How to Get Electronically Stored Information and Use it Effectively

Transcription

How to Get Electronically Stored Information and Use it Effectively
The ESI Files:
How to Get Electronically
Stored Information
and Use it Effectively
Illinois Legal Aid Advocates Conference
November 13, 2008
Martin T. Tully
Christina M. Morrison
Partner & National E-Discovery Practice Chair
Katten Muchin Rosenman LLP
Litigation Associate
Katten Muchin Rosenman LLP
0
Much Ado About Something
•
2006 federal rule amendments established a practical and
philosophical framework for the conduct of electronic discovery.
•
Requires earlier and more extensive involvement by counsel and
clients to timely and successfully meet discovery obligations.
•
State courts have adopted the FRCP amendments or issued
slightly revised interpretations as guidelines to their judges.
•
Mishandling e-discovery matters can have serious -- even
disastrous – consequences.
– Qualcomm v. Broadcom -- $8.5M in attorneys’ fees, referral of certain
counsel to state bar association, and other sanctions
– In re Hawaiian Airlines – Award of $80M in damages plus costs
– Coleman v. Morgan Stanley – Adverse inference = $1.57B verdict
1
Amended Federal Rules Framework
•
FRCP 16(b) encourages initial scheduling order to include provisions for
addressing e-discovery disclosures and discovery.
•
FRCP 26(a)(1)(B) adds “ESI” to the list of required initial disclosures.
•
FRCP 26(b)(2)(B) draws distinction between accessible and inaccessible
data and creates cost-shifting opportunities.
•
FRCP 26(b)(5)(B) & 26(f)(4) authorize “claw back” and “quick peek”
provisions in discovery orders.
•
FRCP 26(f) adds e-discovery disclosure and discovery to the list of topics to
be discussed at the initial planning conference.
•
FRCP 34(b) establishes protocols regarding the form of production of ESI.
•
Form 35 adds a description of the parties’ e-discovery proposals.
•
FRCP 37(e) says ESI lost as result of routine, good faith operation of an
electronic information system should not result in sanctions.
•
FRCP 45 clarifies that records subpoenas include ESI.
2
What – Me worry?
3
Basic Familiarity With ESI Practices &
Pitfalls Is Essential
•
“[ESI] is commonplace in our personal lives and in the operation of
businesses, public entities, and private organizations.” Managing
Discovery of Electronic Information: A Pocket Guide for Judges, Federal
Judicial Center (2007).
•
ESI is everywhere, takes many forms, and is growing fast.
– ESI = “any information created, stored, or best utilized with
computer technology of any type”
•
Know how to properly handle your own client’s ESI.
•
Know how to get your opponent’s ESI and use it effectively.
•
Proper planning and preparation will equip you to more efficiently
navigate the rules and can give you the upper hand in pursuing ediscovery.
4
E-Discovery in Illinois State Courts
•
S. Ct. Rule 201(b)(1): “The word ‘documents,’ as used in these
rules, includes, but is not limited to, papers, photographs, films,
recordings, memoranda, books, records, accounts,
communications and all retrievable information in computer
storage.”
•
Committee Comment: Amendment leaves “no question but that a
producing party must search its computer storage when
responding to a request to produce documents pursuant to [S. Ct.
Rule 214].”
•
Committee Comment: Definition of “documents” expanded to
recognize “the increasing reliability on computer technology and
thus obligates a party to produce on paper those relevant
materials which have been stored electronically.”
5
Key Steps in the E-Discovery Process
6
ESI Identification
7
Determine What’s There (Requesting Party)
•
Ask your client to describe what relevant ESI should be there
•
Who are the most likely custodians?
•
What relevant systems, repositories and other sources of ESI
are there for the applicable time period?
•
What types of ESI reside there? Emails and other
communications, documents drafted or exchanged, data,
programs, applications, etc.
•
Where does it reside? ESI lives in many places – PDAs, cell
phones, home computers, external hard drives, flash drives,
etc.
•
Are any of these systems or repositories subject to auto-delete
functions, overwriting, recycling, archiving, etc.?
8
Determine What’s There (Requesting Party)
•
Take advantage of required initial disclosures and conferences.
