Details

e-Discovery For Dummies


e-Discovery For Dummies


1. Aufl.

von: Carol Pollard, Ian Redpath

21,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 16.10.2009
ISBN/EAN: 9780470584071
Sprache: englisch
Anzahl Seiten: 368

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>Discover the process of e-discovery and put good practices in place.</p> <p>Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information. With the recent change to Federal Rules of Civil Procedure making all lawsuits subject to e-discovery as soon as they are filed, it is more important than ever to make sure that good e-discovery practices are in place.</p> <p><i>e-Discovery For Dummies</i> is an ideal beginner resource for anyone looking to understand the rules and implications of e-discovery policy and procedures. This helpful guide introduces you to all the most important information for incorporating legal, technical, and judicial issues when dealing with the e-discovery process. You'll learn the various risks and best practices for a company that is facing litigation and you'll see how to develop an e-discovery strategy if a company does not already have one in place.</p> <ul> <li>E-discovery is the process by which electronically stored information sought, located, secured, preserved, searched, filtered, authenticated, and produced with the intent of using it as evidence</li> <li>Addresses the rules and process of e-discovery and the implications of not having good e-discovery practices in place</li> <li>Explains how to develop an e-discovery strategy if a company does not have one in place</li> </ul> <p><i>e-Discovery For Dummies</i> will help you discover the process and best practices of managing electronic information for lawsuits.</p>
<p><b>Introduction 1</b></p> <p>Who Should Read This Book? 1</p> <p>About This Book 2</p> <p>What You’re Not to Read 2</p> <p>Foolish Assumptions 2</p> <p>How This Book Is Organized 3</p> <p>Part I: Examining e-Discovery and ESI Essentials 3</p> <p>Part II: Guidelines for e-Discovery and Professional Competence 3</p> <p>Part III: Identifying, Preserving, and Collecting ESI 4</p> <p>Part IV: Processing, Protecting, and Producing ESI 4</p> <p>Part V: Getting Litigation Ready 4</p> <p>Part VI: Strategizing for e-Discovery Success 5</p> <p>Part VII: The Part of Tens 5</p> <p>Glossary 5</p> <p>Icons Used in This Book 5</p> <p>Where to Go from Here 6</p> <p><b>Part I: Examining e-Discovery and ESI Essentials 7</b></p> <p><b>Chapter 1: Knowing Why e-Discovery Is a Burning Issue 9</b></p> <p>Getting Thrust into the Biggest Change in the Litigation 10</p> <p>New rules put electronic documents under a microscope 11</p> <p>New rules and case law expand professional responsibilities 12</p> <p>Distinguishing Electronic Documents from Paper Documents 14</p> <p>ESI has more volume 15</p> <p>ESI is more complex 15</p> <p>ESI is more fragile 16</p> <p>ESI is harder to delete 17</p> <p>ESI is more software and hardware dependent 18</p> <p>Viewing the Litigation Process from 1,000 Feet 18</p> <p>Examining e-Discovery Processes 20</p> <p>Creating and retaining electronic records 20</p> <p>Identifying, preserving, and collecting data relevant to a legal matter 21</p> <p>Processing and filtering to remove the excess 22</p> <p>Reviewing and analyzing for privilege 22</p> <p>Producing what’s required 23</p> <p>Clawing back what sneaked out 23</p> <p>Presenting at trial 24</p> <p><b>Chapter 2: Taking a Close Look at Electronically Stored Information (ESI) 25</b></p> <p>Spotting the ESI in the Game Plan 26</p> <p>Viewing the Life of Electronic Information 27</p> <p>Accounting for age 27</p> <p>Tracking the rise and fall of an e-mail 29</p> <p>Understanding Zubulake I 30</p> <p>Taking the two-tier test 34</p> <p>Preserving the Digital Landscape 