Electronically Stored Information The Complete Guide To Management Understanding Acquisition Storage Search and Retrieval 1st Edition David R. Matthews Download PDF
Electronically Stored Information The Complete Guide To Management Understanding Acquisition Storage Search and Retrieval 1st Edition David R. Matthews Download PDF
com
https://ebookgate.com/product/the-complete-guide-to-wood-storage-
projects-2nd-edition-coll/
https://ebookgate.com/product/the-complete-obsolete-guide-to-
generative-ai-1st-edition-david-clinton/
https://ebookgate.com/product/ulcerative-colitis-the-complete-
guide-to-medical-management-1st-edition-gary-lichtenstein/
https://ebookgate.com/product/the-complete-idiots-guide-to-zen-
living-1st-edition-gary-r-mcclain/
Multimedia Information Retrieval Theory and Techniques
1st Edition Roberto Raieli (Auth.)
https://ebookgate.com/product/multimedia-information-retrieval-
theory-and-techniques-1st-edition-roberto-raieli-auth/
https://ebookgate.com/product/understanding-depression-a-
complete-guide-to-its-diagnosis-and-treatment-donald-f-klein/
https://ebookgate.com/product/introduction-to-information-
retrieval-instructor-s-solution-manual-solutions-1st-edition-
christopher-d-manning/
https://ebookgate.com/product/guide-to-storage-tanks-and-
equipment-1st-edition-bob-long/
https://ebookgate.com/product/sunset-complete-home-storage-
sunset-books/
Electronically
Stored
Information
The Complete Guide
to Management,
Understanding,
Acquisition, Storage,
Search, and Retrieval
Second Edition
David R. Matthews
Electronically
Stored
Information
The Complete Guide to
Management, Understanding,
Acquisition, Storage,
Search, and Retrieval
Second Edition
OTHER TITLES FROM AUERBACH PUBLICATIONS AND CRC PRESS
Second Edition
David R. Matthews
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Fo re wo rd ix
P r e fa c e xi
Acknowledgments xiii
Author xv
C h a p t e r 1 W h at I s E l e c t r o n i c I n f o r m at i o n , and Wh y
S h o u l d Yo u C a r e ? 1
1.1 Introduction 1
1.2 Electronically Stored Information and the Federal
Rules of Civil Procedure 1
1.2.1 Changes to the Federal Rules of Civil Procedure 3
1.2.1.1 Rule 1: Scope and Purpose 3
1.2.1.2 Rule 16(b)(5) and (6): Pretrial
Conferences; Scheduling
Management 3
1.2.1.3 Rule 26 4
1.2.1.4 Rule 37 Safe Harbor 11
1.2.1.5 Rule 34(b) Producing Documents
Procedures 13
1.2.1.6 Rule 33(d) Interrogatories to Parties 15
1.2.1.7 Rule 45 Subpoena 15
1.2.1.8 Form 35 15
1.2.2 Federal Rules of Evidence 16
1.2.2.1 FRE 502 17
1.2.2.2 FRE 901 17
1.2.2.3 FRE 802 18
v
vi C o n t en t s
C h a p t e r 2 Tr a n s l at i n g G e e k : I n f o r m at i o n
Te c h n o l o gy v e r s u s E v e r yo n e E l s e 63
2.1 Introduction 63
2.2 Role of IT 63
2.3 Information Technologist’s Perspective 72
2.4 Information Technology as an Ally 76
2.5 Translating Geek 77
C h a p t e r 3 W h e r e I s E l e c t r o n i c a l ly S t o r e d
I n f o r m at i o n ? I t ’ s E v e r y w h e r e ! 79
3.1 Introduction 79
3.2 Basics 80
3.3 Database Systems 87
3.4 E-Mail Systems 91
3.5 File and Print Servers 94
3.6 Instant Messaging Services 99
3.7 Mobile Devices 101
3.8 Physical Access Records 105
3.9 Telecommunications 109
3.10 Cellular Devices 119
3.11 Digital Video 126
3.12 Internet or Online Data 130
3.13 Storage Media 144
3.14 Internet of Things (IOT) or of Everything (IOE) 147
3.15 Event and System Logs 148
3.16 Desktop Computer Facts 149
3.17 Metadata and Other Nonapparent Data 154
3.18 Conclusion 157
C o n t en t s vii