– FRCP 16(b) -- requires disclosure of a party’s IT and RM
architecture and environment at the very beginning of the
lawsuit
– FRCP 26(a)(1)(B) requires each party to disclose and
produce ESI it intends to use to support its claims or
defenses
– FRCP 26(f) – ESI disclosures and discovery to be
discussed at initial planning conference
•
Perfunctory discussions are insufficient. Parties must be
prepared.
9
Determine What’s There (Requesting Party)
•
Illinois circuit judges can pursue case management
conferences under S. Ct. Rule 218.
•
ABA Standard on Civil Discovery 31 suggests that a
discovery conference be held early in the case when
electronic discovery is involved.
•
Such conferences can produce orders that address
“disclosures or discovery” of ESI and that incorporate any
agreements the parties reach for asserting claims of
privilege or of protection of trial-preparation material after
production.
10
If You Don’t See It . . . Ask For It
•
Review initial disclosures. Are they complete?
– Compare production and expectations. Look for gaps,
missing data, unusable data, etc.
•
If not sure, include specific requests for production.
– Be comprehensive and yet specific
– Cover known and perceived gaps
•
Ask for live, deleted, wiped, unallocated and slack space
data, etc., if relevant.
•
Interrogatories or depositions of IT personnel or records
custodians can be instructive.
11
Request Within Reasonable Parameters
•
Even if disclosures appear complete, serve RFP under FRCP 34 or
S. Ct. Rule 214 for ESI needed to establish your claims or defenses
and negate opponent’s claims or defenses.
•
State clearly whether ESI is being sought.
•
Be thorough and yet specific:
– Who? – list of people
– What? – carefully define types of ESI
– Where? – specify all hardware and devices where ESI may be
found
– When? – provide relevant date range
– How? – specify form of production
12
Limits on Discovery of ESI
•
Distinction between ESI that is accessible and not
reasonably accessible because of undue burden or cost.
FRCP 26(b)(2)(B).
•
“Accessible” ESI follows standard discovery rules, with the
responding party typically bearing costs of production,
whereas ESI identified as and shown to be “not reasonably
accessible” due to “undue burden or cost” will typically not
be required to be searched or produced, absent a showing
of “good cause” and possible cost-shifting.
•
“Cost shifting does not even become a possibility unless
there is first a showing of inaccessibility.” Peskoff v. Faber,
240 F.R.D. 26, 31 (D.D.C. 2007).
13
Limits on Discovery of ESI
•
“It is not possible to define in a rule the different types
technological features that may affect the burdens and costs
of accessing electronically stored information.” Advisory
Committee Notes to FRCP 26(b)(2)(B).
•
As “technological features” change over time, what is “not
reasonably accessible” today may not be so tomorrow.
•
Cost of restoring and searching backup tapes does not
necessarily render them “not reasonably accessible because
of undue burden or cost.” Semsroth v. City of Wichita, 239
F.R.D. 630 (D. Kan. November 15, 2006).
14
What is “Not Reasonably Accessible”?
•
Data contained in 34,112 requested claim files held “not reasonably
accessible” because of cost and hours needed to retrieve it.
However, “good cause” existed for requiring production of narrowed
request for 3,000 files that the court found to be integral to the
litigation. W.E. Aubuchon Co., Inc. v. BeneFirst, LLC, 245 F.R.D.
38 (D. Mass. Feb. 6, 2007).
•
Court declined to order production of inaccessible data under Rule
26(b)(2)(B) for “good cause” because request lacked sufficient
specificity. Ameriwood Industries, Inc. v. Liberman, et al., 2007 U.S.
Dist. LEXIS 10791 (E.D. Mo. Feb. 13, 2007).
•
Database prepared for other litigation found “not reasonably
accessible” because it had not been archived and data could only
be restored from original sources such as back up tapes. Best Buy
Stores, L.P. v. Developers Diversified Realty Corp., 2007 WL
4230806 (D. Minn. Nov. 29, 2007).
15
What is “Not Reasonably Accessible”?
•
Court rejected contention that production of emails of officers
and employees other than plaintiff (kept in LotusNotes rather
than less accessible backup media) would constitute an undue
burden and expense, in light of the Court’s ability to apportion
costs between parties. Parkdale America, LLC v. Travelers
Cas. and Sur. Co. of America, Inc., 2007 WL 4165247
(W.D.N.C. Nov. 19, 2007).
