Amendments Should Safeguard Meta-Discovery

metadata_awareness_ribbon“American laws and American policy view the content of communications as the most private and the most valuable, but that is backwards today,” said Marc Rotenberg, the executive director of the Electronic Privacy Information Center, a Washington group. “The information associated with communications today is often more significant than the communications itself, and the people who do the data mining know that.”  
How the U.S. Uses Technology to Mine More Data More Quickly
, New York Times, June 8, 2013

Marc Rotenberg was commenting on the recent revelation that the U.S. National Security Agency gathers a staggering volume of information about domestic and international telephone calls.  When he states, “The information associated with communications today is often more significant than the communications itself…,” he doesn’t expressly label that “more significant” information as being “metadata,” but that’s what it is.

Rotenberg’s right: metadata matters. Continue reading

The Real Voyage of E-Discovery

The real voyage of discovery consists not in seeking new landscapes, but in having new eyes. – Marcel Proust

eye

E-discovery education is lawyers and judges teaching lawyers and judges the law of discovery, but little of the “e.”  This closed loop is unhealthy because it reinforces the misperception that understanding what makes digital different doesn’t matter.

But, of course it does.  

It’s human nature to set the standards for competence so that you meet them. No one wants to define themselves out of a job.  As a result, the trial bar keeps telling itself that grasping the bits and bytes of information technology is someone else’s problem…or not a problem.  “The top lawyers and judges out there don’t know that stuff, so it can’t be something a lawyer or judge needs to know.”  That’s the view through old eyes.

I dump on lawyers for ducking the obligation to to be competent in a world teeming with electronic evidence.  But I recognize that even the brave souls that try to cultivate new eyes for digital evidence are confounded by the paucity of e-discovery instruction affording equal stature to the technology.  Where do lawyers learn the very thing that makes e-discovery so daunting for them?  Where do they learn it in the unique context of trial practice and put their newfound skills into practice?

Right now, there’s probably only one answer to those questions: the Georgetown E-Discovery Training Academy, a weeklong program offered in early June, with the next Academy starting on June 2nd. Continue reading

Prooffinder: Touch the Monolith

Prooffinder_evolveIn the spring of 1968, my sixth grade class from suburban Eastchester went to the Loews Capitol Theatre at 51st and Broadway in New York City to see 2001: A Space Odyssey.  It was an unforgettable event.  Though much of the movie went over our ten-year-old heads, we got the message about tools and evolution when our hairy forebear flung his bone “hammer” aloft and it became a sleek spaceship.  We evolve to use tools, and the tools we use drive our evolution.

We can’t deal with electronic evidence without tools.  The more adept we are with those tools, the more adept we become with electronic evidence.  Tools that let us touch data—hold it up to the light and turn it this way and that—change the way we look at data.  Tools change us.

 I’m always preaching that lawyers must get their hands dirty with data and get back in touch with the evidence.  It’s a metaphor, but it’s also a manifesto.  A master builder needn’t swing every hammer; but, a master builder knows how a hammer feels in the hand. Continue reading

Abroad Reach

This post will have nothing to do with e-discovery or computer forensics, so feel free to pass it by.  I write this from 37°36.83’ N latitude and 025°40.65 W longitude, which puts me in the Azores, the first land I’ve seen in days, and a sign that Lisbon is less than a thousand miles away.  There are a fast diminishing two miles of Atlantic Ocean beneath our keel as we make way at 20 knots in light-to-moderate seas.

Though I would love to report that we are crossing under sail and I am at the helm; in fact, my wife and I are aboard the Royal Caribbean vessel, Liberty of the Seas on our 30th cruise and third Atlantic crossing.  We are using the Liberty as a means to get across the pond and enjoy some quick stops in Lisbon, Seville and Barcelona before making our way north to the Netherlands to catch a flower parade in Haarlem and roam Holland and Belgium by car.

We love going to and from Europe by ship.  There’s no jet lag, and it costs less than flying while delivering a far more civilized experienced than a seat in any carrier’s first class cabin.  Plus, there is nothing more relaxing than a week in the open ocean with no land in sight save brief glimpse of Bermuda.  No port stops.  No tenders.  No excursions.  And after so many cruises, no abiding need to attend any towel folding seminars or magic shows.  No compulsion to ride the surf simulator one more time or tour the bridge.  Been there.  Done that.

Instead, I’ve enjoyed sleeping in, taking breakfast in the cabin and watching tons of movies.  A cruise vacation can be almost anything you want it to be.  It can be a social experience, or a private one.  You can eat, drink and gamble like a Barbary pirate or eat spa cuisine, take Pilates and enjoy a state-of-the-art workout facility.  There’s live music of all sorts, and something to do (or ignore) from dawn to midnight.  There are lectures and pickup basketball games and production shows.  Food is served at some venue aboard at any time, so you needn’t be a slave to the ship’s schedule.

