Summary
Identification and preservation are the first and most fundamental phases of an electronic discovery effort. The duty of (identification and) preservation is a foundational concept in our legal system that grows out of the common law concept of “spoliation,” which is nearly 300 years old. Essentially, if courts exist to make determinations about disputed facts, and if the trier of fact must make those determinations using the available evidence, then no litigant should be allowed to gain advantage in those determinations by hiding or destroying relevant evidence before the trier of fact can consider it.
As we will see in numerous contexts, ESI spoliation remains a frequent issue – particularly in the gray area where new devices, applications, or services are transitioning from niche adoption to mainstream use. Hence the importance of these phases in an eDiscovery effort: almost every other type of failure can be fixed with adequate time and money, but once unique, relevant ESI is gone, it’s gone. In this free Practice Guide, Consilio Director of Education Matthew Verga, Esq., reviews the fundamentals practitioners need to know about identification and preservation to fulfill this duty.
In this Practice Guide
- Triggers and Applicable Rules
- The Role of Legal Holds
- Common Pitfalls
Key Insights
- The Very Broad Potential Scope
- The Importance of Imagination and Investigation
- Key Steps Beyond Legal Holds
Practice Guide Download
About the Author
From the author
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.
When the Game is Afoot: Investigations and eDiscovery
The majority of eDiscovery work takes place in the context of litigation, but a significant amount of it takes place instead in the context of investigations. Although the available ESI and eDiscovery technologies are the same, the realities of handling investigations can be different in some ways important ways.