•
3 to 4 year-old back up tapes stored in the City Attorney’s Office
were “not currently accessible” since defendant did not have
the hardware needed to access them. The cost of restoration
outweighed the possible yield of relevant and probative
information. Palgut v. City of Colorado Springs, 2007 WL
4277564 (D.Colo. Dec. 3, 2007).
16
Direct Access To Opponent’s Hard Drive or
Electronic Information System
•
FRCP 34(a) does not “create a routine right of direct access to a party’s
electronic information system, although such access might be justified in
some circumstances.” Advisory Committee Notes, FRCP 34(a).
•
Recent cases have generally disallowed inspection of a “mirror image” of an
adversary’s hard drive unless the computer was used in the course of the
alleged wrongdoing or discrepancies in document production suggested
improper deletion of documents.
•
Diepenhorst v. City of Battle Creek, 2006 WL 1851243 (W.D. Mich. June
30, 2006) (In rejecting motion to compel making of “mirror image” of
contents of plaintiff’s hard drive, court explained it was "loathe to sanction
intrusive examination of an opponent's computer as a matter of course, or
on the mere suspicion that the opponent may be withholding discovery
information.")
•
Scotts Co. v. Liberty Mut. Ins. Co., 2007 WL 1723509 (S.D. Ohio June 12,
2007) (Declining to compel forensic search of computer systems, network
servers and databases based on “mere suspicion … that defendant may be
withholding discoverable information”).
17
Obtaining ESI From Third Parties
•
FRCP 45 amended to recognize that ESI, as broadly defined
in FRCP 34(a), can also be sought by subpoena.
•
S. Ct. Rule 204 allows for issuance of subpoenas upon third
parties that may “command the person to whom it is directed
to produce documents or tangible things which constitute or
contain evidence relating to any of the matters within the
scope of the examination permitted under these rules.”
•
Per S. Ct. Rule 201(b)(1), “documents” include
“communications and all retrievable information in computer
storage.”
•
Pre-suit discovery under S. Ct. Rule 224 can be used to
learn identity of e-mail account holder or on-line poster.
18
Preservation & Collection
19
Obligation to Preserve ESI (Federal)
•
“A party is required to keep relevant evidence over which it has control
and reasonably knew or could foresee was material to the litigation.”
Old Banc One Shareholders Sec. Litigation, 2005 WL 3372783 (N.D.
Ill. Dec. 8, 2005).
•
“While a litigant is under no duty to keep or retain every document in its
possession ... it is under a duty to preserve what it knows, or
reasonably should know, is relevant in the action, is reasonably
calculated to lead to the discovery of admissible evidence, is
reasonably likely to be requested during discovery and/or is the subject
of a pending discovery request.” Healthcare Advocates, Inc. v. Harding,
Earley, Follmer & Frailey, 497 F.Supp.2d 627 (E.D. Pa. 2007).
•
The identification of ESI as “not reasonably accessible” does not
relieve a party of its common law or statutory duties to preserve
potentially discoverable evidence. Advisory Committee Notes, FRCP
26(b)(2)(B).
20
Obligation to Preserve ESI (Illinois)
•
General rule is that there is no obligation to preserve evidence absent some duty
to do so. See Jones v. O’Brien Tire & Battery Service Center, Inc., 374 Ill.App.3d
918, 924 (5th Dist. 2007)
•
Two-prong test as to whether duty exists (see Dardeen v. Kuehling, 213 Ill.2d
329 (Ill. 2004); Boyd v. Travelers Ins. Co., 166 Ill.2d 188 (Ill. 1995):
–
Relationship Prong: Determine whether duty to preserve evidence arises by
agreement, contract, statute, special circumstances, or voluntary
assumption
–
Foreseeability Prong: If so, determine whether duty extends to evidence at
issue – i.e., whether a reasonable person should have foreseen that the
evidence was material to potential litigation.
•
When the Duty Arises: The duty arises during litigation, but also extends to that
period before the litigation when a party reasonably should know that the
evidence may be relevant to anticipated litigation.
