Harvard Law School Berkman Center for Internet & Society The Berkman Center for Internet & Society at Harvard Law School

DIGITAL DISCOVERY - PARTICIPANT RESPONSES SUMMARY

Below is a sample of a few major concerns that seem to flow throughout the participant responses. The summary is followed by a compilation of the responses received as of the planning meeting, divided by topic.

I. Questions and Problems
- Costs
- The Judiciary: Court-Sponsored Resolution/Balancing Tests
- Federal Rules of Procedure/Legal Doctrine
- International Discovery
- Scope of Digital Discovery/Data Retention and Preservation
- Technical Limitations of Lawyers/Evidence Authentication
- Privacy Concerns/Attorney-Client Privilege
II. What is Really at Stake
III. Hypotheticals
IV. Stories
- Attorney-Client Privilege
- Technical Issues
- Privacy
- Scope of Discovery
V. Discovery of Electronic Evidence
- Problems
- Solutions

I. Cost of Digital Discovery

Respondents, both practicing attorneys and the judiciary, seemed concerned with costs of digital discovery in terms of time and money.

Practitioners
- Who should pay the expenses, including attorney fees to redact privileged information from email?
Judiciary:
·- What are the specific costs "in dollars and man-hours" of discovery, about ways to reduce costs, and whether "digital discovery has made discovery more or less cost effective?"
·- How do courts resolve disputes when the party resisting discovery says compliance would put them in bankruptcy?

II. What is Discoverable/Scope of Digital Discovery

Respondents asked questions such as:
- Once request is served, exactly what aspects of digital data must parties preserve (all data from that point forward?)
- Are both private and personal data open to discovery on an employer's server? What data retention policy should employers adopt?
- What responsibility is there to restore deleted emails and "deleted drafts" in responding to document production?
- One respondent (Vincent Polley of Schlumberger) said the sheer magnitude of a worst-case scenario discovery request is immense, particularly for large multinational corporations. He fears such discovery could bring such a corporation "to its knees" and questions how to respond to such request and what is a reasonable policy.

III. Technical Limitations of Lawyers
- Are lawyers capable of asking the right questions to authenticate documents (to ensure they have not been changed)?
- If clients are writing and deleting emails, are lawyers supposed to keep track of this for production, and if so, how?

COMPILATION OF RESPONSES

QUESTIONS AND PROBLEMS

COSTS:

James Johnson (Procter & Gamble):
The biggest issue in digital discovery is burden, in my view. I think it's necessary, however, to properly define the nature of that problem. I describe this as "the last 1% problem."

In many cases digital discovery can actually be easier and more cost-efficient than paper discovery. Information is more directly accessible, search engines can be put on literally thousands of documents to identify those which may be relevant, and the product itself comes out in a digital format which is much easier to work with. It is the last 1% where the problems begin to build.

The technical people are better able to explain this, but requiring search and analysis of thousands of backup tapes, identifying all digital "packets" of information on a system and, of course, the whole process of "undeleting" deleted documents are a few examples of that last 1%.

It should also be made clear that the issue is not whether a party should have access to digital discovery. We/they have had such access since companies started using computers, and surely litigants have a right to this information and data. But at some point the benefit/cost equation gets completely out of whack.

I would suggest the technical members of the panel describe some of the "cost" side of the equation that may not be obvious to the casual observer. For example, placing search engines on large data bases can consume considerable capacity, I understand. There is a long list of these kinds of hidden costs. I think it would be very useful to bring these out in the open.

All of this leads to the fundamental question whether special rules should apply to the last 1% and, if so, what are they?

Rich (superior court):
I need to know what the cost of discovery is in dollars and man-hours as to specific tasks in as much specificity and detail as possible. If a price list/task cannot be provided I would like a range of examples of tasks performed and the costs to the parties. I would also like some analysis of how costs could be reduced. I would like examples of how digital discovery has made discovery more or less cost effective.

Henry Alsobrook (Adams and Reese):
The broad Request for Production to a client for all e-mails relating to a particular product. The time and expense necessary to reply. Should the requesting party be required to pay the expenses including the attorney fees to redact privileged information ?

Christopher Angius (Perkins Coie):
The enormous cost of responding to broadly-worded discovery requests for digital information tilts the litigation playing field against computer-dependent organizations.