36</p> <p>Facing Sticker Shock: What ESI Costs 37</p> <p>Estimating hard and hidden costs 39</p> <p>Looking at the costs of being surprised by a request 40</p> <p><b>Chapter 3: Building e-Discovery Best Practices into Your Company 43</b></p> <p>Setting Up a Reasonable Defensive Strategy 44</p> <p>Heeding judicial advice 45</p> <p>Keeping ESI intact and in-reach 46</p> <p>Braking for Litigation Holds 48</p> <p>Insuring a stronghold 48</p> <p>Getting others to buy-in 49</p> <p>Holding on tight to your ESI 50</p> <p>Putting Best Practices into Place 51</p> <p>Forming Response Teams 54</p> <p>Putting Project Management into Practice 55</p> <p>Tackling the triple constraints 56</p> <p>Managing the critical path 57</p> <p>Maintaining Ethical Conduct and Credibility 57</p> <p><b>Part II: Guidelines for e-Discovery and Professional Competence 59</b></p> <p><b>Chapter 4: The Playbook: Federal Rules and Advisory Guidelines 61</b></p> <p>Knowing the Rules You Must Play By 62</p> <p>Deciphering the FRCP 63</p> <p>FRCP 1 63</p> <p>FRCP 16 63</p> <p>FRCP 26 65</p> <p>FRCP 33 and 34 66</p> <p>Applying the Rules to Criminal Cases 66</p> <p>F.R. Crim. P. Rule 41 71</p> <p>F. R. Crim. P. Rule 16 71</p> <p>F. R. Crim. P. Rule 17 and 17.1 71</p> <p>Learning about Admissibility 71</p> <p>Lessening the Need for Judicial Intervention by Cooperation 73</p> <p>Limiting e-Discovery 74</p> <p>Finding Out About Sanctions 75</p> <p>Rulings on Metadata 77</p> <p>Getting Guidance but Not Authority from Sedona Think Tanks 79</p> <p>Collecting the Wisdom of the Chief Justices and National Law Conference 79</p> <p>Minding the e-Discovery Reference Model 80</p> <p>Following the Federal Rules Advisory Committee 81</p> <p><b>Chapter 5: Judging Professional Competence and Conduct 83</b></p> <p>Making Sure Your Attorney Gives a Diligent Effort 84</p> <p>Looking at what constitutes a diligent effort 84</p> <p>Searching for evidence 85</p> <p>Producing ESI 86</p> <p>Providing a certification 86</p> <p>Avoiding Being Sanctioned 87</p> <p>FRCP sanctions 87</p> <p>Inherent power sanctions 89</p> <p>Knowing the Risks Introduced by Legal Counsel 91</p> <p>Acting bad: Attorney e-discovery misconduct 91</p> <p>Relying on the American Bar Association and state rules of professional conduct 93</p> <p>Learning from Those Who Gambled Their Cases and Lost 94</p> <p>Policing e-Discovery in Criminal Cases 96</p> <p><b>Part III: Identifying, Preserving, and Collecting ESI 99</b></p> <p><b>Chapter 6: Identifying Potentially Relevant ESI 101</b></p> <p>Calling an e-Discovery Team into Action 102</p> <p>Clarifying the Scope of e-Discovery 104</p> <p>Reducing the Burden with the Proportionality Principle 107</p> <p>Proportionality of scale 107</p> <p>Negotiating with proportionality 108</p> <p>Mapping the Information Architecture 108</p> <p>Creating a data map 108</p> <p>Overlooking ESI 111</p> <p>Describing data retention policies and procedures 112</p> <p>Proving the reasonable accessibility of ESI sources 113</p> <p>Taking Lessons from the Mythical Member 113</p> <p><b>Chapter 7: Complying with ESI Preservation and a Litigation Hold 115</b></p> <p>Distinguishing Duty to Preserve from Preservation 116</p> <p>Following The Sedona Conference 116</p> <p>The Sedona Conference WG1 guidelines 117</p> <p>Seeing the rules in the WG1 decision tree 119</p> <p>Recognizing a Litigation Hold Order and Obligation 119</p> <p>Knowing what triggers a litigation hold 120</p> <p>Knowing when to issue a litigation hold 120</p> <p>Knowing when a hold delay makes you eligible for sanctions 122</p> <p>Accounting for downsizing and departing employees 122</p> <p>Throwing a Wrench into Digital Recycling 123</p> <p>Suspending destructive processes 123</p> <p>Where do you put a terabyte? 