C h a p t e r 4 W h o ’ s i n C h a r g e H e r e ? A l l i e s , O w n e r s ,
a n d S ta k e h o l d e r s 159
4.1 Introduction 159
4.2 The (Long) List of Stakeholders 159
4.2.1 Information Technology Professionals 159
4.2.2 Legal Staff 162
4.2.3 Records Managers 163
4.2.4 Auditors 163
4.2.5 Human Resources 164
4.2.6 Department Heads, Vice Presidents, and
Executives 164
4.2.7 Physical and Information Security Personnel 165
4.3 Ownership of Data 165
4.4 Data Control Considerations 170
4.5 Required Skill Sets and Tools 173
C h a p t e r 6 K e e pi n g Yo u r Tr e a s u r e s : P r e s e r vat i o n
an d Manag e m e nt 223
6.1 Introduction 223
6.2 Securing the Data 223
6.3 Access Control and Management 226
6.4 Organization and File Management Techniques 232
6.4.1 Day-to-Day Organization 232
6.4.2 Management of Data over Time 236
6.4.3 Response to Litigation or Audits 238
6.5 Safe Storage Issues and Considerations 241
6.6 Litigation Hold 246
6.7 Spoliation: The Loss of Relevant Data 248
6.8 Automated Technical Solutions 250
viii C o n t en t s
C h a p t e r 7 S h a r i n g I s G o o d : D i s s e m i n at i o n and
Reporting 255
7.1 Introduction 255
7.2 Format Issues: Original or Usable? 255
7.3 Mediums for Transfer 259
7.4 Creating Readable Reports 261
7.5 Tips for Depositions and Expert Witness 264
7.6 Conclusion 266
A pp e n d i x I: L i n ks and References for M o r e I n f o r m at i o n 267
A pp e n d i x II: F o r m s and Guides 273
A pp e n d i x III: L i n k s to Te c h n i c a l S o f t wa r e S o l u t i o n s 291
Foreword
ix
Preface
Welcome one and all. That is not just a pleasantry, but my way of
letting you know that whether you are an attorney, judge, paralegal,
business manager or owner, or just one of the ever-growing population
of computer users, you will all benefit from what follows.
We all live in a new world in which we are surrounded in an
ever-deepening fog of data. The data define who we are, for better
or worse. The data contain information about our livelihoods, our
education, our finances (or lack thereof), our health (or lack thereof),
our history, and probably our future.
And yet very few of us understand how the data are created, where
data are stored, or how to retrieve or destroy data (if that is indeed
at all possible!). This book is for all of you, whatever your need or
interest. In it we will discuss the reasons you need to know about elec-
tronic data as well as get into great detail about the how, what, when,
and where of what is known in legal circles as ESI, or electronically
stored information.
You can use this as a reference and simply go to the chapters you
are interested in, or read through if you like. I try to keep it entertain-
ing and simple to understand, even when we get into some pretty
esoteric engineering concepts. I am pretty sure no one is planning
to earn his or her computer science or electrical engineering degree
with this book, so concepts will be as simple as possible and related to
xi
x ii P refac e
stories and illustrations that will help make sense of these sometimes
difficult ideas.
So read on without trepidation, dear reader. I promise it will be
enlightening, and perhaps even fun. If nothing else, you will have
some interesting new ways to entertain your geek friends or impress
your non-geek friends at your next party.
Acknowledgments
This book could not have been written were it not for the many patient
and supportive people in my community in the Puget Sound area of
Washington State.
