Friday, June 05, 2015

ARMA -- Records management responsibility in litigation support



  • This one really has the potential to be a ripper! One of my colleagues saw this in on my desk and shook his head. Records + Legal + IT… what could possibly be more interesting!
  • It's about 50 pages of goodness. The TOC looks fantastic. This thing really should be a standard reference for anyone who has concerns or questions about discovery.
  • Normative references: ARMA glossary, ISO 15489, ISO 23081, ANSI/ARMA 9-2004 (Reqs for Managing Electronic Messages), ANSI/ARMA 5-2003 (Vital Records).
  • Great glossary:
    • Litigants: everyone involved
    • Plaintiff: party that filed a complaint and requested relief
    • Defendant: party receiving complaint
    • Notice of dispute: when "a party in put on notice that litigation is likely"
  • Litigation process:
    • Birth.
      • Notice of dispute. Place appropriate holds.
      • Cease and desist letters or Preservation letters will do the same thing.
      • Litigation hold. Suspend normal retention and destruction. It could also apply to third-party individuals or companies.
      • Suit filed/Complaint
      • Answer filed (generally in 30 days). Each claim must be denied or responded to.
    • Discovery begins.
      • Rule 26(a). Turn over "a copy of, or a description by category and location of all documents, ESI, data compilations, and tangible things in the possession, custody, or control"
      • Rule 26(f). Parties must meet to discuss:
        • Nature of claims and defense
        • Arrange for initial disclosures
        • Establish discovery plan and schedule
        • Form of production
          • 34(b) permits requesting party to specify format
          • Otherwise, "a responding party must produce the information in a form or forms in which it is ordinarily maintained or in a form or forms that a reasonably usable"
          • Party only has to produce one electronic form
          • Formats: native Office (for meta-data); native email; PDF; TIFF
      • The court issues a scheduling order by which all parties are bound.
    • Types of requests:
      • Production of Documents and Things: electronic records, email, backup tapes, voice-mail messages
      • Interrogatories: questions that the defendant must answer
      • Affidavits: sworn statements
      • Expert witnesses and reports
      • Depositions:
        • 30(b)(6). Corporation can't speak so a party will designate an individual, generally regarding practices, policies, procedures, etc. Often a corporate officer, IT manager, or records custodian.
        • "Companies without clearly defined and implemented policies and procedures pertaining to their electronic records may find themselves in a discovery quagmire."
      • Privilege: Withholding or limiting access due to confidentiality, etc. Attorney communication is generally privileged; corporate counsel strategy is not.
      • Claw back: Agreement that privileged information discovered post-discovery can be brought back.
    • Discovery dispute resolution.
      • Common disputes:
        • Too broad
        • Too burdensome
        • Records accessibility: "A party need not provide discovery of ESI from sources that the party identifies as not reasonably accessibly because of undue burden or cost." A general bench mark is active electronic files stored on a network server or employee desktop.
        • Deleted records. Defendant must make best effort to protect against deletion including using a forensic expert.
        • Cost shifting. IT and RIM must generally swear an affidavit or give testimony.
      • Failure to comply may result in sanctions:
        • Monetary: "Corporations, especially large, sophisticated companies, are expected to have file plans, retention schedules, and litigation hold procedures in place."
        • Preclusion of evidence/witnesses.
        • Adverse inference: assume that the destroyed documents would have been harmful.
        • Default judgement or dismissal.
      • Spoliation:
        • Intentional spoliation e.g., preservation letter results in a "shred day". See Enron and Arthur Anderson.
        • Negligent spoliation may be penalized if practices are particularly backward.
        • Safe harbor. 37(f): "Absent exceptional circumstances, a court may not impose sanctions under these rules on a party for failing to provide electronically stored information lost as a result of the routine, good faith operation of an electronic information system."
    • Avoidance of claims of spoliation and sanctions
      • Policies:
        • Enterprise RIM policies and procedures
        • Retention/disposition schedules
        • Hold/investigation processes
        • Effective reporting
        • Internal audits
      • Evidence of preservation:
        • Authentication
        • Chain of custody
        • Silent witness theory. An expert will testify to the integrity of the data and ensure that it hasn't been altered or tampered with.
    • Discovery closes
    • Summary judgement. Most claims will settle.
    • Trial. Litigants may set up a war room to rehearse, set up demonstrations, etc.
    • Judgement/verdict.
    • Appeals.
    • Subsequent/related litigation/investigation
    • International litigation/investigation