•
Scope of Duty: The duty remains as long as the party in possession of the
evidence should reasonably foresee that further evidence, material to a potential
civil action, could be derived from the physical evidence. Andersen v. Mack
trucks, inc. 341 Ill. App.3d 212 (2d Dist. 2003).
21
Obligation to Preserve ESI (Illinois)
•
When a party fails to preserve evidence despite a duty to do so, a
cause of action exists for spoliation of evidence. This is not an
independent tort, but rather a type of negligence. Stoner v. Wal-Mart
Stores, Inc., 2008 WL 3876077 (C.D. Ill. 2008); Cangemi v. Advocate
South Suburban Hospital, 364 Ill. App.3d 446 (1st Dist. 2006).
•
This cause of action requires the existence of a duty, a breach of duty,
causation, and damages. Dardeen, 213 Ill.2d at 336.
•
Breach of Duty: The evidence has been lost, altered, or destroyed.
•
Causation: To plead causation, a plaintiff must allege sufficient facts to
support a claim that the loss or destruction of the evidence caused the
plaintiff to be unable to prove an underlying lawsuit.
•
Damages: A threat of harm not yet realized is not actionable. The
plaintiff must allege that a defendant’s loss or destruction of the
evidence caused the plaintiff to be unable to prove an otherwise valid
cause of action.
22
When Does the Duty to Preserve Arise?
•
As soon as a potential claim is identified, a litigant is under a duty to
preserve evidence which it knows or reasonably should know is relevant to
the action.
– Consolidated Aluminum Corp. v. Alcoa, Inc., 244 F.R.D. 335 (M.D.La
2006). Propounding of demand letter is the point in time when litigation
should have become “reasonably anticipated.”
– Stallings v. Bil-Jax, Inc., 243 F.R.D. 248, (E.D.Va. 2007). Defendant
was on notice of potential lawsuit when counsel for plaintiff wrote letter
stating it had been retained to investigate personal injury that had some
connection with defendant’s store. Although letter could have been
more specific, it provided some notice to defendant that plaintiff might
bring a lawsuit against it.
– Broccoli v. Echostar Communications, 229 F.R.D. 506, 510 (D. Md.
2005). Court held that duty to preserve was triggered by conversations
with a supervisor one year prior to filing of EEOC complaint.
•
However, a party’s duty to preserve certain evidence “must be based on
more than an equivocal statement of discontent.” Cache La Poudre Feeds,
LLC v. Land O’Lakes, Inc., 244 F.R.D. 614 (D.Colo March 2, 2007).
23
Preservation Notices (Requesting Party)
•
Why bother to send a preservation notice?
– Other courts’ opinions not binding precedent
– “Reasonably anticipated” is subjective
– Opportunity to identify important ESI
– First step in creating a record
•
Other factors to consider:
– Nature of the dispute
– Polarizing effect/impact on pre-dispute resolution
24
Litigation Hold Notices (Responding Party)
•
Written notice to each person reasonably likely to have
information or documents related to dispute.
– Description of reason for preservation/collection
– Time period covered; is it on-going?
– Definition of types of documents to include (email,
folders, shared drives, hard copies, etc.)
– Description of scope of documents covered
– Include “how to” instructions
– “Attorney-client privilege” designation
•
Follow-up and affirmations typically required.
•
Are legal hold notices discoverable?
25
FRCP 37(e) “Safe Harbor”
•
“Absent exceptional circumstances, a court may not impose
sanctions under these rules on a party for failing to provide
electronically stored information lost as a result of the routine,
good-faith operation of an electronic information system.”
•
To take advantage of the good faith exception, a party needs to act
affirmatively to prevent the system from destroying or altering
information, even if such destruction would occur in the regular
course of business.
– Where a party fails to suspend it at any time, courts have found
that the party cannot take advantage of Rule 37(e)'s good faith
exception. Doe v. Norwalk Community College, 2007 U.S. Dist. LEXIS
51084 (D. Conn. Jul. 16, 2007).
– Where defendant used a wiping tool before handing computers
over to bankruptcy trustee, Rule 37(e) did not apply. United
States v. Krause (In re Krause), 2007 Bankr. LEXIS 1937 (Bankr. D.
Kan. June 4, 2007).