But there is no shuffleboard, and you can skip bingo, if you wish.

If you’d like to learn more about the cruising experience, my wife contributes to a site called Cruisecritics.com under the handle “Artemis;” so, read her thorough (and thoroughly enjoyable) reviews there.  Here is our cruising experience, in case you’re seeking information on a particular vessel or line:

1. Royal Caribbean Cruise Lines (RCCL) Liberty of the Seas – Transatlantic – April 2013
2. Celebrity Reflection – Holidays 2012
3. RCCL Freedom of the Seas – Western Caribbean – June 2012
4. RCCL Splendour of the Seas – Brazil & Argentina – Spring Break 2012
5. Pacific Sunrise – Whitsundays, Australia – November 2011
6. Cunard Queen Mary II – Westbound Transatlantic – July 2011
7. RCCL Oasis of the Seas Eastern Caribbean – Spring Break 2011
8. Celebrity Summit – Bermuda – August 2010
9. Celebrity Solstice – Eastern Caribbean – Spring Break 2010
10. Carnival Conquest – Western Caribbean – Holidays 2008
11. RCCL Liberty of the Seas – Eastern Caribbean – August 2008
12. Caribbean Princess – Eastern Caribbean – Spring Break 2008
13. Turkish Blue Cruise – Mediterranean – July 2007
14. RCCL Liberty of the Seas – 2-night pre-inaugural – May 2007
15. Grand Princess – Western Caribbean – Thanksgiving 2006
16. Carnival Conquest -– Western Caribbean – June 2006
17. Sun Princess – Southern Caribbean – Holidays 2005
18. Holland America Rotterdam – Baltics – July 2005
19. Carnival Miracle – Western Caribbean – June 2005
20. Abercrombie & Kent Sun Boat IV – Nile, Egypt – June 2004
21. Celebrity Millennium – Mediterranean – June 2004
22. RCCL Mariner of the Seas – Eastern Caribbean – Holidays 2003
23. RCCL Serenade of the Seas – Westbound Transatlantic – Maiden 08/04/03
24. Star Princess – Mexican Riviera – Holidays 2002
25. Dawn Princess – Alaska – July 2002
26. Norwegian Cruise Lines Star – Hawaii – June 2002
27. RCCL Rhapsody of the Seas – Western Caribbean – Holidays 2001 (TX-to-Aruba)
28. RCCL Rhapsody of the Seas – Western Caribbean – Holidays 2001 (Aruba-to-FL)
29. RCCL Explorer of the Seas – Eastern Caribbean – Holidays 2000
30. Norwegian Cruise Lines Sea – Western Caribbean – Holidays 1999

When Do You Buy T-Shirts?

choirI did an ILTA webcast this morning called “Going Native.” Steven Clark ably moderated the panel including Denise Talbert and Maureen Holland.  D4 sponsored.  Going Native did not mean we spoke in loincloths (although I can really only account for my own attire).  We addressed the pros and cons of producing ESI in native and near native forms versus conversion from native forms to TIFF images and load files.  I expected agressive pushback as I sang the praises (Just! Speedy! Inexpensive!) of native productions; but, steeled for debate, I was instead treated to fine dialog.  No one trotted out the usual hackneyed objections to native productions.  Advantages and disadvantages were thoughtfully addressed and everyone proved open to flexibility in forms of productions when to do so serves to meet a genuine need or solve a problem.

When polled, roughly half of those attending stated that they weren’t making production in native and near-native forms simply because the requesting parties hadn’t sought same.  Around 16% said they resisted native production out of concern that native productions were harder to track.  My sense is that the attendees were open–even eager–to embrace native production.  I wasn’t surprised by this because there are few audiences for e-discovery education as sophisticated and rational as ILTA audiences.  ILTA members tend to be hands on with ESI, affording them a better appreciation of the downsides of image and load file productions.  They’re typically the ones tasked with cleaning up the messes caused by malformed load files and TIFF creation errors.

That 16% missing out on the advantages of native productions out of concern that native files aren’t Bates stamped on each page distresses me because I’m sure they correspond to a much larger percentage of lawyers who can’t conceive of litigating without Bates numbers (and protective legends) on every page. It seems a lot of people don’t realize that you don’t have to give up Bates numbers and protective legends when you make native productions.  If you approach native productions the right way, the Bates numbers will still be there when you need them.  I’ll explain how that works, but first please indulge me in a little mental exercise. Continue reading

Cleary Counsels Clarity: Steps to Better Requests and Responses in Discovery

GropingA colleague flagged an opinion from the Northern District of Oklahoma she’d seen blogged on a big firm website. In the decision, the judge spoke dismissively of “apps” that must be responsible for those hairballs so common in discovery: vague requests and objection-obscured replies.  The blogger took the judge’s mention of apps too-literally, even noting that the judge failed to name the offending software.

