Evidence in Legal Discovery Revolves Around Emails
A major portion of important electronic evidence in legal discovery revolves around emails – it’s still the primary way that we communicate with all business partners and colleagues, both internal and external. Email is the first and foremost source of “who said what when” and what work product did they share as part of those communications. Because every email is date and time stamped, it even helps self-document a chronology of events in the case!
The Pitfalls of Self-Collection
If you’re a litigator and you need to collect email from your custodians, it can be tempting to have them collect their own email. But that approach can cause problems and even lead to sanctions.
Rule 26(g) of the Federal Rules of Civil Procedure require the attorney to certify the results of the discovery response and clause 26(g)(3) calls for sanctions for improper certification of the discovery response. Here are links to two recent cases where Rule 26(g) violations occurred because counsel didn’t properly certify the production (the only reason that sanctions weren’t assessed in one of the cases is that there was still five months remaining before the discovery cut-off for the defendant to address the deficiencies). Similar rules exist for various state and local jurisdictions as well.
So, the attorney needs to be involved in collection and, unless that attorney knows how to collect ESI in a sound forensic manner, he or she needs the help of an expert to ensure proper forensic collection of the email.
Forensic email collection is the acquisition of email directly from the server holding the data or from a client that entirely syncs with it. The importance for a forensically sound email collection is that the electronic evidence is collected in a way that allows it to be self-authenticated. This means that when the records were collected from the original source, it can be proven: 1) what scope of data was collected, 2) how it was collected, 3) who it was collected by, 4) that there are log records included for any errors or exceptions, and 5) that there are generated native files with original metadata.
What Can Go Wrong When Self-Collecting Email
There are several pitfalls to having custodians self-collect emails or even having their IT departments handle the self-collection, including:
Conclusion
As you can see, a lot can go wrong when it comes to self-collection of email and the results can be disastrous in terms of sanctions. Next time, we’ll discuss the advantages of using a qualified forensic expert to ensure a forensically sound collection.