E-discovery: The 5 questions to ask yourself before you negotiate
There are five easy questions to ask yourself, and the other side, to get to the right result.
August 14, 2012 at 05:30 AM
13 minute read
The original version of this story was published on Law.com
So you're sitting on a ton of data and you remember we told you to confirm with the other side what you're reviewing to avoid problems down the road. But, what does that agreement look like and what does it need to contain? There are five easy questions to ask yourself, and the other side, to get to the right result.
The “right result” is commonly known as an ESI protocol. This relatively straightforward document sets out the expectations for both sides and is binding on the parties. Depending on the needs of your case, it can be a letter agreement, part of your Rule 26(f) case management plan or a stipulation filed with the court. Any deviation from this written agreement, whether it's to make the search more or less inclusive, requires mutual assent. It should answer the usual five questions: who, what, when, where and how?
Zealous advocacy during negotiations of the ESI protocol can be invaluable in reducing the scope and cost of discovery. While limiting your obligations should be a big focus, remember that you also have to obtain the documents you need from the other side. Asking the right questions and pursuing all the leads will ensure that their production to you is complete and comprehensive.
1. Who? The first question is: who has relevant documents? Invariably, one side wants a broad search of the files of every person who was even tangentially involved in the dispute, and the other side wants to focus on the key players. Remember that a commitment to review one additional custodian's data is a commitment to spend time and money. It is not uncommon for your employees to have 10 gigabytes or more of data in their email inboxes alone. Therefore, limiting the number of people whose data must be collected and reviewed can be the single biggest cost savings in e-discovery.
Don't forget shared data sources, such as networked servers, accounting systems and other platforms unique to your business. These sources may not map to a particular custodian, but if they contain relevant data, you have an affirmative obligation to produce it. On the flip side, you will want to make sure that their production to you includes these sources.
2. What? As in, what are the relevant materials? At its most basic, you need to ask whether the other side requires email, electronic documents or paper documents. A paper collection is intrusive, time consuming and requires scanning vendors. Electronic data can be collected fairly quickly and with minimal intrusion to the custodian. At this point, it is also important to establish that you only intend to produce reasonably accessible data. Likewise, if you need deleted documents, fragments in unallocated and slack space, offline storage systems, legacy systems and the like, you will need to get the other side to commit to this in advance.
After you've established the sources, you need to talk about the search terms you will be applying to the data. Search terms assist you in reducing the review set by focusing on documents that relate to the subject matter of the dispute. Just because a document contains a search term does not make it responsive—false hits are common. Remember to run the proposed terms and sample the results before you agree to them so you know what you are committing yourself to.
3. When? Defining the relevant time period is essential to narrowing the documents to be reviewed and produced. Date restrictions are objective and easy to apply to electronic data. Paper documents present different challenges in this regard, but if you can exclude entire warehouses of paper documents by examining the dates recorded on the outside of the box, it will be well worth the effort.
Knowing the relevant time period informs negotiations about what data is still available to be reviewed and produced. If potentially responsive documents only exist on backup tapes and other disaster recovery systems, you will need to be prepared to discuss with the other side the burdens—or if you are the requesting party, the benefits—associated with restoring that data.
If any data has been destroyed because it was purged pursuant to a document retention policy, you will have to justify the reasonableness of your policy, your adherence to it and when your preservation obligations were triggered.
4. Where? The Federal Rules require you to produce everything in your possession, custody or control. However, these lines are often unclear. Will the other side expect you to produce data from a custodian's PDA, personal email, home computer, instant messages or social media accounts? If relevant documents are in the possession of a third party, how will you address that? Data stored in the cloud is likely to be considered in your control, even if it is not in your possession, and you should work out a protocol for how it will be addressed.
Wholly or partially-owned domestic or foreign subsidiaries and affiliates may be in possession of relevant data. You would be wise to anticipate questions regarding what data is considered in your custody or control. You should also consult with data privacy experts who are knowledgeable about the foreign jurisdictions at issue. Violations of some foreign data privacy laws carry criminal penalties.
5. How? The previous questions focused on the sources of data, methods for culling the data and issues with obtaining it. The last question focuses on manner of producing it to the other side, the final step in the process. Reaching an agreement on how you will provide documents can avoid the most tedious discovery disputes. An agreement on how native files will be handled and the types of metadata you will produce can avoid annoying disagreements over format of production. Fortunately, standards have emerged in recent years as to how documents should be produced, and adherence to these standards is increasing.
Narrowing the issues
Even if you and the other side cannot agree on every single point and subpoint, going through the exercise of negotiating these items will benefit you in the long term. You will narrow the issues in dispute and be able to coherently present the topics on which you cannot agree. Further, you will be able to convey to the court reasonable attempts to resolve them and demonstrate that you have reached a consensus on many items. Your protocol can reflect the areas of disagreement, without automatically resulting in motions.
Remember that discovery is a marathon, not a sprint: The process frequently occurs in stages, and you can reserve your right to request the production of additional custodians' documents if your review of the first tier custodians' materials indicates that additional documents are warranted.