I suspect those literary devices called irony and satire may have been lost on the blogger.  The court in Howard v. Segway, Inc. wasn’t saying both sides had actually used bad apps; instead, Magistrate Judge Paul J. Cleary was referencing the current fervor for apps metaphorically, as a means to convey that the more things change, the more they stay the same.  That is, whether you slavishly draw boilerplate from a paper form or program the same mindless twaddle into a document assembly app on your iPad, drivel remains drivel, and obstruction invites sanctions. Continue reading

Are Documents Containing Agreed-Upon Keywords Responsive Per Se?

More than once, I’ve faced disputes stemming from diametrically different expectations concerning the use of keywords as a means to identify responsive ESI.  I don’t recall seeing a case on this; but, it wouldn’t surprise me if there was one.  If not, there soon will be because the issue is more common than one might imagine.

When requesting parties hammer out agreements on search terms to be run against the producing party’s ESI, sometimes the requesting party’s expectation is that any item responsive to the agreed-upon keywords (that is, any item that’s “hit”) must be produced unless withheld as privileged.  Put another way, the requesting party believes that, by agreeing to the use of a set of keywords as a proxy for attorney review of the entire potentially-responsive collection, and thereby relieving the producing party of the broader obligation to look at everything that may be responsive, those keywords define responsiveness per se, requiring production if not privileged. Continue reading

Eight Tips to Quash the Cost of E-Discovery

8 tips[If this post seems a bit more basic than my usual in-the-weeds blather, it’s because this is taken from a CLE article I wrote for an upcoming panel discussion on “E-Discovery on a Budget.”  I’m particularly pleased with tips 7 and 8, and hope you’ll please share some of your own tips as comments.]

This really happened:
Opposing counsel supplied an affidavit stating it would take thirteen years to review 33 months of e-mail traffic for thirteen people.  Counsel averred there would be about 950,000 messages and attachments after keyword filtering.  Working all day, every day reviewing 40 documents per hour, they expected first level review to wrap up in 23,750 hours.  A more deliberate second level review of 10-15% of the items would require an additional two years.  Finally, counsel projected another year to prepare a privilege log.  Cost: millions of dollars.

The arithmetic was unassailable, and a partner in a prestigious law firm swore to its truth under oath. Continue reading

Busted! How Happy Accidents Help Forensic Examiners Prove Data Theft

datatheftA big part of my practice is assisting courts and lawyers in cases where it’s alleged that a departing employee has walked off with proprietary data. There’s quite a lot of that. Studies in the U.S. and abroad suggest that some two-thirds of departing white collar employees leave with proprietary data. So, it seems data theft is the norm.

Of course, not all data leaves with the requisite scienter (“evil intent”) to be called theft. In this wired world, who doesn’t have data on thumb drives, phones, tablets, backup drives, webmail accounts, legacy devices, media cards, CDs, DVDs, floppy disks and good ol’ paper? You work for a company a while and you’re going to end up with their stuff strewn all over your devices and repositories. But, few data theft lawsuits stem from stale data on forgotten media.

The “classic” data theft scenario is the after-hours mass movement of copious quantities of closely-guarded internal documents to an external USB hard drive or capacious thumb drive. While such actions look dastardly at first blush, a few dimmer bulbs may actually act with a pure heart, intending to take only their personal data (like family photos or music), but dragging entire folder families that also hold corporate ESI.

I tend to be skeptical of such claims unless the usage patterns that follow and other forensic evidence bear out the “I really thought it was just my stuff” defense.  It’s not hard to tell the difference, so long as devices aren’t lost or corrupted.

But you may be wondering: How do forensic examiners determine data was taken, and how do they identify and track storage devices used to carry away ESI? Continue reading

Pomp and Circumstance

Damn I'm GoodIt’s easy to get discouraged about the state of e-discovery education in America.  Within the bar, we trot out the same high level platitudes and shopworn caselaw at brief CLE sessions, omitting the technical content that lawyers desperately need but resolutely ignore.  So, it was heartening to be part of a weird and wonderful event this evening that restored a bit of my optimism.

Bill Hamilton, the Quarles & Brady partner from Tampa, is also Dean & Chairman of the Department of E-Discovery at Bryan University.  Bill has quietly and modestly made major contributions to e-discovery education in the United States, and I think it’s fair to label him the brains behind Bryan University’s flegling E-Discovery Project Management Certificate program.  It’s a splendid distance learning program, and whatever you may think about bricks-and-mortar universities versus their online counterparts, Bill and his distinguished Board and faculty have made sure that their classrooms of electrons preserve all the rigor of the ones made of atoms.

Dean Hamilton invited me to deliver the commencement address to the graduating class.  I was both flattered and flustered as I’d never given a commencement speech before and wasn’t sure how one would address the students and their proud family members and friends in a virtual environment.  I supposed it would be like a webcast, and it was, complete with my customary PowerPoint slides (Yes, it’s true I can’t sneeze without accompanying digital imagery). Continue reading