There are too many to name them all, but the many information
security, legal, and computer forensics professionals with whom I have
shared these ideas have been extremely generous with their thoughts,
wisdom, and advice.
I especially thank my colleague and mentor, Michael Hamilton,
who has given me the support to learn more about these issues and the
time to collaborate with others. He is a font of knowledge and just an
all-around good friend and person.
I also want to add a big thanks to my original Information Security
mentor and guru, Kirk Bailey. I will not forget the day when, in
answer to my question of what would be the most beneficial skill to
learn, he said “forensics.” It changed my life in many ways.
I would also like to acknowledge my good friend, colleague, and
mentor, Steven Hailey, whose gracious generosity, incredibly deep
wisdom and assistance I can always count on whenever I get stuck.
And of course I need to thank my family for putting up with those
long hours of husband and daddy being hunched over the computer
trying to get this all done.
x iii
Author
xv
xvi Au t h o r
1.1 Introduction
1
2 El ec t r o ni c a l ly S t o red In f o rm ati o n
Figure 1.1 Legal documents in the electronic world have become ubiquitous and overwhelming.
of them included criminal or other courts besides civil law. But any
organization or individual can find themselves in court.
This chapter specifically discusses the Federal Rules of Civil
Procedure (FRCPs) because they were amended in December 2006,
and have been revised several times since then to specifically address
ESI and to better define the ways ESI needs to be handled. However,
it is important to understand that rules in any legal action are going
to be similar to those we will discuss here. Because these rules offer
good examples of what to expect in other legal actions, we specifically
look at all of the pertinent sections of the FRCPs.
We also spend some time looking at rules of evidence, because
those have also been evolving to address the new frontier of electronic
evidence. We spend time considering some case law as well, because
that is the crux of the way this evolving area of law is changing and
growing.
We begin with a run-through of the specific rules that were
amended in December 2006 as well as some of the more pertinent
and interesting changes and clarifications that are being considered
in the current set of amendments (final changes and amendments to
the FRCP were approved by the Supreme Court and Congress and
published in December 2015).*
* Lange, Michele (October 7, 2014). Part III—FRCP amendments: The long and
winding road. The eDiscovery Blog. Retrieved from http://www.theediscoveryblog.
com/2014/10/07/part-iii-frcp-amendments/.
W h at Is It ? 3
1.2.1.1 Rule 1: Scope and Purpose The current change to the first rule,
while not specific to e-discovery or electronic evidence is neverthe-
less significant. In the new rule, the language has been changed
to emphasize how important it is for the parties to cooperate.
Specifically it says “These rules … should be construed, adminis-
tered, and employed by the court and the parties to secure the just,
speedy, and inexpensive determination of every action and proceeding”
(emphasis added).
This is, in effect, laying down the theme of the new rules. You will
see this theme reflected throughout the amendments. Parties and the
courts need to consider, first and foremost, how to apply the rules to
ensure the most even playing field, at the least expense and burden
possible.
* Cornell University Law School, Legal Information Institute, Federal Rules of Civil
Procedure (as amended to December 1, 2010): http://www.law.cornell.edu/rules/
frcp/. Retrieved February 11, 2011.
4 El ec t r o ni c a l ly S t o red In f o rm ati o n
on behalf of their client that should not be disclosed). The rule also
discusses the methods that should be employed by all parties to man-
age the discovery of their electronic data.
These discussions and agreements take place in what are called the
Rule 16 pretrial meet and confer conferences, where both sides get
together and discuss what electronic evidence they expect to acquire
and preserve for the case at hand, how they would like it to be pro-
duced, and the general management of what is called the electronic
discovery or e-discovery process. Agreements are made between the
parties, and those agreements are recorded and become an important
part of the case at hand. We look at some case law later where the
agreements that were made in these pretrial meetings were used by
the court to decide on the correct ruling on a question of evidence.