26
Illinois Civil or Evidentiary Sanctions
•
S. Ct. Rule 219(c) permits a trial court to impose sanctions,
including dismissal of the cause of action, upon any party
who unreasonably refuses to comply with any provisions of
the discovery rules.
•
Whether to impose a particular sanction is within trial court’s
discretion.
•
Sanctions imposed in Illinois may include:
– Dismissal with prejudice or default judgment
– Exclusion of evidence
– Adverse inference instruction to the jury
27
Illinois Civil or Evidentiary Sanctions
•
Defendant’s deletion of approximately 12,000 files from his
computer within days after being sued for misappropriation of trade
secrets gave rise to inference that defendant had destroyed
evidence of misappropriation and presented a “fair question” on the
likely success of plaintiff’s claim. Liebert Corp. v. Mazur, 827
N.E.2d 909 (1st Dist. 2005).
•
Conclusive adverse fact findings on certain issues where
defendant, who claimed that computer repair shop told him “the
‘mother board’ and ‘hard drive’ were shot, and the computer was
not worth fixing,” threw away computer in construction site
dumpster within days after receiving notice of lawsuit. APC
Filtration, Inc. v. Becker, 2007 WL 3046233 (N.D. Ill. October 12,
2007).
28
ESI Possessed By Third Parties
•
Many courts have recognized an obligation to preserve such data,
reasoning that third-party documents may be in a company's "control."
– Keir v. UnumProvident Corp., 2003 WL 21997747 (S.D.N.Y.)
(Found that defendant failed to communicate in a timely manner or
meaningful way regarding potential preservation obligations of its
third-party provider of e-mail and other computer services).
– In re Triton, 2002 WL 32114464 (E.D. Tex.) (Held that it would
have been prudent and within the spirit of the law for defendant to
instruct its outside directors to preserve and produce any
documents in their possession, custody or control).
– PML North America v. Hartford Underwriters Insurance, 2006 U.S.
Dist. LEXIS 94456 (E.D. Mich.) (Court granted plaintiff's motion to
compel and ordered production of a specifically identified hard
drive, a thumb-drive and non-party employee's home laptop
computer).
29
ESI Possessed By Third Parties
•
Potential evidence must be in a party's "possession, custody, or
control" for any preservation duty to attach.
– Phillips v. Netblue, 2007 WL 174459 (N.D. Cal.) ("One cannot keep
what one does not have.")
•
Some courts "require production if the party has practical ability to
obtain the documents from another, irrespective of his legal entitlement
to the documents." See Prokosch v. Catalina Lighting Inc., 193 F.R.D.
633, 636 (D. Minn. 2000) (quoting United States v. Skeddle, 176 F.R.D.
258, 261 n.5 (N.D. Ohio 1997)).
•
Other courts require parties to produce only those documents they
have a legal right to obtain. See, e.g., Chaveriat v. Williams Pipe Line
Co., 11 F.3d 1420, 1427 (7th Cir. 1993) ("But the fact that a party could
obtain a document if it tried hard enough ... does not mean that the
document is in its possession, custody, or control").
30
Production
31
Form of Production (Federal Rules)
•
FRCP 34(a) allows requesting party to specify the form(s) in
which ESI will be produced.
•
Unless specified, responding party must produce ESI in the
form in which it is “ordinarily maintained” or a form that is
“reasonably usable.”
– Cannot produce ESI in a form less useful or searchable
than the form in which it is normally maintained.
– Failure to produce e-discovery in “any manageable
searchable form” found to be sanctionable. In re Seroquel
Prods. Liability Litigation, 2007 WL 2412946 (M.D. Fla. Aug. 21,
2007).
•
Responding party need not produce in more than one form.
32
Form of Production (Illinois Rules)
•
S. Ct. Rule 214 provides that a responding party must
include in its production response “all retrievable information
in computer storage in printed form.”
•
Committee Comment: Rule 214 requires “a party to include
in that party’s production response all responsive information
in computer storage in printed form. This change is intended
to prevent parties producing information from computer
storage on storage disks or in any other manner which
tends to frustrate the party requesting discovery from
being able to access the information produced.”
33
Production Of “Metadata”
•
“Metadata” = data about data
•
Embedded data such as draft language, editorial comments
and deleted matter retained in an electronic file that are not
necessarily apparent to the reader and other non-visible
information describing the history, tracking or management
of an electronic file are often referred to as “metadata.”
•
Neither the Amended FRCP nor the Advisory Committee
Comments directly address the extent to which metadata
would be required to be produced in a particular case.
34
Form of Production Considerations
Native File Format
Fixed Image Format
Metadata rich
Metadata poor
Formulas in spreadsheets visible
Preserves original appearance
Cannot redact
Easy to redact
Quick and cheap
Upfront costs to TIFF
Hard to label
Easy to label
Resource intensive
Must preserve metadata?
Searchable
Searchable
Risk of alteration
Contents preserved
Limits on use
Unlimited use
35
Other Production Issues
•
“Claw back” and “quick-peek” agreements, when
memorialized in a court order, can allow parties to produce
relevant documents before privilege review is conducted and
assert claims of privilege afterwards.
•
But some courts had held that production of privileged
materials to an opposing party under such agreements
constitutes a waiver of the privilege as to third parties.
•
New FRE 502 intended to provide uniform and less onerous
standards for determining whether a waiver has occurred, as
well as the scope of any such waiver, and thus reduce costs
of pre-production document and privilege review.
36
Processing/Review/Analysis
37
Processing/Review/Analysis
•
Implementing technology to increase efficiencies.
– Key word searching
– De-duplication, near-duplication
– Concept filtering, contextual word searching, “fuzzy logic”
– Audio, video and foreign language files
38
Processing/Review/Analysis
•
Effectiveness of “key word" searching has been increasingly subject to
judicial scrutiny
•
“Whether search terms or ‘keywords’ will yield the information sought is a
complicated question involving the interplay, at least, of the sciences of
computer technology, statistics and linguistics. ... Given this complexity, for
lawyers and judges to dare opine that a certain search term or terms would
be more likely to produce information than the terms that were used is truly
to go where angels fear to tread.” U.S. v. O'Keefe, 537 F. Supp. 2d 14
(D.D.C. 2008)
•
“Selection of the appropriate search and information retrieval technique
requires careful advance planning by persons qualified to design effective
search methodology. The implementation of the methodology selected
should be tested for quality assurance; and the party selecting the
methodology must be prepared to explain the rationale for the method
chosen to the court, demonstrate that it is appropriate for the task, and
show that it was properly implemented.” Victor Stanley, Inc. v. Creative
Pipe, Inc., 2008 WL 2221841 (D. Md. May 29, 2008).
39
Authentication & Admissibility
40
Authentication & Admissibility
•
“The paperless electronic record involves a difference in the
format of the record that presents more complicated
variations on the authentication problem than for paper
records.” In re Vee Vinhee, 336 B.R. 437 (9th Cir. BAP (Cal.)
2005).
– Creditor sought to prove up debt after debtor defaulted,
but court refused to admit creditor’s electronic business
records into evidence because of a defective evidentiary
foundation
– Creditor’s records custodian could not testify in response
to questions about the nature and operation of the
computer system on which the records were maintained
41
Lorraine v. Markel American Ins. Co., 2006 U.S. Dist. LEXIS
33020 (D.Md. 2007).
•
After discovery, both parties moved for summary judgment to
enforce a private arbitrator’s award that damage to plaintiff’s
yacht was caused by lightning.
•
In denying both motions, the court held that emails attached to
both motions and offered as parol evidence were inadmissible
due to parties’ failure to lay the appropriate evidentiary
foundation.
•
Magistrate Judge Grimm noted that: “[C]onsidering the
significant costs associated with the discovery of ESI, it makes
little sense to go to all the bother and expense to get electronic
information only to have it excluded from evidence or rejected
from consideration during summary judgment because the
proponent cannot lay a sufficient foundation to get it admitted.”
42
Authentication & Admissibility
•
Traditional rules of evidence still govern the admissibility of ESI
such as email, IM, blog, and chat room evidence.
•
“[A]ppellant would have us create a whole new body of law just to
deal with emails or instant messages … but we see no justification
for constructing unique rules for admissibility of electronic
communications such as instant messages.; they are to be
evaluated on a case-by-case basis as any other document to
determine whether or not there has been an adequate foundational
showing of their relevance and authenticity.” In re F.P., 878 A.2d
91, 95 (P.A. Super 2005).
