11.07.2015 Views

For The Defense, October 2010 - DRI Today

For The Defense, October 2010 - DRI Today

For The Defense, October 2010 - DRI Today

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ies, such as the types of data, how suchinformation is governed, and where relatedinformation may be copied. A data mapshould be up-to-date, a resource that setsout significant details of an organization’sdifferent active data creation and storagesystems—e-mail, instant messaging,voicemail, network storage and file servers,application and file types, workstationdistributions, remote user setup, and distributionof mobile devices—and backupprotocols for each system involved in thelitigation. Data maps should also includedetails on the names and roles of key datagatekeepers, the IT and records managementpersonnel who manage and controla company’s document creation anddestruction technologies. Some organizationsalready have data maps of their computersystems. <strong>For</strong> those organizationsthat do not, counsel will have to interviewrecord custodians and collect informationabout where and how the organizationsstore information and then use that informationto craft a data map for the litigators.It is also important to periodicallyupdate document searches to properlyadhere to the ongoing obligation for supplementalproduction. To help satisfy thisduty, parties can collect and preserve ESIby creating defensible copies of the evidence.It is possible to make copies of filesor create images of entire disk drives, segregateand store the information in a protectedrepository, and at the same timeeliminate cumulative information. Deduplicationand date metadata will allowcounsel to quickly identify new documentsfrom ones that were previously collectedto satisfy ongoing production obligations.With live products, a useful way toensure effective supplemental productionis to record the MP5 or SHA1 hash valueof all documents. In litigation involvingactively marketed products, the same documentsare often simultaneously editedby a client and prepared for production bycounsel. A company needs the ability toconsistently identify new and altered documents.Using the MP5 of SHA1 hash values,a company can create an exception reportto determine if changes to documents mayimpact the litigation.In helping to implement these collectionand production strategies, attorneys shouldnot worry about over- preserving. It costsonly a few thousand dollars to build a largeserver to host a copy of the data created ina live “production” environment. As longas the directory format for data in the productionenvironment is kept when copyingdata to the preservation server, mostprocessing software can capture all thenecessary fields to ensure a complete production.This process will also allow counselto quickly tag the files already collectedto identify new files. When it is time tocollect, counsel can connect an encryptedUSB device to the preservation server andtransport the relevant content for reviewand production.Third Steps: Keep It Privilegedand ConfidentialCounsel can protect against inadvertentdisclosures and limit turnover by identifyingall counsel and executing nonwaiveragreements.Identify CounselParties involved in the manufacture ofpharmaceutical or medical device productsshould take care to avoid unwanteddisclosure of documents. During the discoveryfor a live product, a company cangenerate many documents due to regulatorychanges. Members of the organizationtypically will communicate with a varietyof legal actors, such as liability attorneys,regulatory attorneys, and often, documentcounsel. In that environment, there is a realrisk that some documents will may mistakenlyreceive responsive tags, resulting ininadvertent disclosure.Although a party can move for thereturn of inadvertently disclosed information,a court may deny the request and findthat the disclosure waived privilege. See,e.g., Victor Stanley, Inc. v. Creative Pipe,Inc., 250 F.R.D. 251, 267–68 (D. Md. 2008)(holding that the disclosure of 165 documentsto an opposing party waived anyprivilege or work- product protection); Figurasv. P.R. Elect. Power Auth., 250 F.R.D.94, 98 (D.P.R. 2008) (holding the circumstancessurrounding a disclosure waivedany privilege regarding an inadvertentlyproduced document); Atronic Int’l, GMBHv. SAI Semispecialists of Am., Inc., 232F.R.D. 160, 164 (E.D.N.Y. 2005) (findingthat inadvertent disclosure of e-mails constitutedwaiver of attorney- client privilege).<strong>The</strong> efficiencies createdby automation andautomated documentationcan be significant.To prevent disclosure of documentscontaining attorney- client privileged orproprietary information, it is crucial toidentify all counsel involved with a clientand ensure that they maintain opencommunication with one another. A goodprophylactic measure is to create a comprehensivelist of attorney names, firm names,attorney domains, for example, “harrisbeach.com,”and common contractionsfor all firms, such as “Harris Beach,” andthen enter these terms into the litigationdocument review platform. All documentsin the platform can then be automatically“flagged” for all of the terms on that list. Asnew attorneys become involved in the litigation,counsel can perform another searchto flag new documents for additional privilegereview. Privilege reviewers can performan additional final review to uncoverany remaining documents tagged withprivilege flag terms that escaped noticeduring earlier reviews.Utilize Nonwaiver AgreementsAnother important tool for protecting sensitiveinformation is a nonwaiver agreement.Inadvertent production of privilegeddocuments is likely to occur during discoveryof electronically stored information.See Hopson v. Mayor and City Councilof Baltimore, 232 F.R.D. 228, 232 (D. Md.2005) (noting the volume and forms ofe-material make privilege review difficultand time- consuming). To prevent inadvertentdisclosures, parties can sign anonwaiver agreement. This agreement isessentially a contract, often in the formof a court order, stipulating that inadvertentdisclosure of privileged or proprietaryinformation, trade secrets, or employeematerials will not be considered a waiver.See id. (“agreements protect respondingE-Discovery, continued on page 84<strong>For</strong> <strong>The</strong> <strong>Defense</strong> n <strong>October</strong> <strong>2010</strong> n 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!