e-discovery seminar - MS
Transcription
e-discovery seminar - MS
How to Avoid The Biggest Electronic Evidence Mistakes Ken Jones Senior Technology Architect Pileum Corporation Why is Proper Handling of Electronic Data Important? Most of the evidence in your case isn’t on paper and never will be. From a 2005 survey, only 5% to 7% of all information is “born” outside of a computer. Paper Evidence Computer Evidence Why is E-Discovery Different from Traditional Discovery? • Volume of Information – 1 e-mail search for 68 terms for 10 users = 45GB of data in over 500,000 e-mail messages! – In the Enron/Andersen litigation, the digital evidence topped 200 Terabytes, far more than if you digitized all the books in the Library of Congress. • Vicinity of Information – Data moves to places not expected – Servers, workstations, portable drives, e-mail recipients – cache files, slack space, duplicate documents Why is E-Discovery Different from Traditional Discovery? • Volatility of Information – Data change through normal operations – Ease of Data Corruption during collection • Variation of Information – Log Files – Metadata – Databases and spreadsheets – E-mail Headers Mistake 1: Inadequate Preparation Are You Prepared? • Usual reaction: Panic, confusion, unnecessary expense, and possible loss of evidence • Example: Database had information critical for a case. Attorney answer – “Print it out” • How can you fix this? – Train attorneys, paralegals, and staff – Review (or create) data collection policies and procedures – Proactively assist clients with high litigation risk to create a plan to preserve electronic evidence – Create an e-discovery procedure for your firm (yes, it can happen to you too!) Mistake 2: Moving Too Slowly Why is this a problem? • Example: Key evidence was an e-mail that had been deleted, but waited until 6 months after the suit was filed to try to recover it or prove it was sent! Data can easily be lost. How? • Routine system deletion – many log files are only saved for 30, 60, or 90 days. – Computer Log files (e-mail transmission, web page activity, etc) – ISP logs of IP addresses • Alteration through routine system operations – Just booting a PC changes hundreds of files • Employee actions – deliberate or accidental – Example: Employee had key data in their e-mail but left the company, so their mailbox was deleted! • Automatic overwriting and recycling (especially with backup) What is the solution? • Preserve early • Preserve widely – Can always exclude for privilege later • Notify ALL necessary people (especially IT) November 1, 2013 Bob Smith ABC Corporation PO Box 12345 Jackson, MS 39225 Re: Smith v. XYZ Corp. – Not Yet Filed Dear Mr. Smith: Please be advised that Plaintiffs in above matter believe electronically stored information to be an important and irreplaceable source of discovery in the abovereferenced matter. The discovery requests we intend to serve will seek information from your client’s computer systems. This includes, e-mail and other electronic communication, word processing documents, spreadsheets, databases, calendars, telephone logs, contact manager information, Internet usage files, and network access information. The laws and rules prohibiting destruction of evidence apply to electronically stored information in the same manner that they apply to other evidence. Due to its format, electronic information is easily deleted, modified or corrupted. Accordingly, we demand that you immediately take every reasonable step to preserve this information until the final resolution of this matter. This includes, but is not limited to, an obligation to discontinue all data destruction and backup tape recycling policies. Sincerely, Les Cheatem DUHE, CHEATEM & HOWE Mistake 3: Not Involving Specialists Early Enough Why is this a Problem? • Internal IT staff does probably does not have the time, tools, or knowledge to do it properly. – If there is a dispute over the method of preservation or collection do you want your internal IT staff to testify in court? • Difficulty of getting information after the discovery period • It is not just WHAT you ask for but HOW you ask for it to be delivered. Many times metadata is key to getting answers – – – – E-mail headers and routing information Word processing profiles and editing history Spreadsheet data sources and formulas Database structure and relationships • Computer Forensics may need to be used – Recovery of deleted items – Detailed examination of activities on a computer What is Computer Forensics? Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Which e-mail was never received? Received: from smtp486.redcondor.net (208.80.204.86) by mail.pileum.com (10.250.10.55) with Microsoft SMTP Server (TLS) id 14.3.158.1; Mon, 7 Oct 2013 09:26:12 -0500 Received: from mail-vb0-f67.google.com ([209.85.212.67]) by smtp486.redcondor.net ({6695537a-536a-45f9-a249877c85428649}) via TCP (inbound) with ESMTPS id 20131007142611158 for <[email protected]>; Mon, 07 Oct 2013 14:26:11 +0000 X-RC-FROM: <[email protected]> X-RC-RCPT: <[email protected]> Received: by mail-vb0-f67.google.com with SMTP id g17so549789vbg.2 for <[email protected]>; Mon, 07 Oct 2013 07:26:05 -0700 (PDT) … Received: from pileum.com (10.250.10.108) by PILEUMEXCH2.corp.pileum.com (10.250.10.55) with Microsoft SMTP Server id 14.3.158.1; Mon, 7 Oct 2013 09:34:02 -0500 … Answer: They both were, only the one of the right is a fake What is the solution? • Create a partnership now with a vendor to assist with handling of electronic evidence • Involve the vendor prior to discovery to help – Ask for the right data – Ask for data in the right format – Ask for the right amount of data • Know when to use computer forensics – Deleted data is often recoverable • Allow adequate time for examination of data Mistake 4: Incorrect Handling of Data Why is this a problem? • IT or Staff Lacking in Tools or Methodology – Wrong methods to image a PC (Windows, Ghost, etc.) – Not creating adequate chain of custody documents – Not securing the equipment properly • Example: A laptop had critical info on it. The IT staff powered on the computer to copy all of the files to a USB hard drive. They just ruined all of the “last accessed” information on the files • Possible Judicial Actions as a result of a Failure to Preserve – – – – – Preservation Orders Forensic Investigation Costs Negative Inference Jury Instructions Default Judgment or Dismissal EDD Horror Stories usually include judicial sanctions Failure to Preserve - Examples – A jury awarded $800-million in punitive damages when Morgan Stanley repeatedly failed to produce emails in a timely manner. The judge stated that "efforts to hide its emails" were evidence of "guilt." (Coleman Holdings v. Morgan Stanley) – A jury awarded $29.2-million in the largest single sex discrimination verdict in U.S. history after UBS Warburg could not produce copies of relevant emails. The jury was instructed to "infer that the [missing] evidence would have been unfavorable" to the defendant. (Zubulake v. UBS Warburg) – The SEC imposed a fine of $10-million on Banc of America Securities, the brokerage arm of Bank of America, after they "repeatedly failed promptly to furnish" email and gave "misinformation". Mistake 5: Not Asking for All Sources of Data Where can ESI be found? The Usual Suspects: Desktops Laptops Servers USB drives CD-ROMs DVDs Backup Tapes The Vicinity Problem: Data Moves To Places You Don’t Expect Less Obvious Sources of Relevant Data Internet Service Provider Logs Cloud Service Provider Data and Logs E-mail Archives Instant Messaging Cell Phone Text Messages Smart Phones/Tablets Personal Home Computers Former Employees Computers Personal E-mail accounts E-mail Recipients Copiers/Fax/Scanners Keys to Avoid Mistakes • Plan Ahead – Get the proper tools – Get the proper training • Involve the right experts – Electronic Evidence Collection – Forensics • Make a good plan and move quickly! Contact Information Ken Jones Senior Technology Architect Pileum Corporation [email protected] 601-214-5788 Support: 601-863-0086