![Page 1: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/1.jpg)
Copyright © 2008 Holland & Knight LLP All Rights Reserved
Delete! Litigation Risk Management and Data Retention Policies
Delete! Litigation Risk Management and Data Retention Policies
October 14 – 16, 2008
![Page 2: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/2.jpg)
2
Goals of Document Retention PolicyGoals of Document Retention Policy
• Business objectives – serve business needs for access to business records
• Comply with statutory and regulatory obligations, e.g. HR, Sarbanes-Oxley
• Respond effectively in litigation, which necessarily looks to the past
![Page 3: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/3.jpg)
3
Introduction: Two ProblemsIntroduction: Two Problems
Risk from deletion of data
Cost of collection/review
Both risks can be reduced with implementation of document retention policy.
![Page 4: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/4.jpg)
4
Risk From Deletion of RecordsRisk From Deletion of Records
•Monetary sanctions for spoliation
• Lost claims
• Attorneys fees (yours and theirs)
• Lost time
![Page 5: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/5.jpg)
5
2007 Case Law After New Rules2007 Case Law After New Rules
25%
24%
23%
9%
7%
6%
6%
Motion toCompel
Spoliation/Sanctions
Form ofProduction
Preservation/Litigation Holds
Privilege/Waiver
Cost-shifting
Admissibility ofESI
![Page 6: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/6.jpg)
6
Examples of ESIExamples of ESI
Email messages and attachments
Word processing documents
Graphic images
Spreadsheets
Web logs
![Page 7: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/7.jpg)
7
“Non Traditional” Sources of ESI“Non Traditional” Sources of ESI
![Page 8: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/8.jpg)
8
Risks/Costs Of “Too Much” DataRisks/Costs Of “Too Much” Data
• burden of preserving
• cost of retrieval
• cost of review
• risk of producing confidential/proprietary business records
![Page 9: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/9.jpg)
9
Boxes of BytesPutting It All in Perspective Boxes of BytesPutting It All in Perspective
Assumptions: Average banker’s box holds 2,500 sheets of paper
1 page of information on average = (.02 megabytes)
Megabytes1 2,500 50
FileSizes
= =
Typical PC
Hard Disk
Typical Server Hard Disk
Terabytes
Gigabytes
10 25,000 500
20 50,000 1
100 250,000 5
200 500,000 10
300 750,000 15
400 1,000,000 20
500 1,250,000 25
1,000 2,500,000 50
2,000 5,000,000 100
5,000 12,500,000 250
10,000 25,000,000 500
20,000 50,000,000 1
40,000 100,00,000 2
60,000 150,000,000 3
![Page 10: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/10.jpg)
10
Cost of ReviewCost of Review
6.26 g = 110 boxes @ 5 hrs per box = 550 hours @$200/hour = $110,000
![Page 11: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/11.jpg)
11
Why Do We Need To Review Documents Carefully?Why Do We Need To Review Documents Carefully?
•FRCP 26(b)(5)(B) addressed procedure for return of privileged information, but not substantive questions of waiver of privilege or work product.
•Substantial risk from inadvertent production of privileged documents.
•New FRE 502 – limited protection:
(b) Inadvertent disclosure. ─ When made in a federal proceeding or to a federal office or agency, the disclosure does not operate as a waiver in a federal or state proceeding if:
(1) the disclosure is inadvertent;(2) the holder of the privilege or protection took reasonable steps to prevent disclosure; and (3) the holder promptly took reasonable steps to rectify the error, including (if applicable) following Fed.R.Civ.P.26(b)(5)(B).
![Page 12: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/12.jpg)
12
New FRE 502(d)New FRE 502(d)
(d) Controlling effect of a court order. ─ A federal court order that the privilege or protection is not waived by disclosure connected with the litigation pending before the court governs all persons or entities in all state or federal proceedings, whether or not they were parties to the matter before the court, if the order incorporates the agreement of the parties before the court.
