Category Archives: Uncategorized

  • -

New E-Discovery Guidance for Companies and Litigators | JD Supra

Category : Uncategorized

Every company that uses email or stores files electronically (i.e. every company) finding itself in litigation must comply with increasingly onerous discovery obligations.  While electronic storage and transmission of data makes businesses run faster and more efficiently, it also creates huge headaches when a litigant is broadly asked to produce all documents related to “X.”

Often there are multiple persons who have responsive emails and documents stored on a communal server or locally on their respective computers, tablets, phones, or other personal electronic devices.  Challenges arise relating to the time frames to be searched, and how to effectively review voluminous documents and determine which may be responsive.  How does one both efficiently and adequately search multiple repositories?  After all, failure to perform an adequate search may result in monetary and other sanctions.  So what is a beleaguered litigant to do?

Thankfully, the Sedona Conference just published the third edition of its treatise on modern e-discovery.  The Sedona Conference is a nonprofit research and educational institute dedicated to the advanced study of various legal issues.  It publishes the “Sedona Principles,” arguably the authority on modern e-discovery issues.  However, the Principles, originally published in 2003, had not been overhauled since 2007.  How outdated is that?  That was the year Apple released the original iPhone.  In 2007 most employees were not walking around with a sophisticated computer in their pockets.  The Sedona Conference’s recently-published third edition comes at a time when litigants need guidance regarding the last decade’s evolution of technology and the resulting e-discovery obligations.  On this front, a number of helpful topics are addressed by the new edition.

E-Discovery Issues Are Inevitable in Modern Litigation.

The Sedona Conference’s third edition recognizes that e-discovery issues are inevitable in modern litigation.  It stresses that parties and their counsel must get ahead of the issue by, early on, developing an understanding of what relevant electronic information may exist, how and where it can be found, and the process, time, and cost needed to discover, review, and produce the information.

Sedona Emphasizes Proportionality.

In 2015, the Federal Rules of Civil Procedure were amended to add a “proportionality” element to the definition of the scope of discovery, whereby information is only discoverable if the costs associated with locating and producing it are proportional to the needs of the case.  This is an amorphous concept.  What is proportional to one side may seem wholly unreasonable to the other.

The Sedona Principles provide guidelines on how to deal with e-Discovery proportionality issues.  Proportionality should apply to all aspects of e-discovery and should be addressed comprehensively by the parties at the Rule 26(f) early meeting of counsel and Rule 16 scheduling conference.  Where a party objects to e-discovery on proportionality grounds, it is its burden to state the basis for the objection with reasonable specificity.

Responding Parties Are Best Situated to Evaluate Their Own Procedures.

IT systems are complex and each is built to uniquely serve a business.  Thus, each litigant is often in the best position to understand and evaluate the proportionality of the procedures, methodologies, and technologies appropriate for preserving and producing its own electronically stored information.  Therefore, the responding party is tasked with making determinations as to the adequacy of its own search.  When it comes to objections to proportionality, expect challenges that the proverbial wolf is guarding the henhouse.  Placing the burden to establish proportionality on the responding party addresses this concern to some extent, but does so at the expense of any concrete standard that might head off discovery disputes.

Incompetent Spoliators.

Successfully destroying electronic information with the “intent to deprive” another party of its use (spoliation) is a big no-no, subjecting a spoliator to serious sanctions.  Sanctions might include monetary sanctions, evidentiary sanctions, issue sanctions, and even terminating sanctions.  Unintentional spoliation, on the other hand, is less offensive, but still potentially sanctionable under the right circumstances.

But what of a failed attempt to permanently destroy evidence—an incompetent spoliator?  The spoliator may argue no harm, no foul since the evidence wasn’t permanently destroyed, and, in fact, a literal reading of the Federal Rules of Civil Procedure may support such a conclusion.  However, Sedona recommends that even the incompetent spoliator be sanctioned if there was an attempt to permanently destroy the electronic information with the “intent to deprive.”

Practical Implications.

E-discovery and the headaches and issues it creates are here to stay.  Litigants must get out in front of e-discovery issues and address them with counsel as soon as practicable.  The Sedona Principles are a useful tool for any litigant to understand its e-discovery obligations.  Once a company has knowledge of a claim or the likelihood of litigation, it should (i) identify potential repositories of discoverable electronic information, (ii) take steps to protect and preserve that information, and (iii) assess the accompanying burdens with an eye toward any potential proportionality issues or disputes down the road.

Author: David Grant of Payne & Fears

https://www.jdsupra.com/legalnews/new-e-discovery-guidance-for-companies-24738/

 


  • -

Selecting a Forensic Investigator – A How-To-Guide

Category : Uncategorized

This is a good start, but I would include ensuring the forensic investigator presents themselves professionally and competently to a judge and or a jury.

http://www.jdsupra.com/legalnews/selecting-a-forensic-investigator-a-how-69128/

 


  • -

Dishwasher has IoT Bug

Category : Uncategorized

“Miele went full Internet-of-Things with a network-connected dishwasher, gave it a web server, and now finds itself on the wrong end of a security bug report – and it’s accused of ignoring the warning.”

https://www.theregister.co.uk/2017/03/26/miele_joins_internetofst_hall_of_shame/


  • -

Netfix Users Targeted by Credit Card Phishing Scheme

Category : Uncategorized

Although most companies will not ask for personal information via email, these phishing schemes make the user believe they are on a legitimate website, where the user feels it’s legitimate. I’ve taken the approach when I can’t be certain if the email is legitimate I just don’t respond at all, but will go to the website directly, not through an email link, to see if I see the same request for information after I’ve logged into my account.

http://ow.ly/e0lX307Urnl

 

.


  • -

When Employees Leave With Your Secrets | JDSupra

Category : Uncategorized

Excellent article and advice.

http://ow.ly/7A0o308bJEs


  • -

Google Required to Hand Over Foreign Stored Emails to Justice Department: E-Discovery Case Law | CloudNine

Category : Uncategorized

“In the ruling In re Search Warrant No. 16-960-M-01 to Google, Pennsylvania Magistrate Judge Thomas J. Rueter ordered Google to comply with a search warrant to produce foreign-stored emails, disagreeing with the U.S. Court of Appeals for the 2nd Circuit’s ruling in the Microsoft Ireland warrant case, where Microsoft was not ordered to provide access to emails in that ruling.”

http://ow.ly/mRKn309kjGY

 

 

 


  • -

Expert Warning of New Google Chrome Malware Scam | JD Supra

Category : Uncategorized

“The scam, which began in December, uses a pop-up stating “The ‘HoeflerText’ font wasn’t found” and tells users to download an update, which is actually malware.”

http://ow.ly/AqC7309FrOy


  • -

Cyber-security Hacks

Category : Uncategorized

There’s nothing new in this reminder, but it’s worth repeating. Strict password policy, train your employees, update and secure your systems. Can your system withstand 5,000 attack attempts within a three day period?

http://ow.ly/LguO30a4qBS