This Page

has been moved to new address

Document Retention Policies and Practices

Sorry for inconvenience...

Redirection provided by Blogger to WordPress Migration Service
----------------------------------------------------- Blogger Template Style Name: Snapshot: Madder Designer: Dave Shea URL: mezzoblue.com / brightcreative.com Date: 27 Feb 2004 ------------------------------------------------------ */ /* -- basic html elements -- */ body {padding: 0; margin: 0; font: 75% Helvetica, Arial, sans-serif; color: #474B4E; background: #fff; text-align: center;} a {color: #DD6599; font-weight: bold; text-decoration: none;} a:visited {color: #D6A0B6;} a:hover {text-decoration: underline; color: #FD0570;} h1 {margin: 0; color: #7B8186; font-size: 1.5em; text-transform: lowercase;} h1 a {color: #7B8186;} h2, #comments h4 {font-size: 1em; margin: 2em 0 0 0; color: #7B8186; background: transparent url(http://www.blogblog.com/snapshot/bg-header1.gif) bottom right no-repeat; padding-bottom: 2px;} @media all { h3 { font-size: 1em; margin: 2em 0 0 0; background: transparent url(http://www.blogblog.com/snapshot/bg-header1.gif) bottom right no-repeat; padding-bottom: 2px; } } @media handheld { h3 { background:none; } } h4, h5 {font-size: 0.9em; text-transform: lowercase; letter-spacing: 2px;} h5 {color: #7B8186;} h6 {font-size: 0.8em; text-transform: uppercase; letter-spacing: 2px;} p {margin: 0 0 1em 0;} img, form {border: 0; margin: 0;} /* -- layout -- */ @media all { #content { width: 700px; margin: 0 auto; text-align: left; background: #fff url(http://www.blogblog.com/snapshot/bg-body.gif) 0 0 repeat-y;} } #header { background: #D8DADC url(http://www.blogblog.com/snapshot/bg-headerdiv.gif) 0 0 repeat-y; } #header div { background: transparent url(http://www.blogblog.com/snapshot/header-01.gif) bottom left no-repeat; } #main { line-height: 1.4; float: left; padding: 10px 12px; border-top: solid 1px #fff; width: 428px; /* Tantek hack - http://www.tantek.com/CSS/Examples/boxmodelhack.html */ voice-family: "\"}\""; voice-family: inherit; width: 404px; } } @media handheld { #content { width: 90%; } #header { background: #D8DADC; } #header div { background: none; } #main { float: none; width: 100%; } } /* IE5 hack */ #main {} @media all { #sidebar { margin-left: 428px; border-top: solid 1px #fff; padding: 4px 0 0 7px; background: #fff url(http://www.blogblog.com/snapshot/bg-sidebar.gif) 1px 0 no-repeat; } #footer { clear: both; background: #E9EAEB url(http://www.blogblog.com/snapshot/bg-footer.gif) bottom left no-repeat; border-top: solid 1px #fff; } } @media handheld { #sidebar { margin: 0 0 0 0; background: #fff; } #footer { background: #E9EAEB; } } /* -- header style -- */ #header h1 {padding: 12px 0 92px 4px; width: 557px; line-height: 1;} /* -- content area style -- */ #main {line-height: 1.4;} h3.post-title {font-size: 1.2em; margin-bottom: 0;} h3.post-title a {color: #C4663B;} .post {clear: both; margin-bottom: 4em;} .post-footer em {color: #B4BABE; font-style: normal; float: left;} .post-footer .comment-link {float: right;} #main img {border: solid 1px #E3E4E4; padding: 2px; background: #fff;} .deleted-comment {font-style:italic;color:gray;} /* -- sidebar style -- */ @media all { #sidebar #description { border: solid 1px #F3B89D; padding: 10px 17px; color: #C4663B; background: #FFD1BC url(http://www.blogblog.com/snapshot/bg-profile.gif); font-size: 1.2em; font-weight: bold; line-height: 0.9; margin: 0 0 0 -6px; } } @media handheld { #sidebar #description { background: #FFD1BC; } } #sidebar h2 {font-size: 1.3em; margin: 1.3em 0 0.5em 0;} #sidebar dl {margin: 0 0 10px 0;} #sidebar ul {list-style: none; margin: 0; padding: 0;} #sidebar li {padding-bottom: 5px; line-height: 0.9;} #profile-container {color: #7B8186;} #profile-container img {border: solid 1px #7C78B5; padding: 4px 4px 8px 4px; margin: 0 10px 1em 0; float: left;} .archive-list {margin-bottom: 2em;} #powered-by {margin: 10px auto 20px auto;} /* -- sidebar style -- */ #footer p {margin: 0; padding: 12px 8px; font-size: 0.9em;} #footer hr {display: none;} /* Feeds ----------------------------------------------- */ #blogfeeds { } #postfeeds { }