124</p> <p>Implementing the Litigation Hold 125</p> <p>Documenting that custodians are in compliance 127</p> <p>Rounding up what needs to be collected 127</p> <p>Judging whether a forensics-level preservation is needed 130</p> <p><b>Chapter 8: Managing e-Discovery Conferences and Protocols 133</b></p> <p>Complying with the Meet-and-Confer Session 133</p> <p>Preparing for the Meet-and-Confer Session 136</p> <p>Preservation of evidence 136</p> <p>Form of production 137</p> <p>Privileged or protected ESI 138</p> <p>Any other issues regarding ESI 139</p> <p>Agreeing on a Timetable 139</p> <p>Selecting a Rule 30(b)(6) Witness 140</p> <p>Finding Out You and the Opposing Party May Have Mutual Interests 141</p> <p><b>Part IV: Processing, Protecting, and Producing ESI 143</b></p> <p><b>Chapter 9: Processing, Filtering, and Reviewing ESI 145</b></p> <p>Planning, Tagging, and Bagging 146</p> <p>Taking a finely tuned approach 147</p> <p>Finding exactly what you need 147</p> <p>Stop and identify yourself 149</p> <p>Two wrongs and a right 150</p> <p>Learning through Trial and Error 151</p> <p>Doing Early Case Assessment 152</p> <p>Vetting vendors 153</p> <p>Breaking Out the ESI 154</p> <p>Crafting the Hunt 156</p> <p>Deciding on filters 156</p> <p>Keyword or phrase searching 157</p> <p>Deduping 157</p> <p>Concept searching 158</p> <p>Heeding the Grimm roadmap 158</p> <p>Sampling to Validate 159</p> <p>Testing the validity of the search 159</p> <p>Documenting sampling efforts 160</p> <p>Doing the Review 161</p> <p>Choosing a review platform 161</p> <p>How to perform a review 163</p> <p><b>Chapter 10: Protecting Privilege, Privacy, and Work Product 165</b></p> <p>Facing the Rising Tide of Electronic Information 166</p> <p>Respecting the Rules of the e-Discovery Game 166</p> <p>Targeting relevant information 167</p> <p>Seeing where relevance and privilege intersect 168</p> <p>Managing e-discovery of confidential information 170</p> <p>Listening to the Masters 172</p> <p>Getting or Avoiding a Waiver 172</p> <p>Asserting a claim 173</p> <p>Preparing a privilege log 173</p> <p>Responding to ESI disclosure 175</p> <p>Applying FRE 502 to disclosure 175</p> <p>Leveling the Playing Field through Agreement 177</p> <p>Checking out the types of agreements 177</p> <p>Shoring up your agreements by court order 178</p> <p><b>Chapter 11: Producing and Releasing Responsive ESI 181</b></p> <p>Producing Data Sets 182</p> <p>Packing bytes 183</p> <p>Staging production 184</p> <p>Being alert to native production motions 185</p> <p>Redacting prior to disclosure 187</p> <p>Providing Detailed Documentation 190</p> <p>Showing an Unbroken Chain of Custody 192</p> <p>Keeping Metadata Intact 193</p> <p><b>Part V: Getting Litigation Ready 199</b></p> <p><b>Chapter 12: Dealing with Evidentiary Issues and Challenges 201</b></p> <p>Looking at the Roles of the Judge and Jury 202</p> <p>Qualifying an Expert 202</p> <p>Getting Through the Five Hurdles of Admissibility 204</p> <p>Admitting Relevant ESI 204</p> <p>Authenticating ESI 205</p> <p>Self-authenticating ESI 206</p> <p>Following the chain of custody 206</p> <p>Authenticating specific types of ESI 207</p> <p>Analyzing the Hearsay Rule 208</p> <p>Providing the Best Evidence 210</p> <p>Probing the Value of the ESI 210</p> <p><b>Chapter 13: Bringing In Special Forces: Computer Forensics 211</b></p> <p>Powering Up Computer Forensics 212</p> <p>Knowing when to hire an expert 212</p> <p>Knowing what to expect from an expert 214</p> <p>Judging an expert like judges do 214</p> <p>Doing a Scientific Forensic Search 215</p> <p>Testing, Sampling, and Refining Searches for ESI 216</p> <p>Applying C-Forensics to e-Discovery 218</p> <p>Following procedure 219</p> <p>Preparing for an investigation 220</p> <p>Acquiring and preserving the image 222</p> <p>Authenticating with hash 223</p> <p>Recovering