•
For ESI to be admissible, it must be: (i) relevant, (ii) authentic, (iii)
not hearsay or admissible under an exception to the hearsay rule,
(iv) an original or duplicate, or admissible as secondary evidence to
prove its contents, and (v) have a probative value that outweighs its
prejudicial effects.
43
ESI Authentication
•
To lay a proper foundation for a document, a party must
present evidence, direct or circumstantial, that shows that
the document is what it purports to be.
•
Under S. Ct. Rule 216(b), a party may serve on any other
party a written request for admission of the genuineness of
any relevant documents described in the request.
•
Illinois courts authenticate writings based on appearance,
contents, and substance.
44
ESI Authentication
•
Direct or circumstantial evidence can be used to
authenticate e-mails in various ways:
– Self-identification by the parties
– Ongoing exchange of e-mails by the parties
– Unique and personal nature of the e-mail
– Overt acts of parties in conjunction with an e-mail
– Direct or circumstantial evidence establishing author and
date of transmission
•
People v. Downin, 357 Ill.App.3d 193 (3d Dist. 2005).
45
ESI Admissibility
•
E-Mail:
– E-mails held to be inadmissible because there was neither direct nor
circumstantial evidence of their authenticity. CCP Limited Partnership v.
First Source Financial, Inc., 368 Ill.App.3d 476 (1st Dist. 2006).
•
Text Messages:
– Authentication was proper because phone number on text message
directly showed it was sent from aphone that defendant possessed and
contents included details only defendant would know. Dickens v. State,
175 Md.App. 231 (Md. Ct. Spec. App. 2007).
•
Chat Room Posts:
– State failed to lay adequate foundation for computer-generated
transcript of online chat between officer and defendant where state did
not establish accuracy of transcripts, efficacy of the ISP, or that officer
was competent operator of software used to generate transcript.
People v. Johnson, 376 Ill.App.3d 175 (1st Dist. 2007).
46
Hypothetical: The Threatening IM
From:
CubzFan4Ever83
Dude, peep this - things with my cheating g/f are FUBAR
Just wait til I see her F2F >:-II
Til death do us part, right? u FITB TTYL
Oct 17, 9:09 pm
47
Hypothetical: The Threatening IM
•
Relevancy & Identity
– Hearsay rules still apply
•
Authenticity
– Is the evidence what it purports to be?
•
Reliability
– Chain of custody
– Absence of fabrication or alteration
•
Lucidity
– Interpreting internet slang, chat room acronyms
48
What You Don’t Know Can Hurt You
•
Know when to engage technical assistance
– At the outset of the case:
• Complex technological issues
• Massive amounts of data
• Data collection or recovery issues
– Once ESI is produced:
• Review/process large amount of ESI
• Substantiate improprieties
– Before trial:
• Preserve chain of custody
• Assure proper authentication
• Explain technical issues to finder of fact
49
Conclusion
•
It pays to be prepared, and can cost you if you are not.
•
E-discovery will continue to evolve with changes in the law,
best practices, and technology.
•
These factors underscore the need to remain ahead of the
curve when it comes to the new paradigm of electronic
discovery.
50
Some Helpful Resources
•
http://www.law.com/jsp/legaltechnology/index.jsp
•
http://www.ediscoverylaw.com/
•
http://www.discoveryresources.org/
•
http://www.lexisnexis.com/applieddiscovery/default.asp
•
The Sedona Conference:
http://www.thesedonaconference.org/content/miscFiles/publications_html?g
rp=wgs110
•
Suggested Protocol for Discovery and Electronically Stored Information,
U.S. District Court for District of Maryland:
www.mdd.uscourts.gov/news/news/ESIProtocol.pdf
•
Managing Discovery of Electronic Information: A Pocket Guide for Judges:
http://www.fjc.gov/public/pdf.nsf/lookup/eldscpkt.pdf/$file/eldscpkt.pdf
51
Questions?
Martin T. Tully
Christina M. Morrison
Partner & National E-Discovery Practice Chair
Katten Muchin Rosenman LLP
Litigation Associate
Katten Muchin Rosenman LLP
52