How to Win the Battle Over Electronic Discovery in Employment Cases. By Philip L. Gordon, Esq.



Similar documents
E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

Electronic Data Retention and Preservation Policy 1

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

The E-Discovery Process

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

Preservation and Production of Electronic Records

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

E-Discovery Toolkit for Educational Institutions

Electronic Discovery How can I be prepared? September 2010

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

E-DISCOVERY: BURDENSOME, EXPENSIVE, AND FRAUGHT WITH RISK

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

Electronic Discovery

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Electronic Discovery: Litigation Holds, Data Preservation and Production

In-House Solutions to the E-Discovery Conundrum

Data Preservation Duties and Protocols

REED COLLEGE. ediscovery GUIDELINES FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S

How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation

Article originally appeared in the Fall 2011 issue of The Professional Engineer

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

REALITY BYTES: A NEW ERA OF ELECTRONIC DISCOVERY

PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS

This article first appeared in the International Technology Law Association s ebulletin, Volume 2, Issue 3, summer 2008.

C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.

REINHART. Labor & Employment E-News E-NEWSLETTER ATTORNEYS:

Union County. Electronic Records and Document Imaging Policy

Corporate Governance - The Importance of a Compliant Record Retention Program. by Christopher N. Weiss 1

E-Discovery and Electronically Stored Information (ESI):

General Items Of Thought

ediscovery Update February 2010

PROTOCOL FOR PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS AT WESTERN WASHINGTON UNIVERSITY

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

GUIDELINES FOR ELECTRONIC DISCOVERY AT THE UNIVERSITY OF WASHINGTON

CIVIL DISCOVERY STANDARDS* AUGUST 1999 [NOVEMBER 2003 DRAFT AMENDMENTS TO ELECTRONIC DISCOVERY STANDARDS]

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices

A Brief Overview of ediscovery in California

Outlaw v. Willow Oral Argument Motions for Sanctions

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Cyber Tech & E-Commerce

How To Answer A Question About Your Organization'S History Of Esi

E-Discovery in Practice: A Roadmap for Financial Institutions

PROPOSED ELECTRONIC DATA DISCOVERY GUIDELINES FOR THE MARYLAND BUSINESS AND TECHONOLOGY CASE MANAGEMENT PROGRAM JUDGES

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

University of Louisiana System


E-DISCOVERY IN THE US

Best Practices in Electronic Record Retention

Case 2:14-cv KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

How To Write A Hit Report On A Lawsuit Against A Company

Spoliation of Evidence. Prepared for:

10 Steps to Establishing an Effective Retention Policy

Electronic Discovery and Disclosure:

Amendments to the Rules to Civil Procedure: Yours to E-Discover. Prepared by Christopher M. Bartlett Cassels Brock & Blackwell LLP

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Assembly Bill No. 5 CHAPTER 5

Legal Arguments & Response Strategies for E-Discovery

Electronic Discovery: Understanding Preservation Obligations, the Potential for Cost-Shifting, and Current Developments

E-Discovery for Paralegals: Definition, Application and FRCP Changes. April 27, 2007 IPE Seminar

Overview of E-Discovery and Depositions in U.S. IP Litigation

Michigan's New E-Discovery Rules Provide Ways to Reduce the Scope and Burdens of E-Discovery

California Enacts New E-Discovery Rules that Mirror Federal Court E-Discovery Rules - with One Exception

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

AUTION! Electronic. The courtroom falls silent. Pinning you with her gaze, the judge inquires, Do you have any questions,

ELECTRONIC DISCOVERY. Dawn M. Curry

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

State of Michigan Records Management Services. Guide to E mail Storage Options

E-Discovery in Employment Litigation: Making Practical, Yet Defensible Decisions

Director, Value Engineering

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

AppliedDiscovery. WhitePaper. RetentionPolicy

STI GROUP DISCUSSION WRITTEN PROJECT

2015 ANNUAL MEETING Vancouver, BC September 11, Recent Amendments to the Federal Rules of Civil Procedure: A New Scope of Discovery?

