B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.



Similar documents
Preservation and Production of Electronic Records

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S

How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

The E-Discovery Process

E-Discovery Toolkit for Educational Institutions

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Electronic Data Retention and Preservation Policy 1

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

How To Answer A Question About Your Organization'S History Of Esi

REALITY BYTES: A NEW ERA OF ELECTRONIC DISCOVERY

Overview of E-Discovery and Depositions in U.S. IP Litigation

Electronic Discovery How can I be prepared? September 2010

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

Director, Value Engineering

SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION

[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

Records Management Electronic Records and Electronic Discovery

Data Preservation Duties and Protocols

ELECTRONIC DISCOVERY. Dawn M. Curry

Electronic Discovery and Disclosure:

PROCEDURES TO PROTECT YOURSELF AND YOUR CLIENT

Information Management Advice 18 - Managing records in business systems: Overview

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Union County. Electronic Records and Document Imaging Policy

Proactive Data Management for ediscovery

PROTOCOL FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS AT WESTERN WASHINGTON UNIVERSITY

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

University of Louisiana System

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES

Electronic documents questionnaire

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

From Archiving to Legal Holds: Comprehensive Information Management

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

Introduction Thanks Survey of attendees Questions at the end

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

electronic discovery requests

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1

REINHART. Labor & Employment E-News E-NEWSLETTER ATTORNEYS:

Best Practices in Electronic Record Retention

INCIDENT RESPONSE CHECKLIST

General Items Of Thought

Vancouver Toronto Seattle

Electronic Discovery

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

In-House Solutions to the E-Discovery Conundrum

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

Discovery Technology Group

Electronic Discovery & Digital Forensics

IT Roles in Loss Prevention. Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

How To Write A Hit Report On A Lawsuit Against A Company

How To Find Out What You Know About Esi

Acknowledgments Introduction: Welcome to the Labyrinth. CHAPTER 1 Gathering the Evidence 1. CHAPTER 2 Third-Party Experts 25

STI GROUP DISCUSSION WRITTEN PROJECT

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director

Retention and Archiving

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer

A Websense White Paper Websense CloudMerge Ingestion Service

Purpose: To ensure that e-discovery Requests and Litigation Hold Notices are received, routed and responded to in a timely and thorough manner.

Digital Forensics, ediscovery and Electronic Evidence

The Honorable Dwight Kay Illinois House of Representatives 401 Stratton Springfield, Illinois June 10, Dear Mr. Kay,

Data Compliance. And. Your Obligations

MTASC Spring Meeting IT Policies, E-Discovery, Records Management & FOIA

Department of Veterans Affairs VA Directive 6311 VA E-DISCOVERY

Guidelines on Digital Forensic Procedures for OLAF Staff

Record Retention and Disposal of College Records

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

OFFICE OF CHIEF COUNSEL OPERATION R.E.D. GUIDANCE

Privacy Impact Assessment

Backup Policy. Document Title: No. Pages 5. Document Type: Policy. Scope: OCIO, Operations Branch

Records and Information Management and Retention

Document Management Plan Preparation Guidelines

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

Suggested Protocol for Discovery of Electronically Stored Information ( ESI )

E-Discovery for Paralegals: Definition, Application and FRCP Changes. April 27, 2007 IPE Seminar

Developing a Records Retention Program

GUIDELINES FOR ELECTRONIC DISCOVERY AT THE UNIVERSITY OF WASHINGTON

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation

KPMG Forensic Technology Services

Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems

Predictability in E-Discovery

How To Write A Health Care Security Rule For A University

Transcription:

This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should be modified to fit the circumstances, and used in conformity with the Guidelines. I. Preservation. A. Identify and record steps taken to preserve potentially relevant information, i.e., information that is known (or reasonably should be known) to be relevant in the action. B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence. C. Parties are not required to preserve every shred of information. Act reasonably. If possible, seek agreement with the opposing parties at the beginning of the litigation about steps to take to preserve potentially relevant information and how to handle the privilege assertion process. II. Issue Initial Litigation Hold Notice. A. Review document retention and destruction policies. 1. Determine what practices must be suspended. 2. Follow litigation hold process (if any) outlined therein unless you determine it is insufficient. 3. Consider need for amended or supplemental litigation hold notices as litigation develops or as new individuals or issues are identified. 4. Consider sending periodic reminders of litigation hold notices. B. Promptly send litigation hold notices to the custodians identified as sources of potentially relevant information. 1. Take conservative (broad) view of relevant issues and custodians. 2. Err on the side of inclusiveness. C. Litigation hold notice should: 1. Specifically state that potentially relevant information and records must be preserved. 2. Identify general and specific categories of potentially responsive information. EXHIBIT 10

D. Discontinue any "recycling" of relevant former employees' computers. E. Identify and properly preserve (if necessary) relevant backup tapes in response to the litigation hold notice (e.g., earliest available backup, backup from day of preservation request and any other particularly relevant backups). F. Document steps taken to implement litigation hold (e.g., preserve any litigation hold notices that have been issued; create a checklist outlining the steps taken from the point of notice through the decision to release the hold; any other method that tracks compliance with hold instructions). III. Formulate a Protocol or Plan to Identify and Properly Collect Potentially Relevant Information. A. Goals: 1. Establish legal and technical strategies for data gathering, review, and production. 2. Comply with legal obligations including potential evidentiary issues. 3. Minimize expense and burden. 4. Be prepared to explain and defend the process. Carefully document all data identification and collection efforts. Identify and enable a discovery response coordinator or liaison to describe information custodians, systems, storage, retention policies and collection process. B. Practice Tips: 1. Discovery is a collaborative and iterative process that should involve a number of individuals, including but not limited to, outside counsel, inside counsel, IT, Data Privacy/Security, records management, business unit personnel and consultants/vendors, if necessary. 2. Consider interviewing: (c) (d) (e) General Counsel. Chief Information Officer. Director of Information Technology. Technology support personnel. Records management personnel.

(f) (g) (h) (i) Disaster recovery personnel. Data Privacy or Security Officer. HR Director (for potential personnel changes). Individuals who are likely to be key witnesses. IV. Identify Potentially Relevant Information. A. Take reasonable steps to identify sources of potentially relevant information. B. Determine scope and type of potentially relevant information. C. Find out how information is generated, maintained and destroyed in the normal course of business. D. Identify key witnesses and custodians, as well as their administrative assistants or other persons maintaining their documents, if applicable. E. Identify custodians with potential privileges (e.g., attorneys). F. Determine relevant time frames. G. Prepare keyword lists. 1. Relevant jargon, acronyms or code names can be used to assist with processing and review of data. V. Determine the Information Management Landscape. A. Map information systems to obtain accurate picture of data sources. 1. Practice Tip: Consider obtaining a general diagram from the client's IT network administrator depicting the types and locations of servers deployed throughout the organization. 2. Identify the document management systems. 3. Identify the e-mail systems. (c) (d) Identify the email administrator. Identify the types of e-mail systems. Assess any encryption or password protection issues. Identify potential for remote access and means that were used.

(e) Determine whether users archive e-mail outside the mail server on their local drives, other network locations, or removable media. B. Review document retention/destruction policies. 1. Assess the extent of automatic deleting or archiving both for email and the network generally. 2. Confirm whether the litigation hold has been implemented properly. C. Determine what happens to former employees e-mail, computers and documents when they leave the company. 1. Determine whether the practices have changed over time. 2. Determine whether they have been suspended or exceptions created for relevant former employees. D. Address backup media and disaster recovery systems. 1. Determine type, procedure and schedule. 2. Prepare a list of the servers that are backed up. 3. Determine whether any system changes occurred during the relevant time period. E. Determine the need for forensic data capture. 1. Have any types of activities occurred that would require the forensic copying of hard drives or servers? 2. Have files been deleted or written over that may be potentially relevant? F. Evaluate legacy systems. 1. Assess the need to access legacy systems. 2. Determine whether the necessary hardware, software or technical expertise to access legacy data exists within company. 3. If the necessary expertise is not available within the company, determine whether it is available from consultants, and at what cost. G. Consider offsite or third-party systems: 1. Cloud computing systems. 2. Off-site company storage facilities.

3. Co-location data centers. 4. Third party data warehousing. 5. Third party data tape storage. H. Determine the Company's schedule for any future upgrades, data migration or data consolidation that might affect the ability to utilize currently available data or recently archived data. I. Identify any additional sources of potentially relevant information, such as the following: 1. Local workstations or laptop hard drives. 2. Public/Private servers. 3. A central Storage Area Network (SAN). 4. Removable media (e.g., floppies, CD-Roms, DVDs, zip drives, thumb drives, etc.). 5. Digital voice mail stores and/or VOIP (voice over internet protocol) stores. 6. Personal Digital Assistants/iPods. 7. Intranets/extranets. 8. Central records/off-site storage facility. 9. Home computers. 10. Failed drives from which a forensic recovery might be possible. J. Depending on the nature of the case and the intensity of the discovery process, consider discussing with the client whether they use any emerging technology that may be relevant in a particular case, including social media, text messages, and cell phone-based media. Also consider discussing with the client, if applicable to the nature and size of the case, the potential for using technology or computer assisted review software.