Deborah Birnbach (Testa, Hurwitz & Thibeault, LLP):
How do we best protect clients from electronic discovery that is overly broad and tremendously expensive, e.g., producing tens of thousands of e-mail messages, while courts are reluctant to limit discovery? Courts are also reluctant to enforce proposals for litigants to share such expenses. This problem is exacerbated when the case contains frivolous claims or by an inbalance in the number of electronic documents each litigant has. Cases often settle because the expense of litigating has risen exponentially due to electronic discovery, and judges liberally interpret discovery rules for, among other reasons, encouraging settlement.

Joseph Parker (Taft, Stettinius & Hollister):
Is there emperical data that electronic discovery is more problematic or more expensive than traditional paper discovery?

Louis LaCour (Adams and Reese):
Under what circumstances does the requesting party have to shoulder the expense of recovering archived digital data?

Mike Withrow (Procter & Gamble Co.):
The overall burden, particularly to large global corporations, from broad electronic discovery requests. The "scope" issue must be addressed head-on and this must be done on a consistent basis throughout the country (e.g., one court acting reasonably is offset by another court not exercising its gatekeeping duties).

THE JUDICIARY: COURT-SPONSORED RESOLUTION/BALANCING TESTS

Rich (superior court):
How have courts resolved disputes when the side seeking discovery says just press the "right" button and the other side says compliance with the request will put us in bankruptcy?

James Garrity (Florida Office of the Attorney General):
One concern is the seeming ease with which adversaries can persuade courts to preclude or limit digital discovery. There remains in many courts a lingering feeling that to seek digital discovery is to intrude where one doesn't belong. The problem seems more prevalent in state courts, but can be found in federal courts as well. Mostly, there seems an underlying perception, off which opposing lawyers feed, that digital discovery is an unnecessary nuisance, is an extravagance, or is a tool of oppression.

Digital discovery can sometimes prove to be less of a headache if the proponent serves interrogatories and document requests specifically addressed to digital discovery (e.g., "Plaintiff's First Request For Production of Digital Evidence") This sharpens the focus of both the court and the adversary on what is to be produced and can minimize game-playing

John Carroll (U.S.D.C.(M.D.Al)):
From the standpoint of the judiciary, there are two issues that need to be addressed- education and the evolution of procedural rules. Most judges do not have the level of technical expertise to understand the complexities of digital discovery. Thus one important facet of any activity is judicial education - providing judges with the knowledge and resources they need to rule intelligently in digital discovery matters. The second important facet has to do with the rules of procedure. If the present rules are adequate, we need to explain to judges how those rules apply in the digital discovery area. If the rules are inadequate then changes must be made.

James McCrystal (Brzytwa Quick & McCrystal):
How to educate the judiciary about the differences between traditional paper searches and electronic searches for discovery materials. The knee jerk attitude that "its easy for me (says the judge)to do a word search on my desk top computer, so what is the problem with letting their expert sit at one of your computers to run his searches. After all, it won't cost you anything, your opponent is paying the expert for his time, not you"

FEDERAL RULES OF CIVIL PROCEDURE/LEGAL DOCTRINE

Kenneth Withers (Federal Judicial Center):
Does the advent of computer-based discovery raise issues that need to be addressed by changes in the Federal Rules of Civil Procedure or Federal Rules of Evidence, or are the problems and opportunities presented by computer-based discovery best processed through client/counsel/judicial education, and the process of adjustment to new media?

James McCrystal (Brzytwa Quick & McCrystal):
The Federal Rules of Civil Procedure are being or have been amended to limit the time of depositions, the number of depositions and the number of interrogatories but nothing has been done to set meaningful limits on document production requests. We need to get control of this problem before it becomes the Side Show that takes over the Big Top.

Anonymous submission: What rules should be adopted with respect to the question of the discovery of documents that are encrypted? Can/should a private key be subpoenaed in a civil case? In a criminal case?

Christopher Angius (Perkins Coie):
The Federal Judicial Center needs to form a task force to develope guidelines for litigants and the courts when propounding digital discovery requests and adjudicating disputes arising from such discovery.

Joseph Parker (Taft, Stettinius & Hollister):
A critical question posed is whether by rule or decisions a safe harbor can be created so that institutions can have a rational retention policy.

