notice any depositions or propound any interrogatories to obtain further information about the opposing party s computer systems or electronic records management procedures? D. Have counsel explored with their clients (in appropriate situations) the procedures and costs involved to: Locate and isolate relevant files from e-mail, word processing, and other collections Recover relevant files generated on outdated or dormant computer systems (so-called legacy data ) Recover deleted relevant files from hard drives, backup media, and other sources Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Page 3

E. Do counsel anticipate the need to conduct an on-site inspection of the opposing party s computer system? Consideration of an agreed-upon protocol Permission to use outside experts Agreement on neutral expert IV. Electronic Document Production A. Will counsel use computerized litigation support databases to organize and store documents and other discovery material? B. Have counsel considered common formats for all electronic document exchange, e.g., TIFF images with OCR-generated text, e-mail in ASCII format, etc.? C. Have counsel (particularly in multi-party cases) considered a central electronic document repository? D. Have counsel considered an attorney-client privilege non-waiver agreement, to avoid the costs associated with intensive privilege screening before production? E. Do counsel anticipate requesting data in non-routine format, e.g., Printing by respondent of electronic documents not normally in print form Creation by respondent of customized database reports Performance by respondent of customized searches or data mining F. Have counsel agreed upon cost allocation outside the usual rule that parties absorb their own disclosure costs, e.g., Requesting parties will pay non-routine data retrieval and production costs Parties will negotiate data recovery and legacy data restoration costs G. Does either party anticipate objecting to the production of computer records or software necessary to manipulate the records based on: Trade secret Licensing restrictions Copyright restrictions Statutory or regulatory privacy restrictions V. Testifying Experts Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Page 4

A. Will any testifying expert(s) rely on computer data provided by either party, or rely on his or her own data? B. Will any testifying expert(s) use custom, proprietary, or publicly-available software to process data, generate a report, or make a presentation? C. Do counsel anticipate requesting discovery of either the underlying data or the software used by any testifying expert? VI. Anticipating Evidentiary Disputes Have counsel considered discovery procedures designed to reduce or eliminate questions of authenticity, e.g., Computer discovery supervised by neutral party Neutral, secure electronic document repository Exchange of read-only disks or CD-ROMs Chain-of-custody certifications This sample rule 16(c) pretrial conference agenda was written by Kenneth J. Withers, a Research Associate at the Federal Judicial Center, Washington D.C. Mr. Withers entire article, Computer-Based Discovery in Federal Civil Litigation, may be found at http://www.fjc.gov/public/pdf.nsf/lookup/elecdi01.pdf/$file/elecdi01.pdf Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Page 5