![Page 13: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/13.jpg)
13
How to Achieve BalanceHow to Achieve Balance
Risk from deletion of data = keep everything
Cost of review= retain little
![Page 14: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/14.jpg)
14
Defensible Document Retention PolicyDefensible Document Retention Policy
• Reasonable retention periods
• Integrated into business processes/enforced
• “Safe harbor” under federal rules - minimize risk of sanctions if destruction done pursuant to policy
• Provision for litigation hold – suspension of destruction
• Consideration of international standards for data protection
![Page 15: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/15.jpg)
15
Litigation holds: Stop the automatic deletion of dataLitigation holds: Stop the automatic deletion of data
![Page 16: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/16.jpg)
16
Best Practices for Litigation HoldsBest Practices for Litigation Holds
•Determine appropriate distribution list – document custodians, their managers, responsible IT
•Make it clear that “documents” includes all forms of ESI
• Err on the side of preservation
• Solicit feedback re: documents that may have been lost
• Follow up – then follow up again
![Page 17: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/17.jpg)
17
Using the Policy to Make the Right Initial Preservation Decision
![Page 18: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/18.jpg)
18
A Document Retention Policy Can Reduce Costs of Litigation In Other Ways…
A Document Retention Policy Can Reduce Costs of Litigation In Other Ways…
• Counsel have duties under new electronic discovery rules to participate in preservation decisions; understand IT architecture; disclose and discuss electronic discovery with opposing counsel
•New duties leads to “front loading” of costs
![Page 19: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/19.jpg)
19
Litigation counsel’s obligation to participate in preservation decisions, implementationLitigation counsel’s obligation to participate in preservation decisions, implementation
![Page 20: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/20.jpg)
20
Litigation counsel’s obligation to understand IT architectureLitigation counsel’s obligation to understand IT architecture
![Page 21: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/21.jpg)
21
Litigation counsel’s obligations to meet with opponent, discloseLitigation counsel’s obligations to meet with opponent, disclose
![Page 22: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/22.jpg)
22
Rule 26(f) Meeting of CounselRule 26(f) Meeting of Counsel
• Federal Rule of Civil Procedure 26(f):
Except in categories of proceedings exempted from initial disclosure under Rule 26(a)(1)(E) or when otherwise ordered, the parties must, as soon as practicable and in any event at least 21 days before a scheduling conference is held or a scheduling order is due under Rule 16(b), confer to consider the nature and basis of their claims and defenses and the possibilities for a prompt settlement or resolution of the case, to make or arrange for the disclosures required by Rule 26(a)(1), to discuss any issues relating to preserving discoverable information, and to develop a proposed discovery plan…
![Page 23: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/23.jpg)
23
Topics For Rule 26f ConferenceTopics For Rule 26f Conference
• Issues where e-discovery may be needed
• Preservation
• Sources of ESI
• Form of production
• Sources that are “not reasonably accessible”
• Search terms
•Dealing with privileged material
![Page 24: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/24.jpg)
24
Rule 26(a) Disclosure RequirementsRule 26(a) Disclosure Requirements
• Federal Rule of Civil Procedure 26(a)(1):
– the names of persons who have discoverable information
– the topics that each such person may have information about
– either a copy or a description by category and location of all documents, including electronically stored information, that the party has and may use to support or defend its claims or defenses.
![Page 25: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/25.jpg)
25
Efficient Searching For ESIEfficient Searching For ESI
•Document preservation policy “data mapping” process will assist in understanding where ESI should be located
• Collection from data sources - active data extraction v mirror imaging of entire source
• Search terms: key personnel, date ranges, terminology, concepts
• Sampling - McPeek v. Ashcroft, 202 F.R.D. 31 (D.D.C. 2001).
![Page 26: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/26.jpg)
26
Theft of trade secrets: increasingly electronic
![Page 27: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/27.jpg)
27
The Min CaseThe Min Case
•Gary Min, research chemist at DuPont
• Before leaving for a competitor in China, Min downloaded to storage devices technology with an FMV of over $400 million
•DuPont later discovers through network-use monitoring
• FBI searches home; new employer seizes laptop
• 10 year sentence + fine
![Page 28: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/28.jpg)
28
Effective Protection of Electronic Business AssetsEffective Protection of Electronic Business Assets
• Policies: identify what is “trade secret” and what is confidential information – overbroad definitions risk dilution of protection
• Practices: take “reasonable efforts” to protect your assets
– Physical security
– Computing security
– Information security
– Employee security
– Delivery chain security
![Page 29: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/29.jpg)
29
Protecting Trade Secrets with Restrictive CovenantsProtecting Trade Secrets with Restrictive Covenants
• Restrictive covenant agreement (nondisclosure, nonsolicitation, noncompete):
– Provides contractual protection for trade secret.
– Provides additional remedy and an ability to sue new employer in tort if it interferes with agreement.
– Educates employee on her or her obligations as to protect trade secrets.
– Limited usability in California
• Severity of restrictive covenant depends on importance of employee and their exposure to and knowledge of trade secrets.
![Page 30: Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008](https://reader035.vdocuments.mx/reader035/viewer/2022070302/5479ba4bb4af9fc3158b48c2/html5/thumbnails/30.jpg)
30
Balancing