James Garrity (Florida Office of the Attorney General:
The terminology of the rules could be changed to reflect changes in technology. Although you can't find a "phono-record" in most music stores, you can still find them in F.R.C.P. 34(a). None of the general federal discovery rules, rules 26 through 37, even refers to computerized or digital evidence. The committee notes address this, but the committee notes are, well, just that and nothing more.

Benjamin Reeve:
Problem, more than a question: It is my view that digital recordings and other retained "semi-affixed" or "loosely affixed" copies of informational things are created and maintained substantially differently than non-digital recordings. It is therefore also my view that the discovery rules should also be substantially different. For example, I think certain privileges should obtain based upon the existence of circumstances tantamount to compulsion in the provision of certain information. Just as we treat "adhesive" contracts differently than we treat "negotiatied" contracts, I think we ought to treat adhesively-provided" information (which tends to be "digitally" recorded and encoded) differently than information provided in less forced condtions. For a second example, becuase digital information is so much more readily copied and transmitted, I think we should create certain rights in the provider that "follow" the information provided, and that discovery should meaningfully be subject to them. Comes the question: How is this quite proper, but substantantively different set of rules to be created an implemeneted?

Jay Bregman (Keble College, Oxford):
How will digital documents affect the so-called "best-evidence" rule? The hearsay rule?

Alfred W. Cortese, Jr. (Cortese PLLC):
What further amendments to the Federal Rules of Civil Procedure should be considered to reduce the costs and burdens of digital discovery and to increase its effectiveness?

Anonymous:
Will there be standard discovery for mass torts as opposed to individual tort actions?

John Carroll (U.S.D.C.(M.D.Al)): Whether the present rules of civil procedure provide sufficient tools for judges to manage digital discovery matters?

INTERNATIONAL DISCOVERY

Vincent Polley (Schlumberger):
The international dimension -- to what extent can a U.S. discovery request extend to laptops, desktops, and servers located outside of the U.S., and owned by affiliates (not subsidiaries) of the U.S. litigation party?

Lynne Miller (Procter & Gamble Co.):
Are there specific privacy considerations that apply to emails and other electronic documents of corporate defendant employees in the EU?

SCOPE OF DIGITAL DISCOVERY/DATA RETENTION AND PRESERVATION

Anonymous Submission:
Forget about "existing" e-mail for the moment. Once litigation starts, or a document request is served, does a party have to preserve, print and produce every e-mail which is thereafter created having anything to do with the case? If so, how can a company possibly locate, preserve, store or print and product all such records? Or will it be recognized that only records which are "saved" in some way need to be preserved and produced, not the instantaneous messages which often have very brief life spans (some times one minute or less)?

Anonymous Submission:
To what extent are email records (both content and transaction records) discoverable on an employer's server? Are all records discoverable or only those that have a reasonable relationship to the employers' mission? If the answer to the question is all emails (personal as well as business) are discoverable, then what type of record retention policy should the corporation adopt?

Anonymous Submission:
What responsibility does a company have to restore deleted e-mails or other deleted files in responding to a document production?

Lynne (Proctor & Gamble Co.):
When is it necessary to implement electronic document preservation efforts? When a complaint is filed and served? When a notice of claim is received? And what is the extent of those preservation efforts? Is it necessary to preserve all backup tapes of all containing all computer applications? What protections are offered by a corporate electronic document retention program?

Under what circumstances are parties required to restore "deleted" email messages and "deleted draft" documents? Are corporate defendants required to produce employees' home computer hard drives during litigation? What defenses are available to the employees?

Eoghan Casey (Yale University):
If we are required to provide "all e-mail messages related to X", are we just required to turn over messages that we know about or are we required to perform an exhaustive search of workstations, servers, backup systems, etc? Also, if a message is encrypted and we do not know what it contains, are we required to pry the message open to determine if it is discoverable?

Sidney Kanazawa (Pillsbury Madison & Sutro):
In responding to litigation discovery, to what degree must parties and courts preserve, produce, sort through, and evaluate the vast proliferation of electronic communications (from word processors and their multiple drafts to email, voicemail, CAD drawing systems, electronic spreadsheets, and electronic modeling) that are not indexed in the neat categories of written discovery requests?

