Power-Up Your Privilege Review: Protecting Privileged Materials in Ediscovery



Similar documents
SAMPLING: MAKING ELECTRONIC DISCOVERY MORE COST EFFECTIVE

E-Discovery Best Practices

Attorney-Client Privilege & Electronic Discovery: Challenges Created by In-House Communications, Best Practices, and Litigation Alternatives

COURSE DESCRIPTION AND SYLLABUS LITIGATING IN THE DIGITAL AGE: ELECTRONIC CASE MANAGEMENT ( ) Fall 2014

A Practitioner s Guide to Statistical Sampling in E-Discovery. October 16, 2012

A PRIMER ON THE NEW ELECTRONIC DISCOVERY PROVISIONS IN THE ALABAMA RULES OF CIVIL PROCEDURE

FINANCIAL INDUSTRY REGULATORY AUTHORITY OFFICE OF HEARING OFFICERS. Respondent.

E-Discovery: A Common Sense Approach. In order to know how to handle and address ESI issues, the preliminary and

AN E-DISCOVERY MODEL ORDER

Pr a c t i c a l Litigator s Br i e f Gu i d e t o Eva l u at i n g Ea r ly Ca s e

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

THE FREEDOM OF INFORMATION ACT (FOIA) AND DISCOVERY TWO DIFFERENT AVENUES FOR ACCESSING AGENCY RECORDS AND THE BENEFITS OF LEVERAGING E-

Legal Arguments & Response Strategies for E-Discovery

Navigating Information Governance and ediscovery

Case 3:12-cv LRH-VPC Document 50 Filed 06/07/13 Page 1 of 6 UNITED STATES DISTRICT COURT

MANAGING BIG DATA IN LITIGATION

In-House Solutions to the E-Discovery Conundrum

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Case 2:14-cv KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

FEDERAL JUDGES GUIDE TO DISCOVERY. Edition 2.0. A Publication of the Electronic Discovery Institute

Case 5:11-cv OLG-JES-XR Document 1130 Filed 07/09/14 Page 1 of 5

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

The United States Law Week

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

Case 5:14-cv RS-GRJ Document 21 Filed 05/28/14 Page 1 of 9

THE PREROGATIVES OF PRIVILEGES: THE ETHICS OF PROTECTING OUR PLANNING CLIENTS (EVEN FROM THEMSELVES!)

Electronic Discovery: Litigation Holds, Data Preservation and Production

Electronically Stored Information in Litigation

E-DISCOVERY: BURDENSOME, EXPENSIVE, AND FRAUGHT WITH RISK

Case 2:11-cv TS-PMW Document 257 Filed 02/03/15 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH CENTRAL DIVISION

Electronic documents are no less subject to disclosure than. Electronic Discovery In Arbitration: Privilege Issues and Spoliation of Evidence

Patent Litigation at the ITC: Views from the Government, In-House Attorneys and Outside Counsel

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology

E-Discovery in Michigan. Presented by Angela Boufford

IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF TEXAS DIVISION. v. Case No. [MODEL] ORDER REGARDING E-DISCOVERY IN PATENT CASES

Electronic Evidence and Discovery: The Changes in the Federal Rules. April 25, 2007 Bill Belt

Minimizing ediscovery risks. What organizations need to know in today s litigious and digital world.

THE CORPORATE COUNSELOR

BUSINESS TORTS & RICO NEWS

grouped into five different subject areas relating to: 1) planning for discovery and initial disclosures; 2)

I. FED. R. CIV. P. 26(b)(4)(C): COMMUNICATIONS BETWEEN ATTORNEYS AND EXPERTS

Case 6:13-cv EFM-TJJ Document 157 Filed 06/26/15 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Intermountain ediscovery Conference 2012

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper

E-Discovery in Employment Litigation: Making Practical, Yet Defensible Decisions

E-Discovery Guidance for Federal Government Professionals Summer 2014

E-Discovery Under FRCP 45

Case 1:13-cv WTL-MJD Document 122 Filed 06/24/14 Page 1 of 12 PageID #: <pageid>

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

California Enacts New E-Discovery Rules that Mirror Federal Court E-Discovery Rules - with One Exception

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

NEW JERSEY OFFICE OF ATTORNEY ETHICS ESI & ETHICS OCTOBER 6, 2015 RONALD J. HEDGES

MOCK MEET AND CONFER AND RULE 16(B) CONFERENCE: WHO IS AT THE TABLE AND WHAT HAPPENS WHEN COUNSEL CAN T AGREE? ASK THE JUDGE!

Predictability in E-Discovery

The Seventh Circuit Electronic Discovery Pilot Program Hope for the Future

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA WESTERN DIVISION. Case No. 5:07-CV-231-F

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

Technology- Assisted Review 2.0

Protecting Against the Inadvertent Waiver of the Attorney-Client Privilege When Providing Defense-Related Information to an Insurer

The Truth About Predictive Coding: Getting Beyond The Hype

The Predictive Coding Soundtrack: Rewind, Play, Fast-Forward

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FORT MYERS DIVISION. Case No. 2:11-cv-162-FtM-36SPC ORDER

Case 1:09-cv Document 60 Filed 12/16/09 Page 1 of 12

(Previously published in The Legal Intelligencer, November 8, 2011) New Cost Guidelines for E-Discovery by Peter Vaira

New E-Discovery Rules: Is Your Company Prepared?

How To Schedule A Case In The Court Of Appeals

Managing Litigation Risk Through Effective Use of Interoffice . Simon Malko Partner, Litigation Department

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

The Fiduciary Exception to the Attorney-Client Privilege and Its Application in Litigation. by George O. Peterson

Transcription:

Power-Up Your Privilege Review: Protecting Privileged Materials in Ediscovery Jeff Schomig, WilmerHale Stuart Altman, Hogan Lovells Joe White, Kroll Ontrack Sheldon Noel, Kroll Ontrack (moderator) April 29, 2015

Sheldon Noel, Kroll Ontrack sheldon.noel@krollontrack.com (202) 748-6429 Sheldon Noel, Business Development Manager, Kroll Ontrack Based in Washington, DC Advises attorneys and other professionals from law firms, corporations, and government agencies on all facets of legal technology issues, including electronic evidence and discovery matters An attorney with more than twelve years of experience in a unique combination of litigation, regulatory and complex project management roles 2

Jeff Schomig, WilmerHale jeffrey.schomig@wilmerhale.com (202) 663-6406 Attorney at WilmerHale, in Washington DC Practice includes representing clients in government regulatory and criminal investigations and in civil litigation Also focuses on advising clients and other attorneys concerning attorney-client privilege Serves on the Privilege Standing Committee, the primary advisory body to the firm's lawyers on attorney-client privilege and work product doctrine issues 3

Stuart Altman, Hogan Lovells stuart.altman@hoganlovells.com (202) 637 3617 Partner at Hogan Lovells in Washington DC Practice includes white collar criminal investigations and defense, including the representation of clients before various courts and regulatory agencies, conducting internal investigations, compliance and corporate governance matters, and complex civil litigation Extensive experience in representing and counseling companies and individuals in matters involving the Foreign Corrupt Practices Act, and he has significant experience working with companies in connection with data security and privacy issues 4

Joe White, Kroll Ontrack JWhite@krollontrack.com (952) 516-3777 Application Support and Training Team Lead, Kroll Ontrack Advises corporate and law firm clients on ediscovery.com Review capabilities offered by Kroll Ontrack Over ten years of legal industry experience, helping clients with solutions involving the organization, review, and production of electronically stored information (ESI) 5

Agenda Introduction» Early Privilege Preparation» Privilege as a Component of the Case Strategy» Technology Challenges associated with Privilege Legal Framework» Rules» Case Law Strategy» Privilege Log» Leveraging Technology Conclusion 6

Introduction 7

Privilege: Early Preparation is Key Look at the bigger picture and incorporate strategic considerations into privilege discussions Many attorneys focus too much on the privilege log as a separate part of the discovery process Begin planning how to handle privilege documents as soon as possible at the collection stage or sooner 8

Bring Privilege into Strategy Discussions COST Producing a large privilege log can be costly Dealing with privilege issues without a strategy in place can add to the cost TIME Time can be an issue and should be addressed early in the process QUESTIONS Consider questions that the discovery team might have for the client relating to privilege 9

Privilege Review & Ediscovery Technology Today, the realities of Big Data make privilege reviews more complicated than ever Technology is here to help: 10» Determine which documents the legal department knows to contain privileged information» Examine file folder paths» Review emails in context review email threads, not just single emails» Use categories, topic grouping, and predictive coding technology to filter through documents» Plan to use search terms and highlighting to speed review» Consider implications of international documents

Legal Framework 11

Privilege: Case Law Victor Stanley, Inc. v. Creative Pipe, 250 F.R.D. 251 (D. Md. 2008) 12» The defendants inadvertently produced privileged documents to plaintiff, after backing out of a proposed clawback agreement initially supported by both parties» The court found that the defendants failed to take reasonable precautions to prevent [disclosure], including the voluntary abandonment of the non-waiver agreement that both parties originally sought, and that they failed to demonstrate that [their] keyword search was reasonable. The court also expressed a degree of skepticism as to the reasonability of manual review of document title pages to evaluate whether entire documents needed scrutiny» The court noted that [t]he only prudent way to test the reliability of the keyword search is to perform some appropriate sampling of the documents determined to be privileged and those determined not to be in order to arrive at a comfort level that the categories are neither over-inclusive nor underinclusive

Privilege: Case Law Mt. Hawley Ins. Co. v. Felman Prod., Inc., 271 F.R.D. 125 (S.D. W. Va. 2010) 13» The plaintiff over-produced ESI by roughly 30%, including the inadvertent production of 980 documents identified as privileged» The plaintiff attempted to claw-back only 377 documents, including an important email» The court held that the plaintiff had waived privilege on the email, determining that although the plaintiff had hired an ediscovery vendor and used software to narrow production, it unreasonably failed to perform simple keyword searches that would have revealed the privileged email in question» Finally, the court observed that the plaintiff had delayed discovery, had an incomplete privilege log, and failed to point to overriding interests in justice that would excuse the inadvertent disclosure

Clawback Agreements The best way to prevent inadvertent disclosure is to avoid producing privileged documents in the first place However, production of privileged material is inevitable Clawback agreements make this less dangerous for both sides 14

Clawbacks & Waiver under Rule 502 Rule 502(b) establishes a default rule that allows for the clawback of privileged material if:» The disclosure was inadvertent» Reasonable steps were taken to prevent disclosure» Prompt, reasonable steps were taken to rectify the error Consider Rule 502(d)» The Court may approve clawback agreements between the parties» These agreements protect both parties and eliminate the need to show reasonableness 15

Strategy 16

Categorical Privilege Logs Substantiating privilege claims by category increasingly accepted as alternative to traditional, document-by-document privilege log Thought Leaders E.g., Sedona Conference (See The Sedona Principles: Best Practices Recommendations & Principles for Addressing Document Production, at 24 (2d ed. 2007); Magistrate Judge Facciola, D.D.C. (ret.). FRCP Advisory Committee The rule does not attempt to define for each case what information must be provided when a party asserts a claim of privilege or work product protection. Details concerning time, persons, general subject matter, etc., may be appropriate if only a few items are withheld, but may be unduly burdensome when voluminous documents are claimed to be privileged or protected, particularly if the items can be described by categories. Fed. R. Civ. P. 26 Committee Note (1993) Common Law See, e.g., United States v. Gericare Medical Supply Inc., 2000 WL 33156442 at *4 (S.D.Ala. 2000) ( The defendants have not explained how a categorical privilege log impaired their ability to test the plaintiff's claim of work product protection, which rises or falls as a unit. ). State and Local Discovery Rules NY Uniform Rules for Supreme and County Courts, S.D.N.Y., E.D.N.Y. Local Rules and Del. Court of Chancery Guidelines for Practitioners all declare categorical privilege logs to be presumptively sufficient 17

Categorical Privilege Logs Parameters Vary Requirements for categorical log still not well defined» See, e.g., McNamee v. Clemens, 2013 U.S. Dist. LEXIS 179736, *6 (S.D.N.Y. Sept. 18, 2013) ( While it may, in some cases, be appropriate to identify purportedly privileged documents by category, broad classes of documents with exceedingly general and unhelpful descriptions will not satisfy defendant's obligations. ) (citation omitted) Some courts still reject categorical logs outright» Neelon v. Krueger, 2014 U.S.Dist. LEXIS 175792, at *3-*4 (D.Mass. Dec. 19, 2014) ( The first problem is that the plaintiff does not assert the privilege as to individual documents but rather as to categories of documents. As discussed, infra, this is no more than a variant of a blanket assertion of the privilege, which, as noted, does not comply with the requirements of the law. ); modified in part by 2015 U.S. Dist. LEXIS 29146, at *12 (D.Mass. Mar. 10, 2015) ( Plaintiff could have provided more precise dates, an identification of the nature of the communications, the approximate number of documents involved, the name of all individuals receiving or sending particular communications, and the general subject matter of the withheld documents. ) 18

Take Advantage of Categorical Log Identify Categories» This is both practical and strategic» Categories can be a double-edged sword Expect meet & confer in lawsuit or similar pre-production conferences with investigating agency Organize Privilege Review to Accommodate/Leverage Categories Set client expectations» Categorical log can still be expensive and resource intensive 19

Review & Technology: Workflow Automated Workflow» Can be structured to capture various types of privilege to be sent automatically to corresponding first and second pass reviewers» Will queue up the correct documents in real time, while predictably and reliably enforcing coding requirements» Can automatically provide email threads for more efficient review and better privilege comprehension» Can dynamically prioritize documents by relevance» Will make the privilege log process easier 20

Review & Technology: Predictive Coding Leverage predictive coding in conjunction with other ediscovery technologies (key word searching, topic grouping, etc.) Use predictive coding for privilege review, but be aware of the realities:» Predictive coding is very useful for determining which documents may contain privileged information, but humans will still play a role» Metadata is extremely important for training, so strive to develop a robust set of teaching examples with relevant attorney names» Be aware of foreign language documents and adjust your training strategy accordingly» Pay close attention to work product privilege training 21

Review & Technology: Quality Control Quality control measures:» Occur well before production» Bolster the reliability of the review process» Help prevent inadvertent disclosure Predictive coding as a quality control tool:» This technology not only aides in locating privileged documents before review, but can also act as a fail-safe and help prevent inadvertent disclosure» Its use can also enhance the defensibility of the process» Sampling plays a significant role 22

Conclusion 23

Build Client Expectations around Privilege Consider the client s perspective and ensure expectations are realistic and achievable Clients should understand that:» Locating privileged documents is a serious and ongoing effort» Technology plays a major role in privilege review 24