Wednesday, March 19, 2008

Document Retention Policies and Practices

I recently found a checklist for Document Retention Policies and Practices written by Cecil A. Lynn III, Director of Industry Relations at LexisNexis Applied Discovery. And although this list is not comprehensive, it provides an extremely strong foundation up which to build your organizations list. Following is his list:

1. Maintain Document Retention Policies And Practices.
Every company should have a comprehensive, regularly audited document retention policy. The policy not only sets forth the procedures for the uniform and timely destruction of documents - both electronic and paper - but also establishes a consistent plan that is applied company-wide. A good document retention policy coupled with vigilant enforcement may be a company's best defense against claims of spoliation of evidence. The Federal Rules offer safe harbor for companies that lose data during the routine, good-faith operation of their electronic information systems. See FRCP 37(f). The "routine" requirement may be evidenced, in part, by a document retention policy. Counsel should review the company's retention program to ensure that it is current, applies to all employees in all locations, and is regularly monitored and enforced.

2. Understand The Corporation's Electronic Information Systems.
Case law underscores the need for outside counsel to become familiar with their client's electronic information and data retention architecture. See Phoenix Four Inc. v. Strategic Resources Corp., 2006 U.S. Dist. LEXIS 32211 at * 16-17 (S.D.N.Y. 2006) and Zubulake v. UBS Warburg, LLC, 229 F.R.D. 422, 432 (S.D.N.Y. 2004). The responsibility is even greater for in-house counsel who often provide a necessary link between the company's information technology (IT) department and outside counsel. Thus, corporate legal departments should develop a solid working relationship with the company's IT department and an understanding of the company's IT systems. Such an understanding is vital to the successful implementation of a document retention policy and will prove invaluable in evaluating preservation efforts in litigation.

3. Implement And Monitor Litigation Hold Procedures, When Appropriate.
The notion of document and information preservation is not something new to corporations. Several regulations impose preservation requirements on certain companies for the retention of documents and, in some cases, impose criminal penalties for their unlawful destruction. At common law, a company has a duty to preserve documents and electronic data when it "knows or reasonably should know" that information may be relevant to pending or anticipated litigation. Zubulake v. UBS Warburg, LLC, 220 F.R.D. 212, 216 (S.D.N.Y. 2003). Once litigation is anticipated, a party must suspend its routine document retention/ destruction policy and put in place a litigation hold to preserve what it knows, or reasonably should know, is relevant to the action. See Hynix Semiconductor, Inc. v. Rambus, 2006 U.S. Dist. LEXIS 30690, *66-67 (N.D. Cal. 2006) and Samsung Elecs. Co. v. Rambus, 2006 U.S. Dist. LEXIS 50007, *96-99 (E.D. Va. 2006).

Corporate counsel must determine appropriate trigger points for "anticipation of litigation" and develop litigation hold procedures to implement upon such triggers. See Cache La Poudre Feeds, LLC v. Land O'Lakes, Inc., 2007 U.S. Dist. LEXIS 15277 at *23-24 (D. Co. March 2, 2007); see also Heng Chan v. Triple 8 Palace Inc., 2005 U.S. Dist. LEXIS 16520 at *16 (S.D.N.Y. 2005) (counsel has an obligation to monitor compliance with the company's preservation obligations). Counsel should be proactive and ensure that litigation hold procedures are being complied with.

4. Communicate With Key Custodians And Key Data Stewards.
When practical, counsel should communicate face-to-face with key players to make sure that they understand the seriousness of the preservation obligation and the consequences of destruction of potentially relevant evidence. Counsel should inquire about the potential witnesses's personal practices for document management and retention and determine whether it is consistent with company policy and determine whether the individual keeps potentially discoverable material on sources that are not online with the company's computer systems (e.g., home computer, PDA, pocket drive, etc.) Most importantly, counsel must explain the custodian's ongoing preservation obligation. A written litigation hold notice should be sent to these individuals that reminds them of their responsibilities under the company's document retention policy and specifically cautions them to refrain from altering, modifying or deleting potentially relevant information.

Counsel should also communicate with the "data stewards" - the IT staff who manage the resources on which key players create/store corporate data. Discuss whether it is appropriate or necessary to take a mirror image of the relevant storage devices and make sure that any auto-delete functionality is disabled. Counsel and IT should make sure that relevant active files are not deleted, converted to backup tape, or otherwise downgraded. Metadata should be preserved, even if the determination has not yet been made to produce it.

5. Establish An E-Discovery Committee.
In-house counsel should consider putting together a team with representatives from the IT department, records management, corporate compliance and the legal department to develop and implement an action plan for litigation involving electronic discovery. This team will be responsible for keeping the legal department apprised of procedural or staff changes that impact document retention policies, including any litigation holds in place. The IT representatives would advise of the latest technologies acquired by the company that impact data storage or relate to the company's document retention program.