Sidney Kanazawa (Pillsbury Madison & Sutro):
In the electronic world, the term document is used as a metaphor to help us transition from paper to computer based technology. In fact, a "document" can be a set of algorithms that have infinite permutations. For example, most products are designed on CAD systems today. There is no paper. You can ask the system to give you an infinite number of views of the product. When asked for all documents relating to a product, must a manufacturer give its proprietary CAD file or can it simply print out a few relevant views or ask an opponent to identify a few relevant views for printout. Should drafts be required for production? Systems today can be tapped for earlier versions but should parties be required to shoulder the burden of this horrendous expense. There may be embarrassing revelations within those drafts but if they were never sent, do we want those earlier concepts to tip the balance of justice?

Lawrence Solum (Loyola Law School):
What legal duties are there to preserve digital evidence that would otherwise be destroyed by the default operations of software? Mike

Withrow (Procter & Gamble Co.):
Given that e-mail is much like a telephone calls or personal chats by the water fountain (not necessarily associated with business issues), it is disturbing to me that unlimited discovery of e-mail is being ordered by some courts. These discovery orders have gone so far as to allow "re-creation" of what were thought to be deleted and discarded e-mail messages.

TECHNICAL LIMITATIONS OF LAWYERS/EVIDENCE AUTHENTICATION

James Garrity (Florida Office of the Attorney General):
The retention of an expert at the outset of a case in which digital discovery is expected to play a large role is a must. Such experts can help craft thoughtful discovery plans and requests that are more likely to pass muster with a court.

Liam Connelly (Lex Research):
Authentication of the record. It is my submission that lawyers are not adequitly informed on what questions to ask. The key issue is determining the evidence required to prove the document has not been changed.

Avniye Tansug (HDD/ IPRA):
The law must not run after the technology i.e. the real life. Since law supposed to bring order into life, even in an artistic way -remembering Roman Law- we must find a way to be in front of the real life or at least in a side by side position. One of the practical ways may be to start new departments by cooperating the communication technology depts in the universities while running this sort of crush-education programs such as Berkman's... Being a communication consultant and a former lawyer who's been trying to learn what's happenning around the cyber world, I must admit that I learned lots of thing through this site.

PRIVACY CONCERNS/ATTORNEY-CLIENT PRIVILEGE

Tuyet A. N. Tran (New York University):
How does an average user safeguard her/is privacy while using various digital media as a matter of course during the day. Admittedly, this is a very broad question but, how do the panelists define the elusive boundary of private vs. public (corporation or government) digital signals. Echelon was developed to perform such monitoring tasks, ostensibly to protect national interests. How is monitoring digital signals differ in concepts from some governmental officials routinely come into randomly selected homes just to look around. How would the panelists propose to address the fluid and dynamic changes of technology that are subjected to current body of rules?

Bryan Neft (Bower Greer & Panzarella, PC):
My question is really two parts. How do we ensure that a party which requests electronic data and further requests production of the actual computer to reconstruct deleted materials, only obtains those materials responsive to the request, and nothing beyond that scope? Also, how do we ensure that all documents recreated are ultimately deleted and wiped from computers which have processed or retrieved such discovery?

Bert Pogrebin (Rains & Pogrebin, P.C.):
How to protect the attorney-client privileged communications. Or does the new technology mean that such communications should not be communicated electronically?

James Garrity (Florida Office of the Attorney General):
The fact that important digital discovery may be in the hands of not the adversary but a third party (e.g., an ISP like AOL) in some other jurisdiction needs thought.

Avniye Tansug (HDD/ IPRA):
I think the most serious question here is the concept of "privacy" itself... Could the frames of this concept really be defined practically? The matter of "protection" comes after I believe... To what extent privacy is something sacrified? To what extent the discovery procedures may be extended? This is crucial. Because once it is decided to be "discovered", it seems that those frames could easily be broken by; * not so well technologically equipped law related people, even unintendedly, * techies, consciously, * other reasons (which I can not visualise right now)...

Joe Valentine (Wheeler Trigg & Kennedy):
I am concerned about attempts by discovering parties to obtain access to an opponnt's computer terminals (either directly or through an assigned employee of the opponetn) in order to conduct on-the-spot, ad hoc searches. I believe that such procedures fundamentally violate the applicable discovery rules and can raise constitutional issues of invasion of privacy, among other things.

