1 / 6

Session 12: Receiving a Production

Session 12: Receiving a Production. LBSC 708X/INFM 718X Seminar on E-Discovery Jason R. Baron Adjunct Faculty University of Maryland April 12, 2012. War Stories. “Data Dumps” circa 1980 U.S. v. Philip Morris (2002) -- precedent for “open discovery” and Fed R. Evi . 502.

cid
Download Presentation

Session 12: Receiving a Production

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Session 12: Receiving a Production LBSC 708X/INFM 718X Seminar on E-Discovery Jason R. Baron Adjunct Faculty University of Maryland April 12, 2012

  2. War Stories “Data Dumps” circa 1980 U.S. v. Philip Morris (2002) -- precedent for “open discovery” and Fed R. Evi. 502

  3. What do requestors want, and how do they obtain it? • Revisiting Complaints and the discovery process • Demanding preservation: sending hold letters and appearing at meet and confers • Vehicles for delivery allowed under the Federal Rules of Civil Procedure • Forms of questions • Legit and illegit goals of discovery: costs, burden, settlement

  4. Kinds of questions the requestor should ask of himself/herself Do I understand what ESI types are involved in this case, and what I need to prove up factual allegations? Is metadata going to be important? Do I need deleted ESI? Will backup tapes be relevant? Do I need the production to be in an electronic format? What kind of format?

  5. Attempting to limit costs & burdens • Narrowing the subject matter of the request to specific ‘claims’ or ‘defenses’ of the case. • Limiting discovery to specific individuals or components of organizations • Limiting search protocol to specific file types, custodians, timeframes. • On site inspections vs. receiving data dumps • Agreeement with opposing side on what consists of inaccessible ESI; deduping, etc.

  6. Designing a better “requestor” process • Employing project management • Use of experts • Changing the forms of questions posed • Cooperation re search protocols • Using advanced search tools and technologies

More Related