HIPAA Security Alert

Best Practices for Enforcing Legal Holds on and Electronic Data through Proactive Archiving Sponsored by Symantec

THE IMPACT OF THE ELECTRONIC DISCOVERY RULES ON THE EEOC PROCESS

How To Write A Health Care Security Rule For A University

New E-Discovery Rules: Is Your Company Prepared?

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

Emerging Legal Hold Practices Under the New Electronically Stored Information (ESI) Rules

[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]

Building an ROI Business Case for Archiving. Redgrave Daley Ragan & Wagner LLP

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Metadata, Electronic File Management and File Destruction

What Happens When Litigation Starts? How Do You Get People Not To Generate the Bad Documents?

CITY OF ANDERSON ELECTRONIC RECORD RETENTION POLICY

E-Discovery: New to California 1

The e-discovery edge: Expertise and preparation can save millions *

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES

Transcription:

How to Win the Battle Over Electronic Discovery in Employment Cases By Philip L. Gordon, Esq.

IMPORTANT NOTICE This publication is not a do-it-yourself guide to resolving employment disputes or handling employment litigation. Nonetheless, employers involved in ongoing disputes and litigation will find the information extremely useful in understanding the issues raised and their legal context. This white paper is not a substitute for experienced legal counsel and does not provide legal advice or attempt to address the numerous factual issues which inevitably arise in any employment-related dispute. Copyright 2005 Littler Mendelson, P.C. All material contained within this publication is protected by copyright law and may not be reproduced without the express written consent of Littler Mendelson.

How to Win the Battle Over Electronic Discovery in Employment Cases By Philip L. Gordon, Esq. More than almost any other type of lawsuit, employment cases provide plaintiff s counsel with the opportunity to use electronic discovery in particular, requests to produce word processing documents, electronic mail and instant messages, spreadsheets, etc. to force employers into submission. In virtually all employment cases (with the exception of trade secrets cases), electronic discovery is a one-way street; the employer controls the electronic resources of most witnesses, including the plaintiff; possesses most of the relevant electronic records; and may not even be able to contend legitimately that plaintiff s personal computer is a valid target of discovery. In contrast to commercial litigation involving tens or hundreds of millions of dollars, the cost of responding to requests for electronic discovery in employment cases and the potential monetary sanctions for failing to do so especially in single-plaintiff cases can easily become disproportionate to the amount in controversy. And, an adverse inference instruction, i.e., the judge s instruction that the jury may draw an inference that destroyed electronic files contained information adverse to the employer s case, easily could be the death knell for a defendant-employer already portrayed by plaintiff s counsel in opening statement and closing argument as the overbearing brute. Employers can, however, prevent electronic discovery from becoming their adversary s silver bullet. As with any form of warfare, disarming the adversary s most effective weapons requires planning long in advance of the actual battle and crisp execution once the gauntlet has been dropped. In the battle over electronic discovery, employers can achieve these overarching objectives by taking the steps discussed below to the extent warranted by the nature of the dispute, the anticipated cost of litigation and the amount potentially in controversy. Step 1: Develop & Implement a Reasonable Data Retention & Destruction Policy Electronic discovery can easily become a bludgeon in the hands of plaintiff s counsel for three principal reasons. First, electronic records are stored in vast quantities on a wide range of storage media, including network and e-mail servers, workstations, laptops, personal digital assistants (PDAs) and portable storage media, such as CDs, UBS drives, and floppy disks. Consequently, searching for, retrieving, reviewing and producing electronic records can be very time consuming and costly. Second, retrieving electronic records from back-up tapes created for disaster recovery purposes can be exorbitantly expensive because this process often requires the services of data recovery specialists and the re-creation of the antiquated computer environment in which the data originally was created. Third, employees are in a position to eliminate electronic records from easily accessible storage media whether intentionally or accidentally thereby making the employer vulnerable to charges of spoliating evidence and making it more likely that a court will sanction the employer and/or order the employer to spend substantial sums to recover the otherwise easily retrievable data from back-up tapes. Employers can significantly mitigate each of the three factors that make electronic discovery an effective weapon in the hands of aggressive plaintiff s counsel by developing and implementing a data destruction and retention policy. Electronic records destroyed in accordance with such a policy obviously are unavailable to be produced, reducing the cost of searching for documents, reviewing them for relevance, privilege, and trade secrets and ultimately producing them. As long as the records destruction policy was implemented before litigation was on the horizon, establishes reasonable and legitimate guidelines for data destruction, and is uniformly enforced, courts generally will not sanction employers that have followed the policy and destroyed electronics records that would have been discoverable had they existed when the employer first received notice of the litigation. Step 2: Promptly Inform Employees of the Litigation Hold An organization becomes subject to a duty to preserve potentially discoverable information when it knows, or reasonably COPYRIGHT 2005 LITTLER MENDELSON, P.C. 1

should know, that the information might be discoverable in litigation. In the employment context, the duty attaches, at a minimum, when the employer is served with notice that a formal proceeding has commenced for example, by service of a complaint or receipt of a charge of discrimination or other notice that a government agency will be conducting an investigation. The duty can be triggered even before a formal proceeding is commenced, most commonly when an employee s attorney sends a demand letter, even if the letter does not include a demand to preserve evidence. Litigation counsel should be consulted as soon as the duty to preserve is triggered, or even when it is unclear whether the duty has been triggered. When the duty to preserve evidence does attach, the organization must implement a litigation hold. The litigation hold entails (a) an immediate suspension of any routine practice, policy or procedure of destroying any documents or data that are potentially relevant (including electronically stored records, such as email and instant messages); and (b) collection and preservation of such documents/data for use in the litigation. Given the ease with which electronic records can be deleted, discarded or overwritten, implementing an effective litigation hold requires detailed instructions to employee-witnesses, recordsmanagement personnel, and information technology (IT) staff. These employees should promptly be sent a memorandum that achieves the following: Informs them that the organization is under a duty to preserve relevant evidence, including both paper documents and those that are stored electronically and that all document destruction in accordance with organizational policy must be suspended. Explain that the litigation hold applies to information on the company s network servers, e-mail server, workstations, laptops, portable hard drives, PDAs, employee personal computers and all other storage media, such as diskettes and CDs, as well as to all file types, including e-mail, word processing documents, spreadsheets and power point presentations. Identify the categories of documents that must be preserved and the time frame encompassed by the litigation hold. Explain that failure to comply with the instructions could result in discipline for the employee and the imposition of sanctions on the organization. The IT Department should receive additional instructions. These include the following: Disable any computer programs that automatically destroy potentially relevant evidence, such as e-mail and instant messages. Remove from the recycling routine any accessible back-up media (i.e., back-up media from which data can be easily retrieved without a restoration process) for the relevant time period. If it would not be unduly burdensome, store the hard drives of the computers used by employees likely to be key players in the litigation until it can be determined whether it would be cost prohibitive to create a mirror image of those hard drives. Do not discard or re-issue any computers used by a departing employee likely to be a key player in the litigation. Step 3: Consult with Litigation Counsel Concerning Electronic Discovery Litigation counsel will need to work with the organization s personnel typically, in-house counsel, IT personnel, and records management specialists to gather discoverable records. Before that process can get started, in-house counsel will need to identify for litigation counsel (a) the employees who likely will be key players in the actual or impending litigation, (b) the individuals in the IT and records management departments who will serve as point persons for litigation counsel, (c) the pertinent time frame for the matter in dispute, and (d) the categories of potentially discoverable electronic data/documents. IT staff will need to educate litigation counsel about: the nature of the organization s electronic storage systems; the computer resources available to, and used by, the key players; and where the electronic data (including e-mails and instant messages) and other potentially relevant documents generated or received by them may be found (i.e., network servers, e-mail servers, workstations, laptops, PDAs, home computers used for business purposes, etc.). Litigation counsel will also need to know the following: whether the client s systems automatically purge certain electronic records, such as e-mail stored in an in-box after a predetermined time after receipt; whether deleted items (particularly e-mail) can be easily restored through the use of the restore delete function; 2 LITTLER MENDELSON, P.C. THE NATIONAL EMPLOYMENT & LABOR LAW FIRM

