It’s safe to say electronic evidence—text messages, digital photos, cloud storage, and the internet of things—will be involved in every new case you have. As a result, it’s important you prepare to produce and request electronic evidence from the start of your case.
Early preparation for e-discovery doesn’t only reduce risk, it gives you the best odds of winning your case. Moreover, early preparation for e-discovery is the best antidote to clients who conceal facts or evidence from their own lawyers. Nothing matches the peace of mind you’ll experience from knowing all the facts, good or bad, before you start the formal discovery process.
In this post, I’ll cover two important preparatory steps: the client interview and opposition research.
When you begin working with a client on a new litigation matter, you’ll know something about the facts of the case, but next to nothing about the electronic evidence in your client’s custody. Even inadvertent destruction or modification of evidence can lead to heavy penalties or an outright dismissal of your case. To avoid spoliation, you’ll need a clear picture of what evidence your client has and where it lives.
In my practice, I helped clients understand the need for my questions by saying the following:
Tailor the questions from this checklist to your specific case. For example, if a business client was sued by a former employee, then you’ll gather more information about personnel records, compensation data, internal email, HR databases, and the plaintiff’s former workstation. On the other hand, if your client was involved in a slip-and-fall incident, you’ll focus more on SMS records, geolocation data, fitness tracker data (to verify injuries), and social media (to verify pain and suffering). Also, note that even though the focus is on e-discovery, treating paper documents as part of the same puzzle is a good practice.
Don’t let the questions listed limit your imagination or your follow-up questions in any way. Software and hardware is constantly evolving. Also be sure to take good notes. You’ll come back to them again and again as the case progresses. While your client may find the level of detail puzzling, a thorough interview pays dividends and is a necessary pre-condition for a strong preservation strategy.
Taking an inventory serves a defensive purpose, exposing what needs to be preserved and collected to provide iron-clad protections against spoliation claims. Here, we turn from defense to offense: gathering information from your client and other sources to help you map out enemy territory.
Effective opposition research for e-discovery draws from two often-overlooked sources: your client and Google.
In most cases, litigation parties knew each other before one of them decided to file suit against the other. These cases include business disputes, family law proceedings, employment cases, and worker’s compensation claims. (Personal injury and product liability lawsuits are common exceptions.)
If the parties had (or still have) a relationship, they probably know a lot about each other, and this knowledge often encompasses details that are extremely useful in e-discovery. For example, say that your client is a former employee of the defendant. You can ask the following questions:
On the other hand, if the opposition is an individual (perhaps you’re defending the business in the above example), the following questions can be helpful:
Another reason to ask your client questions like this is that judges expect you to obtain this sort of information. Too often, attorneys seek information in discovery that they could get from their own clients. This often comes up in e-discovery, where parties routinely ask each other questions about devices and IT infrastructure. While your client can’t give you all the information you need, you will almost always get information that will help you make your discovery requests more targeted and, consequently, more likely to lead to valuable evidence.
Ah, Google. What can’t you find on Google? My favorite story of the power of Google search is how an IRS agent used Google’s “advanced search” feature to discover the identity of the mastermind behind the illegal Silk Road marketplace–a problem that had baffled numerous government agencies with access to expensive proprietary tools for years. To get the best results out of Google, you have to be creative and you have to know advanced search operators.
In addition to finding interesting personal information through name searches about individuals, you can find tons of information about business IT systems. If you want to know what kinds of technology and software a particular business uses, search for press releases, employee LinkedIn profiles, technical blog posts, and job postings. You’ll often find announcements about the installation of new systems or job postings stating the technologies that employees in various departments will need to know. Once you have this information, you can almost always download manuals for those technologies that explain exactly how information is stored and how it can be both search and exported.
This last tip may only be embraced be hardcore nerds like myself, but it is powerful indeed. It’s wonderful to sit down at a Rule 26(f) conference knowing more about your opponent’s IT infrastructure and export capabilities than your opposing lawyer. And nothing is more powerful than using your opponent’s own website to rebut their counsel’s assertions about the feasibility of various search or export tasks.
Inspect what you find and print to PDF (including the URL and timestamp headers and footers). You can also take screenshots of things that don’t format well for print to PDF.
I recommend save-to-PDF and screenshots, but some will object that these duplications may not be admissible. This is only somewhat accurate. On their own, those may be difficult to authenticate, but you’ll have ample opportunities to authenticate them during discovery, often simply by having the parties and witnesses who created the relevant content authenticate the evidence during depositions. Accordingly, it’s probably not necessary to buy expensive web-based evidence collection software unless you’re handling criminal cases.
If you have a cagey or dishonest opposing party who you think might deny authoring their own LinkedIn profile or social media posts, then I suggest a strong setup before asking authentication questions directly in a deposition. Here’s a sample series of questions that you can use to lock down authentication of Facebook messages:
This line of questioning works because the witness feels smart when providing the answers that you need. By answering “yes,” the witness blocks off any escape routes and will be compelled to authenticate the evidence you found.
You can go very deep when preparing for e-discovery. These lines of inquiry may seem too time-consuming and too far from the core facts of the case for some lawyers to pursue. But the rewards of preparation—which include both finding valuable evidence and smooth handling of the e-discovery process—are worth the effort.
Are you working on a complex litigation case now? If so, sign up for a free trial of CaseFleet to get full-text search and streamlined document review for your whole team!
*This post was originally published in the three-part "Preparing for E-Discovery" series on Lawyerist.com.