deleted ESI 224</p> <p>Analyzing to broaden or limit 225</p> <p>Expressing in Boolean 226</p> <p>Producing and documenting in detail 228</p> <p>Reinforcing E-Discovery 229</p> <p>Fighting against forensic fishing attempts 229</p> <p>Fighting with forensics on your team 230</p> <p>Defending In-Depth 231</p> <p><b>Part VI: Strategizing for e-Discovery Success 233</b></p> <p><b>Chapter 14: Managing and Archiving Business Records 235</b></p> <p>Ratcheting Up IT’s Role in Prelitigation 236</p> <p>Laying the cornerstone of ERM 236</p> <p>Pitching your tent before the storm 237</p> <p>Telling Documents and Business Records Apart 238</p> <p>Designing a Defensible ERM Program 240</p> <p>Designing by committee 240</p> <p>Starting with the basics 240</p> <p>Getting management on board with your ERM program 242</p> <p>Crafting a risk-reducing policy 244</p> <p>Punching up your e-mail policy 245</p> <p>Building an ERM Program 246</p> <p>Kicking the keep-it-all habit 248</p> <p>Doing what you say you are 248</p> <p>Getting an A+ in Compliance 249</p> <p><b>Chapter 15: Viewing e-Discovery Law from the Bench 251</b></p> <p>Examining Unsettled and Unsettling Issues 252</p> <p>Applying a reasonableness standard 252</p> <p>Forcing cooperation 253</p> <p>Looking at what’s reasonably accessible 254</p> <p>Determining who committed misconduct 254</p> <p>Exploring the Role of the Judge 258</p> <p>Actively participating 258</p> <p>Scheduling conferences 259</p> <p>Appointing experts 259</p> <p>Determining the scope of costs 262</p> <p><b>Chapter 16: e-Discovery for Large-Scale and Complex Litigation 263</b></p> <p>Preparing for Complex Litigation 263</p> <p>Ensuring quality control 265</p> <p>Getting a project management process in place 266</p> <p>Proving the merits of a case by using ESI 266</p> <p>Educating the Court about Your ESI 267</p> <p>Using summary judgment and other tools 268</p> <p>Employing an identification system 268</p> <p>Form of production 269</p> <p>Creating document depositories 269</p> <p>Avoiding Judicial Resolution 270</p> <p>Determining the Scope of Accessibility 271</p> <p>Doing a good-cause inquiry 272</p> <p>Cost-shifting 273</p> <p>Getting Help 274</p> <p>Partnering with vendors or service providers 274</p> <p>Selecting experts or consulting companies 274</p> <p><b>Chapter 17: e-Discovery for Small Cases 277</b></p> <p>Defining Small Cases that Can Benefit from e-Discovery 278</p> <p>Theft of proprietary data and breaches of contract 278</p> <p>Marital matters 278</p> <p>Defamation and Internet defamation 279</p> <p>Characterizing Small Matters 280</p> <p>Keeping ESI out of evidence 280</p> <p>Shared characteristics with large cases 281</p> <p>Unique characteristics and dynamics 282</p> <p>Proceeding in Small Cases 283</p> <p>Curbing e-Discovery with Proportionality 286</p> <p>Sleuthing Personal Correspondence and Files 286</p> <p><b>Part VII: The Part of Tens 289</b></p> <p><b>Chapter 18: Ten Most Important e-Discovery Rules 291</b></p> <p>FRCP 26(b)(2)(B) Specific Limitations on ESI 291</p> <p>FRCP 26(b)(5)(B) Protecting Trial-Preparation Materials and Clawback 292</p> <p>FRCP 26(a)(1)(C) Time for Pretrial Disclosures; Objections 293</p> <p>FRCP 26(f) Conference of the Parties; Planning for Discovery 294</p> <p>FRCP 26(g) Signing Disclosures and Discovery Requests, Responses, and Objections 294</p> <p>FRCP 30(b)(6) Designation of a Witness 295</p> <p>FRCP 34(b) Form of Production 296</p> <p>FRCP 37(e) Safe Harbor from Sanctions for Loss of ESI 297</p> <p>Federal Rules of Evidence 502(b) Inadvertent Disclosure 298</p> <p>Federal Rule of Evidence 901 Requirement of Authentication or Identification 298</p> <p><b>Chapter 19: Ten Ways to Keep an Edge on Your e-Discovery Expertise 301</b></p> <p>The Sedona Conference and Working Group Series 