The bases of the agreements that come out of the Rule 16 meetings
are established by Rule 26, which is discussed next and which governs
the provisions of discovery and the duty to disclose.
In the current amendments, there are two changes to Rule 16(b).
The first is in Section (3)(B)(v), and this is again indicative of the
theme of cooperation. It states that the scheduling order may
“direct that before moving for an order relating to discovery the
movant must request a conference with the court.” As noted, this
is to encourage the parties to work things out in an efficient and
cooperative way.
The second is again in Section (3)(B), but in (iv) and it relates to
claw-back. Claw-back rules are about when a party can basically say,
“oops” and ask the other party to return some evidence it produced (or
the court to not admit it in the case) that should have been protected.
In this section, the changes refer to the Federal Rule of Evidence
502, which we’ll discuss later. Basically, it simply allows for any agree-
ments reached under that rule of evidence to also be considered in
whether produced evidence should be able to be “clawed” back.
of paramount importance (and you should not wait until you have a
legal case at hand before discussing this).
It is equally important to ensure that you and your legal representa-
tives understand where the data are physically and logically and how
the data will be accessed, acquired, and preserved in a forensically
sound manner (to preserve the integrity and nonrepudiation of the
evidence). In Chapter 3, we take a detailed look at all of the different
types of electronic evidence and where and how they are stored. This
is information you should use as you explore and discuss with your
attorneys the specific electronic data for which you are responsible.
In a survey commissioned by the Deloitte Forensic Center and con-
ducted by the Economist Intelligence Unit (EIU),* it was found that
40% of respondents did not feel like their organization’s IT and legal
staff communicated well and 35% did not have a team to respond to
e-discovery requests. In fact, in many cases, the people who should
have known about e-discovery issues were found to be painfully
unaware of the issues. This serves to further point out the depth of
this problem and the importance of you and your organization com-
ing to grips with it as soon as possible.
If you have reason to consider data inaccessible, you will need to do
a good job of explaining and documenting why that is the case.
Rule 26(b)(2) was amended to specifically address this issue. It basi-
cally says that if relevant electronic data are not “reasonably accessible”
because the data would cost too much to produce or be too much of a
burden or are simply no longer available, then you are not required to
produce the data as evidence. It also attempts to set some procedures
for how to shift costs if data are considered inaccessible.
Unfortunately, the term “reasonably accessible” is not specifically
defined in the rules. However, there is considerable case law that gives
some idea of what the courts are expecting.
Data that are live, online on servers, desktops, laptops, and so
forth, at the time of expected litigation will be considered accessible
of course. But also, data that are well documented and organized,
Figure 1.2 Policies are worth little if they are too complex or too numerous to be understood and
followed.
For instance, if you have a policy that all e-mail is deleted after
45 days, but your organization only “remembers” and follows that
policy after you receive notice of litigation (thereby deleting some
possibly relevant electronic evidence), the courts are going to be less
than sympathetic to your claim that those e-mails are not reasonably
accessible.
Further, if your organization’s failure to follow good practices has
resulted in important electronic evidence being a burden to access,
the courts are likely to be unsympathetic to your claims. They are also
less likely to shift the cost or resource burdens to the other party if the
reason the data are inaccessible is because of your own poor practices.
Here is a good example of what I am referring to.
I heard a story of a consulting organization that was contracted to
work with a company to assist with the indexing and organization of
all of the archived data. When they arrived they asked the company
IT staff if they had a backup system in place. The IT person explained
that yes, indeed they did. Their process was to take laptops that they
were no longer using and back up all of the important documentation
onto those laptops once a month. Then they would store those laptops
in their warehouse.
Now, this was a relatively large organization with a lot of differ-
ent departments, all of which followed this rather unique process for
archiving records. The consultants asked to be shown the warehouse.
W h at Is It ? 9
Imagine the looks on their faces when they were shown a rather
large room stacked with laptops with no labels, no indexing or orga-
nizing system, and not even a dating procedure. They obviously had
their work cut out for them.