II. WHAT IS REALLY AT STAKE:

Anonymous:
I'd like to know whether panelists believe that "digital discovery" is qualitatively different from traditional discovery, or if the differences are merely quantitative. If it is qualitatively different, in what ways?

Benjamin Reeve:
Digital discovery is one name for it, but the issue has really to do with rights in informational things generally, rights in databases as and when assembled, rights in records inevitably created by ordering a part for a machine or visiting a doctor. It is not really about what happens when there is a lawsuit, and one party wants discovery. Those principles will have to come from ideas and principles deeper in the structure of the law pertaining to informational things.

Sidney Kanazawa (Pillsbury Madison & Sutro):
In recent years, discovery has not been a tool for the gathering of information but instead it has become a weapon of war used to pummel an opponent to an economic surrender or surround an opponent with unanswerable adverse suggestion and innuendo arising from the failure to produce something in discovery. Electronic discovery only enhances this use of discovery. The sheer volume of items makes review of electronic discovery economically burdensome. And the opportunity for innocent missing items is exponentially increased.

Trials are not about objective truth or reality. It is absurd to think that 12 citizens sitting passively can find a single objective truth that has eluded the parties and their respective attorneys for years before trial. Trials are about deciding who is good and who is bad -- as between the parties before the court. It is a gut feeling about right and wrong dictated by 3 factors -- knowledge, power & ability, and intention & diligence. What did the parties know? What could they have done to avoid this problem? What was their intention? Were they diligent in fulfilling a good intention or were they only half-hearted in their effort? Regardless of the law, jury research tells us those are the questions jurors use to reach a just result.

Unfortunately, these factors could be used to argue for maximum electronic discovery. But this must be balanced against the speed of our internet world. Everything is moving faster today. Ironically, however, in the horse and buggy days of the 1800's, justice was faster than it is today. Final decisions by our highest courts are today normally rendered years (5-20 years) after the dispute provoking the litigation arose. By contrast, in the 1800's, the highest courts were considering disputes and issuing final judicial rulings on matters that arose MONTHS earlier. True, disputes were simpler. But we cannot ignore the fact that slow -- precise -- justice could render our judicial system irrelevant in the fast paced world of today. The rise in private mediation and arbitration is not an accident. It is a response to the need for quicker justice.

Since justice as we know it is not about determining objective truth but instead a gut assessment of right and wrong based on knowledge and evidence of hiding (almost every big verdict has some element of hiding by the defendant involved), we need to balance the burdens of discovery to not create injustice where none exists -- i.e. not create opportunities for opponents to use the economic and emotional weapons of discovery to slay an opponent without a legitimate basis in fact.

III. HYPOTHETICALS:

Kenneth Withers (Federal Judicial Center):
Several months ago, the number of email messages transmitted on a daily basis in the United States surpassed the number of telephone calls placed. Email, as opposed to telephone conversation, creates a written record. Each email message transmitted creates several duplicates as part of the transmission process, many of which are captured and stored on a more-or-less permanent basis in large, unstructured directories or files. At the same time, most corporations have restructured themselves in the process of adopting computer-mediated communications and business processes, to eliminate the traditional controls on record proliferation, such as records management procedures, central filing, and secretarial support. It seems as though this is a cultural problem outside the ambit of the courts to address, except perhaps to construct a "risk and reward" system to encourage the adoption of electronic records management and internal controls by businesses, institutions, and government.

Anonymous submission:
Company has been sued and has already responded to document request, including some effort to locate and produce existing e-mails on the subject of the case. After the production is made, employee A sends a mail to employee B discussing something pertinent to the case. Employee B responds and deletes A's message. A replies and deletes B's message. And so forth. Are the lawyers supposed to even know of those messages, much less find them, save them and produce them?

Vincent Polley (Schlumberger):
The sheer magnitude of a possible worst-case scenario is immense. Records include email and electronic documents, that travel around the world to employees of affiliates (and to contractors), that reside on laptops that move with re-located employees to new jurisdictions, that are (or may be) backed-up either directly or accidentally (e.g., when a mail server is backed up before it's delivered stored, incoming e-mail), and that may be forwarded as-is or may contain changes, annotations, and comments. A broadly enforced discovery request could bring a multinational to its knees -- reaching literally tens of thousands of computers, millions of terabytes of data, and thousands of individuals. What's are reasonable standards for multinationals to pursue? How to *IMPLEMENT* a reasonable policy? How to respond to an unreasonable discovery request?