So you're sitting on a ton of data and you remember we told you to confirm with the other side what you're reviewing to avoid problems down the road. But, what does that agreement look like and what does it need to contain? There are five easy questions to ask yourself, and the other side, to get to the right result.
The “right result” is commonly known as an ESI protocol. This relatively straightforward document sets out the expectations for both sides and is binding on the parties. Depending on the needs of your case, it can be a letter agreement, part of your Rule 26(f) case management plan or a stipulation filed with the court. Any deviation from this written agreement, whether it's to make the search more or less inclusive, requires mutual assent. It should answer the usual five questions: who, what, when, where and how?
Zealous advocacy during negotiations of the ESI protocol can be invaluable in reducing the scope and cost of discovery. While limiting your obligations should be a big focus, remember that you also have to obtain the documents you need from the other side. Asking the right questions and pursuing all the leads will ensure that their production to you is complete and comprehensive.
1. Who? The first question is: who has relevant documents? Invariably, one side wants a broad search of the files of every person who was even tangentially involved in the dispute, and the other side wants to focus on the key players. Remember that a commitment to review one additional custodian's data is a commitment to spend time and money. It is not uncommon for your employees to have 10 gigabytes or more of data in their email inboxes alone. Therefore, limiting the number of people whose data must be collected and reviewed can be the single biggest cost savings in e-discovery.
Don't forget shared data sources, such as networked servers, accounting systems and other platforms unique to your business. These sources may not map to a particular custodian, but if they contain relevant data, you have an affirmative obligation to produce it. On the flip side, you will want to make sure that their production to you includes these sources.
2. What? As in, what are the relevant materials? At its most basic, you need to ask whether the other side requires email, electronic documents or paper documents. A paper collection is intrusive, time consuming and requires scanning vendors. Electronic data can be collected fairly quickly and with minimal intrusion to the custodian. At this point, it is also important to establish that you only intend to produce reasonably accessible data. Likewise, if you need deleted documents, fragments in unallocated and slack space, offline storage systems, legacy systems and the like, you will need to get the other side to commit to this in advance.
After you've established the sources, you need to talk about the search terms you will be applying to the data. Search terms assist you in reducing the review set by focusing on documents that relate to the subject matter of the dispute. Just because a document contains a search term does not make it responsive—false hits are common. Remember to run the proposed terms and sample the results before you agree to them so you know what you are committing yourself to.
3. When? Defining the relevant time period is essential to narrowing the documents to be reviewed and produced. Date restrictions are objective and easy to apply to electronic data. Paper documents present different challenges in this regard, but if you can exclude entire warehouses of paper documents by examining the dates recorded on the outside of the box, it will be well worth the effort.
Knowing the relevant time period informs negotiations about what data is still available to be reviewed and produced. If potentially responsive documents only exist on backup tapes and other disaster recovery systems, you will need to be prepared to discuss with the other side the burdens—or if you are the requesting party, the benefits—associated with restoring that data.
If any data has been destroyed because it was purged pursuant to a document retention policy, you will have to justify the reasonableness of your policy, your adherence to it and when your preservation obligations were triggered.
4. Where? The Federal Rules require you to produce everything in your possession, custody or control. However, these lines are often unclear. Will the other side expect you to produce data from a custodian's PDA, personal email, home computer, instant messages or social media accounts? If relevant documents are in the possession of a third party, how will you address that? Data stored in the cloud is likely to be considered in your control, even if it is not in your possession, and you should work out a protocol for how it will be addressed.
Wholly or partially-owned domestic or foreign subsidiaries and affiliates may be in possession of relevant data. You would be wise to anticipate questions regarding what data is considered in your custody or control. You should also consult with data privacy experts who are knowledgeable about the foreign jurisdictions at issue. Violations of some foreign data privacy laws carry criminal penalties.
5. How? The previous questions focused on the sources of data, methods for culling the data and issues with obtaining it. The last question focuses on manner of producing it to the other side, the final step in the process. Reaching an agreement on how you will provide documents can avoid the most tedious discovery disputes. An agreement on how native files will be handled and the types of metadata you will produce can avoid annoying disagreements over format of production. Fortunately, standards have emerged in recent years as to how documents should be produced, and adherence to these standards is increasing.
Narrowing the issues
Even if you and the other side cannot agree on every single point and subpoint, going through the exercise of negotiating these items will benefit you in the long term. You will narrow the issues in dispute and be able to coherently present the topics on which you cannot agree. Further, you will be able to convey to the court reasonable attempts to resolve them and demonstrate that you have reached a consensus on many items. Your protocol can reflect the areas of disagreement, without automatically resulting in motions.
Remember that discovery is a marathon, not a sprint: The process frequently occurs in stages, and you can reserve your right to request the production of additional custodians' documents if your review of the first tier custodians' materials indicates that additional documents are warranted.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'Serious Disruptions'?: Federal Courts Brace for Government Shutdown Threat
3 minute readLegal Departments Gripe About Outside Counsel but Rarely Talk to Them
4 minute readGC With Deep GM Experience Takes Legal Reins of Power Management Giant
2 minute readPreparing for 2025: Anticipated Policy Changes Affecting U.S. Businesses Under the Trump Administration
Trending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250