Counsel may also want to interview and train potential Rule 30(b)(6) witnesses, ideally members of the committee who have knowledge and can effectively articulate their expertise with all aspects of the company's computer processing and storage capabilities.

6. Implement A Plan To Maintain Data Formats And Map Data Sources.
Electronic information can be maintained in a variety of formats and on multiple types of media. Corporate counsel should work closely with the IT department to determine how information is preserved and whether data is converted or degraded for storage or archival purposes. Counsel should also be aware of the range of potential sources for relevant information and collaborate with IT to develop a "data map" which profiles the company's sources and locations of electronically stored information. A data map can set out in detail the company's different active data creation and storage systems and give valuable insight into the potential cost - in terms of time and money - of preserving and collecting the information. Data mapping profiles may include details about:

  • the applications and file types in use at the company, including details on proprietary or unique applications and integrated databases - particularly business-critical applications or those which are likely targets of discovery;
  • the range of electronic communications, such as: email, instant messaging, voicemail, and Voice Over Internet Protocol applications, and including details about server organization, physical locations, and backup protocols for each;
  • network storage and file servers, including information about server organization, physical location, and backup protocols;
  • workstation distributions and configurations;
  • remote user set-up (i.e., are employees able to VPN in from their home computers?);
  • distribution and use of mobile devices, including laptops and PDAs, with specific attention to whether data on such devices is captured or "synched" in any formal fashion.

7. Establish A Collection Methodology So That Responsive Data Can Be Securely Stored Prior To Processing, Review And Production.
There are several collection methodologies and technologies that can realize significant cost savings for corporations. In-house counsel should explore these techniques to determine if they are right for the company. For example, corporations can establish a "black box" service on which duplicate copies of relevant emails are automatically stored. The black box reduces the risk of deletion. If the company is involved in multiple pieces of litigation where the same documents are at issue, counsel may want to consider building a central data repository. Document repositories can save the corporation time and money as the company may need to review the documents only once and information about the documents such as relevance, privilege, Bates stamps and redactions can all be retained and reused in subsequent litigation.

8. Determine What Information Is Not Reasonably Accessible Due To Undue Burden Or Cost.
While the general rule is that parties may obtain discovery on any matter relevant to the claims or defenses involved in the case, see FRCP 26(b)(1), the rules offer limitations where data sources are not reasonably accessible due to undue cost or burden. See FRCP 26(b)(2)(B). However, even if the data sources are deemed not reasonably accessible, the court may still order production and set conditions on the requested production, including cost shifting. See FRCP 26(b)(2).

A data map will assist counsel in the determination of whether data sources are arguably not reasonably accessible. Counsel should also discuss the potential cost and burden with their IT department and a data collection specialist to determine whether selective restoration or sampling of inaccessible data is appropriate. For some data, restoration may still be cost prohibitive given the amount at stake in the litigation.

9. Take Proactive Steps To Prevent The Potential Inadvertent Production Of Privileged Documents.
The sheer volume of electronically stored information that may be produced in litigation increases the risk of inadvertent production of privileged or protected documents. However, there are steps that corporate departments can take prior to litigation to reduce the risk of inadvertent production. If practical, privileged documents can be segregated, coded, or tagged in the ordinary course of business thereby reducing the risk that they will be commingled with non-privileged data. Boilerplate tags and footers that read "attorney-client privilege" may be insufficient to identify a protected document, particularly if the tag is automatically and indiscriminately applied to every email generated from a particular user.

10. Communicate Regularly With Outside Counsel.
In-house counsel must fully understand the company's preservation, collection and production procedures relating to electronically stored information and be able to discuss them with their outside counsel. This is particularly important in the beginning stages of litigation when the parties meet and confer under Rule 26(f). In-house counsel may want to be present during this conference to assist outside counsel. Of course, the extent of counsel's involvement may vary depending upon the size and complexity of the case, the amount of the controversy, the location of the litigation and the volume of potentially relevant data.

As corporate counsel get more involved in the corporation's litigation matters and document retention policies and practices, they will feel more confident and comfortable with the electronic discovery-related changes to the Federal Rules of Civil Procedure. Education and communication are two keys to litigation preparedness. Both will make certain that the legal department can make reasonable and defensible choices regarding the collection, preservation and production of documents in litigation.

Labels: , , , , , , , , , , , ,

1 Comments:

At September 9, 2008 at 5:14 PM , Blogger 0s0-Pa said...

i agree that almost every company should have some form of document retention software. The only downside is how expensive it is :/ most small-medium businesses cant afford such software.

 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home