302</p> <p>Discovery Resources 303</p> <p>Law Technology News 303</p> <p>Electronic Discovery Law 304</p> <p>E-Discovery Team Blog 304</p> <p>LexisNexis Applied Discovery Online Law Library 305</p> <p>American Bar Association Journal 305</p> <p>Legal Technology’s Electronic Data Discovery 306</p> <p>Supreme Court of the United States 306</p> <p>Cornell Law School Legal Information Institute and Wex 307</p> <p><b>Chapter 20: Ten e-Discovery Cases with Really Good Lessons 309</b></p> <p>Zubulake v. UBS Warburg, 2003–2005; Employment Discrimination 309</p> <p>Qualcomm v. Broadcom, 2008; Patent Dispute 310</p> <p>Victor Stanley, Inc. v. Creative Pipe, Inc., 2008; Copyright Infringement 311</p> <p>Doe v. Norwalk Community College, 2007; the Safe Harbor of FRCP Rule 37(e) 312</p> <p>United States v. O’keefe, 2008; Criminal Case Involving e-discovery 313</p> <p>Lorraine v. Markel American Insurance Co., 2007; Insurance Dispute 314</p> <p>Mancia v. Mayflower Textile Services Co., et al., 2008; the Duty of Cooperate and FRCP Rule 26(g) 315</p> <p>Mikron Industries Inc. v. Hurd Windows & Doors Inc., 2008; Duty to Confer 316</p> <p>Gross Construction Associates, Inc., v. American Mfrs. Mutual Ins Co., 2009; Keyword Searches 317</p> <p>Gutman v. Klein, 2008; Termination Sanction and Spoliation 318</p> <p>Glossary 321</p> <p>Index 333</p>
<p><b>Linda Volonino</b> is an e-discovery consultant and computer forensics expert who aids lawyers and judges in preparing for e-discovery. She is coauthor of <i>Computer Forensics For Dummies.</i> <b>Ian Redpath</b> is an attorney with 32 years of litigation experience in federal courts. He consults on e-discovery.
<p><b><i>Learn to:</i></b> <ul> <li>Follow the correct steps in the e-discovery process</li> <li>Anticipate potential risks</li> <li>Develop an e-discovery strategy for your company</li> <li>Identify best practices in the event of litigation</li> </ul> <p><b>Be prepared for legal action! Learn about e-discovery rules, protections, and vulnerabilities</b> <p>Here are the issues, challenges, strengths, and limitations of e-discovery in an easy-to-understand guide. Find out how to identify, protect, and produce electronically stored information, prepare for litigation, avoid tainting evidence, and much more. It's a much better (and cheaper) way to learn about this hot legal issue than through experience! <ul> <li><b>What happened</b> — explore the legal changes that made e-discovery an issue and what they mean to you</li> <li><b>Your ESI IQ</b> — get a comprehensive look at your electronically stored information (ESI) and how to manage it effectively</li> <li><b>Set up a team</b> — assemble a team of employees from your IT and Legal departments and establish how to work together on important e-discovery projects</li> <li><b>Make a plan</b> — identify potentially relevant ESI and how to comply with litigation holds</li> <li><b>Put the plan into action</b> — preserve ESI, redact privileged info, and produce ESI in its native format, including metadata</li> <li><b>If you're challenged</b> — find out how to evaluate admissibility and document your evidence</li> <li><b>Be prepared</b> — build an electronic records management program and policy and monitor compliance</li> <li><b>Call for backup</b> — know when to bring in outside vendors and computer forensics specialists</li> </ul> <p><b>Open the book and find:</b> <ul> <li>Why you can't ignore e-discovery</li> <li>How to prepare for litigation</li> <li>Ten essential e-discovery rules</li> <li>How to create a data map</li> <li>What data to keep</li> <li>How to set up a document repository</li> <li>Suggestions for controlling your e-discovery costs</li> <li>How to review, process, and filter information</li> </ul>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €