Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.
|Case: New Mexico Oncology and Hematology Consultants, Ltd. v. Presbyterian Healthcare Services (D. N. M. Aug 16, 2017)
Why This Case Is Important
Collecting everything isn't necessary. If your preservation processes are “reasonable” under the circumstances, then simply sending detailed legal hold notices to key custodians may be sufficient.
Case Facts
In this antitrust and RICO dispute between healthcare organizations, the plaintiff moved for spoliation sanctions based on the defendant's legal hold procedures. They had four qualms about the process:
Ruling
Expert Opinion
“A lot of speculative motions were brought in the past, and unfortunately were granted. Even today I think that parties, particularly those who may not be as familiar with the requirements of the rule [FRCP 37(e)], or who may think that they have a judge who isn't that familiar with the requirements of the rule, will still try to bring these motions to gain leverage in hard fought litigation … and I think it's been very heartening to see there have been a number of decisions that have denied sanctions in speculative situations this year.”
— Gareth Evans, Esq., Co-Chair, e-Discovery Practice Group, Gibson Dunn.
|Case: Mirmina v. Genpact LLC (D. Conn. July 27, 2017)
Why This Case Is Important
Counsel-supervised custodian search for responsive data is a defensible process, especially if no factual evidence of foul play is presented.
Case Facts
The plaintiff filed a motion to compel the defendant to conduct an additional search for electronically stored information (ESI). Going outside the agreed e-discovery protocol, the plaintiff was “concerned” that the defendant withheld communications that were responsive. The defendant's concerns centered around letting counsel rely “upon an employee directly involved in the underlying claims of the suit to search her own emails for responsive documents.”
In response, the defendant argued that the search for responsive files was “coordinated and overseen by counsel,” which complies with acceptable preservation practices.
Ruling
Expert Opinion
“Good supervision by counsel and really good tracking of that supervision, and the ability to speak to that supervision to the court, can overcome speculation about whether or not your searching has been adequate. It's a pretty commonsense proposition, but supervision and careful tracking of that supervision are really important components of a defensible e-discovery plan.”
— Bree Kelly, Esq., Attorney, K&L Gates, and Editor, EDiscoveryLaw.com
|Case: Ronnie Van Zant, Inc. v. Artimus Pyle (S.D.N.Y. Aug 28, 2017)
Why This Case Is Important
With increasing amounts of information stored on various data sources, it's paramount when placing legal holds to consider including third parties who may have relevant data.
Case Facts
In this action for a breach of a consent order involving the famous southern rock band, Lynyrd Skynyrd, the defendant was accused of failing to have a third party, the director of a documentary about the band, preserve relevant text messages when switching to a new phone after the lawsuit commenced.
The defendant argued that they should not be sanctioned for spoliation of the text messages because the director was a contractor, not an employee, and the alleged lost data was outside their custody or control. The court did not agree.
Ruling
Expert Opinion
“There's little to lose anywhere in sending this kind of preservation notice to third parties because if they comply with it, then you've covered yourself and you're not in trouble. If they don't comply with it, you've covered yourself and you're not in trouble, because the fact that you sent the notice and they didn't comply with it proves that the documents weren't within your care, custody or control. I would recommend that practitioners and in-house counsel modify their procedures to identify third parties that might have documents and really be very broad in sending preservation notices to third parties, because usually there's little to lose and you can insulate yourself from these kind of spoliation claims.”
— David Cohen, Esq., Head of E-Discovery Group, Reed Smith LLP
|Case: Moody v. CSX Transp., Inc. (W.D.N.Y. Sep 21, 2017)
Why This Case Is Important
If you fail to put in place policies and procedures for taking “reasonable steps” to ensure the proper preservation of relevant data, then you're leaving yourself open to spoliation sanctions under Rule 37(e).
Case Facts
In this case involving a railway accident, data from the involved train's black box recorder was downloaded to a company laptop. According to the defendant's policy that downloaded data should have been backed up to a central data repository.
But in the four years between the accident and the filing of the complaint, the company never transferred the data and the laptop crashed. Based on this loss of data, the plaintiff moved for spoliation sanctions, claiming the defendant did not take “reasonable steps” to preserve the lost electronic data.
Ruling
Expert Opinion
“Number one, have a policy. Number two, have a way to communicate it effectively. Also have a way to follow up on it … I would think you also have to monitor the hold; you have to be able to discipline people who fail in a hold.”
— Ronald Hedges, U.S. Magistrate Judge (Ret.), District of New Jersey
|Several decisions from recent months have served to clarify the broad contours of reasonable, defensible preservation policies:
*****
Mike Hamilton is the Director of E-Discovery Programs at Exterro. With a legal and business background, Hamilton is experienced and passionate about creating thoughtful, out-of-the-box educational resources that help keep legal teams interested and on top of emerging need to know e-discovery issues.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.