whether IT staff routinely recycles back-up tapes and, if so, on what schedule; whether the client ever uses its back-up tapes as a means of archival storage or if such tapes are accessed only for disaster recovery purposes; whether the client had disposed of or recycled any computers or storage media used by the key players; and how the client handles data stored on computers used by departing employees. Step 4: Provide Litigation Counsel with Information About the Organization s IT Resources Litigation counsel will be better able to respond to, and defend against, the adversary s electronic discovery requests when armed with an understanding of the organization s electronic resources. Having this information also will place counsel in a better position when interviewing key players to understand their electronic habits. In addition, this information will be important for technical consultants litigation support and forensic experts when they evaluate the best methods for gathering and preserving discoverable documents. With reference to the parameters of the litigation hold, the subject matter of the actual or threatened litigation, and the ultimate objective of locating and preserving potentially discoverable electronic information, the specific information to gather for litigation counsel typically will include the following in most employment disputes involving electronic discovery: Policies and Procedures. Provide written policies concerning the organization s computer resources, including data retention and destruction policies, back-up recycling schedules, e-mail use and retention policies, computer use policies, telecommuting policies, and password, encryption, and other security protocols. Company-Issued Devices Used By Employees: Provide the brand name, model number, and serial number of each companyissued device (work stations, laptops, PDAs, etc.) used by each key player during the relevant time period. Storage Media: Identify all locations where active files are maintained, including, for example, network servers, e-mail servers, local hard drives, laptops and diskettes. Identify storage likely to contain duplicative data. Provide a description of labeling standards and storage procedures for CDs and diskettes. E-mail: Provide the type of hardware (servers and terminal devices) and software used during the relevant time period, including each version of software; the number of users; the location of mail files; password usage; and whether employees use off-site e-mail services from work and, if so, whether these are corporate or personal accounts. If the organization has an enterprise instant messaging (IM) system, provide similar details for that system. If the organization does not have enterprise IM, determine whether any of the key players used IM at work and discuss with IT staff (and forensic experts) the possibility of recovering instant messages. Document Destruction: Explain how electronic and paper documents are destroyed and how the organization documents the destruction. If any potentially discoverable categories of documents already have been destroyed, provide any documentation of the destruction and identify the person(s) who destroyed the documents. If IT staff or records management personnel are aware of any material deviation from the policy with respect to any category of potentially discoverable information, provide information concerning the deviation. In cases where electronic records will be central to resolving the dispute, or where plaintiff s counsel has signaled an intention to engage in aggressive electronic discovery for example, by demanding preservation of substantial quantities of electronic records the employer also should encourage IT staff and records-management personnel to collect the following information for litigation counsel: Personnel: Create, if one does not already exist, an organizational chart that identifies IT and records management positions, ideally including those employees responsible for system maintenance, electronic mail and instant messages, electronic records management and data destruction. Security Measures: Certain security measures, such as activity logs, audit trails, and monitoring software may be the source of useful evidence. For example, network resources that log user activity can be used to prove that a departing employee accessed sensitive data immediately before going to work for a competitor. Back-Up Storage: Provide the brand name and version of back-up software and back-up drives; the type of storage media used and the storage capacity; back-up procedures and schedules including non-routine back-ups (for example, Y2K or before a system upgrade); the schedules for maintaining and recycling back-up media; and how back-up media are indexed, stored, and retrieved, both on- and off-site. If the organization changed or COPYRIGHT 2005 LITTLER MENDELSON, P.C. 3