Liam Connelly (Lex Research):
My hypothetical is based on Sabin Willets book "The Deal". In that book the story line developed when an electronic document was changed. The story shows how the changes to the e-doc were tracked. What rules can be put in place in order to determine if a document, which may have been subject to a hash encryption, was fiddled with just before it was printed? Do we need to be provided with both the hardcopy and edocs at discovery? It sounds a bit redundant. In the technological age we should be able to fully rely on the edoc. My concern is that there is still room to fiddle an edoc, do lawyers no enough to ask the right questions in discovery to fully determine the authenticity of the document. New Canadian federal evidence Act sections provide for affidavits from those who have knowledge of the edoc and the systems it comes from. These affidavits can be subject to cross examination. Do lawyers know enough to handle the technical questions required under the cross examination?

Jay Bregman (Keble College, Oxford):
Larry is an employee of a large research university which has a large, internally-managed email system. He has just discovered financial irregularities in the office in which he works, computing services. The information indicates that the director of the office has been engaged in shady dealings with private companies which violate both university policy and state and federal law. After questioning the director via email, he receives a directive (again via email) to "keep quiet." Larry prints a copy of this email for his records, but does not save a copy of the message locally. Larry attempts to report the incident further but is fired. He sues for wrongful termination. At trial, his lawyers seek to introduce the email as evidence. Mysteriously, all electronic copies of the message no longer exist. All that remains is a paper printout. The lawyer for the University objects to the introduction of such evidence. What ruling and why?

IV. STORIES

ATTORNEY-CLIENT PRIVILEGE

Henry Alsobrook (Adams and Reese):
Representing product manufacturers, I frequently receive Request for Production [of emails - which may require great effort/expense to redact privileged information]. Thus far there has been no solution except to file a Motion to Quash and take your chances on the Judge being educated enough to see the problem. State Court judges do not seem to grasp the enormity of the problem and are more likely to grant the plaintiff's Request.

Christopher Angius (Perkins Coie):
In a case involving allegations of securities fraud,a defense firm received a discovery request seeking the production of the hard drives from the computers of all lawyers who worked on a stock offering

TECHNICAL ISSUES

Anonymous submission: My favorite story about digital discovery is still the one that involved the Iran-Contra hearings. Oliver North learned the lessons between documents that were marked for deletion and documents which were completely erased.

PRIVACY

Bert Pogrebin (Rains & Pogrebin, P.C.): Client suspected that employee was spending time on her work station computer for personal business for majority of particular work day. When employee was questioned, she left work. Supervisor went into employees E-mail and foud that she had correspondence accepting a job elsewhere, that she had lied about the need for an emergency leave given her months earlier and her pending request for a leave was to give her time to try out her new job. Question was without notice that e-mail would be monitored, was the use of the discovered material a violation of Federal Law.

Jay Bregman (Keble College, Oxford): Dartmouth College was recently enveloped in a cheating scandal in an introductory computer science course. The professor issued a difficult assignment in which students were to program several lines of javascript. During the class period in which the assignment was handed out, the professor "unlocked" a portion of his website containing the answers to the assignment in an effort to explain how to arrive at the solution. Several students copied the URL and later accessed the site (which the professor forgot to re-protect for some time). Many students sought help from the teaching assistants. However, the difficulty of the problem was so great and the teacher's teaching so poor that when the TA's asked the professor for help, he simply handed them the solution on paper. They tried their best to help students complete the assignment.

After reading the solutions, the professor accused almost half the class (50+ students) of academic dishonesty. He claimed that those students either accessed the page shortly after class and copied the assignment or copied from one another. The professor requested the logfiles for his protected website to determine the exact computers around campus who had accessed the answers during the short period while they were unprotected. This request was granted, and these students, among others, were charged with plagarism and brought before the college judiciary body. The professor also requested access to every student's email account (which the college denied, citing personal privacy concerns). Some questions posed to the college judiciary were: Should the website logs be considered damning evidence of plagarism if they showed that a computer belonging to person x accessed the website improperly?