  • Corporate RIM:
    • Work with legal
    • Roles include:
      • Attorney (internal/external)
      • SMEs
      • Top management
      • Records managers
      • Public communications
      • Technical custodians
      • End users
    • Preparation phase challenges:
      • Incompatible terminology between legalese and business users
      • Tough to find SMEs
      • Mandatory training is crucial
      • Employee notification
      • Off-site records notification
      • Audience determination for hold notification
      • Notification and communication of litigation
      • Hold support process management. Either RIM or Legal has to own it.
      • Where will the docs/records be stored?
    • Process details:
      • Capture the details of the hold:
        • Case name
        • Case description
        • Attorney in charge
        • Type of litigation
        • Litigation target
        • Records and information impacted
        • Format of records/information (paper, electronic. Microform)
        • Location of records to be retained
        • SME value for hold support
        • Dates of affected records/info
      • Communicate with management
      • Verify the process
  • Good detail on the law firm's strategy and approach:
    • Use a standard set of folders and a standard process
    • Pleadings index updates: headings -- Client matter name, case caption, case number, pleadings volume number, client/matter number; document item number; index document number;
    • Document prep for storage: remove drafts and extra copies; identify duplicates;
    • Maintain security and privacy for client records
  • Technology:
    • Need to support both the documents involved in litigation and the analysis
  • Validation:
    • General policies and procedures. "An excellent RIM program sitting n a shelf and not being followed is almost worse than not having a procedure or program at all."
    • Retention schedule
  • Process:
    • Case file creation
    • Conflicts checks
    • Trial team identification
    • Litigation hold orders
    • Document review strategy
    • Document review team/trial strategy
    • Pleadings and motions
    • Case law and court rules (with great citations): retention policies; spoliation sanctions; FRCP; discoverability; production format for electronic documents; timely production; timely review; admissibility and authentication; inadvertent production of privileged information
    • Discovery/scope and analysis of req'd docs
    • Paper and electronic document review: authenticity (integrity/not-altered; not forged); access (paper and electronic); demarcation and identification (pagination, Bates numbering); boundaries for electronic pagination (i.e., when is it a new document?) -- use logical document definition or LDD; branding (just file names?); privilege and redaction; indexing (date, author, subject, type); capture (OMR); document storage and security
    • Evidentiary material: no hearsay (e.g., probative, not prejudicial); chain-of-custody; use of Active Data Copy to maintain original folder-level metadata, etc.; Forensic Image Process; backup tape might require specialized Non-Native Environment Extraction (NNE); might require forensic specialist testimony.
    • Case conclusion: disposition; return of document; retention
  • Litigation process -- corporate
    • Subpoenas: subpoena ad tetificandum (testimony only) or subpoena duces tecum (bring relevant records)
    • Delivery must be appropriate
    • Custody and control -- third parties may also get a subpoena
    • There may be objections due to privilege (i.e., the third party doesn't have to produce)
    • Document preservation. Lawyers will typically issue a Notice to Preserve Evidence Letter
    • SOX, PCAOB, etc. can enforce criminal sanctions
    • Subpoena duces tecum -- Federal Rule of Evidence 803(6), "record custodian or other qualified witness" must personally deposition or trial to testify for authenticity.
  • Reqs for admission of business records (FRE 902(11)):
    • Qualification of the records custodian
    • Record made at or near the time of the occurrence
    • Record kept in regularly conducted activity as part of a process. FRE 902(11): "It is not enough that a particular employee regularly makes and keeps the records as his or her own practice because must be the regular practice of the business… to make and keep the record at issue."
    • Email may, or may not be, certifiable. Insufficient email control results in:
      • Inability to certify email
      • Inability to authenticate email
      • Inability to use email at trial
      • Having email excluded, leading to a negative inference from email loss or spoliation
    • Notice of requirement -- you must make anything you intend to introduce available to the other party
    • There must be some way of assessing completeness of the records set collected
  • Appendices:
    1. Sample Litigation -- new file checklist
    2. Sample preservation letter -- client
    3. Sample preservation letter -- third party/opponent
    4. Corporate RIM litigation support checklist
    5. Sample litigation document flow/filing guidelines
    6. Sample legal checklist

Overall, a great document!


0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home