upgraded hardware, operating systems or applications software during the relevant time period, provide the brand name and version of any replaced hardware, operating system or application software that will be needed to restore back-up data and determine whether legacy hardware and software and related user guides have been retained. Application Software and Utilities: Provide the brand name and version of applications software and utilities used during the relevant time period, including both commercially available and custom applications, (e.g., programs for scheduling, project management, accounting, word processing, database management and encryption). Explain how shared files are structured and named on the system. System Configuration: Provide the brand name and model of network servers, storage devices and workstations used during the relevant time period and an explanation of how the devices were configured. Operating Systems: Provide the brand name and version of network and desktop operating systems used during the relevant time period. Step 5: Make the Key Players Available for Interviews By Litigation Counsel Litigation counsel should meet with each of the employees who likely will be a key player in the litigation. At this meeting, litigation counsel will remind each key player of the scope and meaning of the litigation hold and the potentially grave consequences of ignoring it. Counsel will work with each key player to identify the pre-existing records that must be preserved and records that might be created in the future that will need to be preserved as well. The information obtained by counsel from IT staff and records-management personnel can prove extremely helpful when litigation counsel tries to uncover potentially useful evidence through these interviews. Step 6: Gather and Preserve Discoverable Information The administrative exhaustion requirement applicable to many employment cases could result in a substantial lag between the time that the duty to preserve attaches and the time that discovery in a judicial proceeding commences. Preserving potentially discoverable information during this time period will require coordination among litigation counsel, the organization s lead IT contact, and the litigation support team. The ultimate goal is to create a battle-ready database that will permit litigation counsel to respond to discovery efficiently and at the lowest possible cost while providing an invaluable resource for defending the lawsuit. Those involved in the data-collection and preservation process should discuss the following points: Format and Method of Preserving Active Files: Active files can be preserved in native format or as images. Each format has advantages and disadvantages that should be considered. In addition, documents can be preserved on removable media (CDs and diskettes) or on servers that permit Internet-based access. Choosing among these options will depend upon the quantity and type of electronic data, the location of members on the litigation team and other factors. After selecting the format and method for preserving active files, the litigation team should identify each device and all other storage media from which data will be collected and develop a plan and schedule for the data collection process. Back-Up Tapes: Restoring back-up tapes can be very costly and, in most circumstances, should be considered only in the context of responding to discovery specifically requesting the production of data on back-up tapes. At this stage of the process, the litigation team should focus its efforts on determining whether removal of back-up tapes from routine recycling is required and, if so, ensuring that (a) back-up tapes potentially containing discoverable information are located, indexed and removed from the recycling process; and (b) newly created back-up tapes potentially containing discoverable information are preserved. Legacy Hardware and Software: If, during the relevant time period, the employer has changed or upgraded the hardware or software used to create back-up tapes, the employer should preserve legacy (or outdated) hardware and software and related user guides in the event the employer is ordered to restore back-up tapes created before the change or the upgrade. Residual Data: Residual data, which encompasses deleted files, remains on a computer s hard drive until overwritten. To preserve residual data, a computer s hard drive should be imaged, a process typically conducted by a computer forensic expert. This process can be costly. The employer generally should await formal discovery before imaging any hard drives. Consequently, the litigation team should discuss taking the hard drives in question out of circulation so that residual data is not overwritten. Chain of Custody: Keeping in mind that electronic records could 4 LITTLER MENDELSON, P.C. THE NATIONAL EMPLOYMENT & LABOR LAW FIRM

be favorable to the employer, the litigation team should ensure that it gathers and preserves evidence in a manner that will insulate the records from attacks on their authenticity. The litigation team, therefore, should focus on the technical steps that need to be taken to create an unassailable chain of custody. The employer s IT staff who are helping to gather information should be provided forms that permit them to record the categories of files that have been copied, the date and time of the copying, the identification of the storage media to which they were copied and the litigation attorney to whom the storage media were provided. Cost and Administrative Burden: The litigation team should document the cost of gathering, preserving and producing electronic evidence and the administrative burden that those efforts impose on the employer s business. Litigation counsel will be able to use this information, when seeking a protective order or opposing a motion to compel, to carry its burden to prove that production is unduly burdensome. Courts typically require a fact-specific showing to meet that burden. Once these topics have been thoroughly considered, the process of gathering and preserving electronic documents should be completed. If the employer and the key players will generate discoverable information after this process has been completed, or if new employees with access to potentially discoverable information will be hired, the organization must send periodic reminders concerning the scope of the litigation hold and the importance of not violating it. Conclusion While the specific details of planning and executing an organization s responses to electronic discovery requests will vary depending upon the nature of the organization and its internal resources, the nature and scope of the parties dispute, and many other factors, the steps outlined above should provide a useful road map for most organizations. Following the road map should permit the employer to resolve litigation based on its merits rather than on avoiding the cost of electronic discovery and the imposition of discovery sanctions. COPYRIGHT 2005 LITTLER MENDELSON, P.C. 5

400 Attorneys + 28 National Offices = One Integrated Solution www.littler.com Employment and Class Action Litigation Unfair Competition and Trade Secrets Employee Benefits Labor Management Relations HR Risk Management and Corporate Compliance Workplace Safety