This article can also be found in the Premium Editorial Download "Storage magazine: Storage Products of the Year Awards 2007."
Download it now to read this article plus other related content.
The scope and focus of legal requests for electronically stored information (ESI) were changed profoundly with the December 2006 revisions to the Federal Rules of Civil Procedure (FRCP). IT teams are now under increasing pressure to maintain a data destruction policy that's applied in good faith and regularly, and prior to any request for information. (A data destruction policy applied after an inquiry from corporate counsel looks more than suspicious.)
For example, Rule 26 (Duty to Disclose) addresses pre-trial discovery agreements made by two opposing counsels. Prior to the first court conference, opposing parties must meet to determine the number and type of ESI requests that will be made and met. Mark Foley, an attorney and partner at Foley & Lardner LLP who specializes in IT litigation, says those agreements and the resulting "litigation holds" have a direct impact on IT teams and their processes.
"You sue me and ask for a broad list of documents and data,'' explains Foley.
"I object, arguing that certain things you've asked for are either not relevant or that they are too expensive to search.'' Then, he says, it's likely the two parties would agree that a subset of the data would be provided quickly, but a preservation policy will protect a broader range of ESI items that might be requested later.
"Now the person involved with storage needs to know which
| data must be retained, but not just in the regulatory sense or the generic business sense," says Foley. "We also are promising to protect and preserve certain things in these agreements. And now some poor guy in the IT department has to figure out how to do it."
In these pre-trial meetings, says Foley, he often has conversations that are more technical than legal. "They have to do with things like meta data and tape rotations," he says. In one antitrust case, Foley deposed IT staffers regarding communication and sales data that was almost a decade old and kept on legacy systems no longer in use. The questions for IT departments today, he says, are whether or not they have the necessary tools to capture and preserve the data (and meta data); and whether they have a willing, competent and effective witness who can explain the rationale behind data destruction policies. Often, companies have neither and are less likely to have the latter, says Foley.
This was first published in February 2008