How can one distinguish students who cheated from those who simply sought help from the Teaching Assistants, who (not knowing how to do the assignment themselves) merely passed on the professor's answer? Further, some of the hits to the answer portion of the professor's website came from off-campus. Should the college be able to contact the ISP's of students living off campus to determine the names of students who accessed the site? Or is this "digital discovery" too destructive to personal privacy? In the actual case (written up in The Dartmouth as well as The Boston Globe), the charges were dropped for all students because the college judiciary committee found it impossible to determine who had cheated and who had obtained legitamate help from the TA's.

SCOPE OF DISCOVERY

Bryan Neft (Bower Greer & Panzarella, PC):
Recently, I had a case where the opposing party requested production of the computers of several executives of my client. In accordance with an agreement between the parties, the opposing party sent an "expert," if you could call him that, to retrieve any documentation responsive to the opposing parties discovery requests. However, there was no way to ascertain, except through the judgment of the expert, and without looking at the documentation, whether, in fact, such documentation was responsive. In addition, when all recovered electronic documentation was processed through the expert's computer, I was concerned that the processing left the documents on the expert's hard drive, even though he had agreed to place the documentation on a disk drive for me to review first. Therefore, I required the expert to delete all temporary files from his hard drive and to wipe the free space, to provide some measure of assurance that the expert would not walk away with either sensitive documentation or materials non-responsive to the request, prior to my being able to view the documents for responsiveness. My experience highlights the need for established rules to provide for destruction of all electronic records so that there is limited dissemination in connection with the case and to protect the party from whom discovery is sought. Also, because the expert in this case seemed somewhat inexperienced, should there be certain qualifications for computer experts who are retained to retrieve discoverable information from computer systems.

Joe Valentine (Wheeler Trigg & Kennedy):
I have represented parties in opposing discovery procedures in which a party seeks to gain access to an opponent's computer terminals and, at the terminal, to frame discovery requests "on the fly." I am aware that some corporations have stipulated (often under the gun of an unfavorable court order) to allow such discovery, although I don't know their resulting experiences. I have been involved in cases in which the court decided the dispute about the appropriateness of such procedures in different ways, although none of the courts gave any rationale for their conflicting decisions.

DISCOVERY OF ELECTRONIC EVIDENCE: PROBLEMS AND SOLUTIONS

PROBLEMS:

The Information Age:
The ever-expanding use of electronic communications combined with the ability to store massive quantities of such data has changed the landscape of discovery. Significant technical complexities create unique problems:

Burden: The enormous amount of information stored in electronic form can result in significant and unique burdens if it must be restored, reviewed or produced.

Cost: Costs increase by orders of magnitude depending on the type of media, the volume of data, the type of operating system, how the data is formatted, the condition of the media, and the amount of time for the search.

Business Disruption: Broad electronic discovery orders have the potential to cause significant business disruption if companies are forced to shut down, alter or otherwise disrupt data systems.

Preservation: Electronic data have raised unique and unsettled questions such as what preservation mechanisms must be put in place and when.

Privilege/Confidentiality/Privacy: Allowing broad access to computers and data files without proper consideration of non-discoverable content exposes privileged documents, trade secrets and other proprietary information to unnecessary disclosure.

SOLUTIONS:

Proposed Rules Changes:

In addition to stricter application of existing procedural rules governing electronic discovery, additional amendments should be considered:

Judge-vs.-Attorney Managed Discovery:
Adopt a rule that, recognizing the unique complexities, costs, and burdens of electronic discovery, requires such discovery to proceed only upon entry of a specifically tailored judicial order, based upon demonstrated, particularized need that substantially outweighs the costs and burdens of the discovery sought.

Presumptive Limits:
Adopt rules that create presumptive limits on how far back electronic searches can be ordered without good cause and that limit electronic searches only to relevant storage media, as opposed to broad, global searches of irrelevant data devices.

Cost-Bearing: Reconsider and revise the earlier proposed amendment on cost-bearing so that it acknowledges and specifically applies only to the unique burdens and costs associated with electronic discovery.

Other Comments: "Ranking" the above issues seems too arbitrary to be useful. All are important issues that need to be considered in analyzing the many problems presented by digital discovery and in devising practical solutions. Do you agree?