The reason this organization called on these contractors was
because they had recently been sued and their attorneys had informed
them that they might be responsible for producing archival informa-
tion about their company and its practices.
It would probably be realistic for them to claim that data were not
reasonably accessible, don’t you agree? Yet, I can almost promise you
that this is a case where the courts would come down on the side of
their opposition if the data were considered important to the case.
The courts would be very likely to expect this organization to accept
the burden of whatever costs and resources were required in order to
locate, preserve, and produce that electronic evidence. And that is
simply due to their poor practices.
Again, this is something to be cognizant of as you discuss this in
your organization. Be sure you are following accepted best practices
for your records management and that everyone in your organization
is aware of those practices and following them carefully.
If you happen to be the requesting party in a case similar to this,
it can be to your benefit to have quality computer forensic resources
either in house or by contract. We discuss forensics procedures and
capabilities later in the book. That may give you an advantage over
your opponents by virtue of your ability to access data that might
otherwise be considered inaccessible, such as deleted, corrupted, or
even encrypted data.
Another part of Rule 26 (26(b)(5)) was changed to address how
electronic data that were inadvertently produced can be retrieved.
This is called the claw-back provision, but as with all of these issues,
it can be difficult in real-life cases to establish that information should
have been privileged or considered work product and should not be
allowed to be entered as evidence. In some cases, the courts have ruled
that privilege is waived by the data having been released, and because
of its relevance or importance to the opposing party’s case, you are not
allowed to recover it or disallow it as evidence.
We spend more time discussing the work product doctrine and
attorney–client privilege later in this book (see Chapter 5), because
10 El ec t r o ni c a l ly S t o red In f o rm ati o n
this is a very important part of evidence law that will be helpful for
you to understand as you deal with e-discovery issues. It is also an
evolving part of the law as courts learn to deal with the ramifications
of electronic evidence.
Finally, Rule 26(f) requires everyone to get together early on to
agree on the protocol for electronic discovery.
This is an important discussion for you and your counsel to have
ahead of time. If you go into the Rule 16 meet and confer with a good
plan of action, understanding what protocols and formats of electronic
evidence are most easily available to you and most advantageous to
your overall case and use of resources, you will be ahead of the game.
By understanding the what, when, where, why, and how of all the
electronic data you own (which is the point of this book after all), you
can make good decisions about what kinds of agreements you hope to
make during the meet and confer conference.
All of the protocols and agreements based on these rules will be
adopted as a court order under the Rule 16 meet and confer, so under-
standing their ramifications and being well prepared can be a huge
help for you as an individual or for your organization, should you be
involved in litigation.
In the current amendments to Rule 26, we note an emphasis on
proportionality. This is in direct response to the ongoing escalation of
costs associated with discovery–for the most part engendered by the
incredible growth in the quantity of electronic data.
In the amendment to Rule 26(b)(1), regarding the scope of evidence
that should be discoverable, it states that discoverable evidence should
be “proportional to the needs of the case, considering the importance
of the issues at stake in the action, the amount in controversy, the
parties’ relative access to relevant information, the parties’ resources,
the importance of the discovery in resolving the issues, and whether
the burden or expense of the proposed discovery outweighs its likely
benefit.”
Again, this is an effort by the writers of the rules to create a level play-
ing field and (hopefully) to keep the expense of discovery under control.
The new amendment goes on to note, however, that this evidence
need not be admissible but can still be discoverable if everyone agrees.
The only other amendment to Rule 26 related to proportionality is
to Rule 26(b)(2)(C)(iii), wherein they basically just refer back to the
W h at Is It ? 11
above when discussing when the court should “limit the frequency or
extent of discovery.”
In Rule 26(C)(1)(b), they have amended the wording to address the
allocation of costs by including “or the allocation of expenses” in the
specific terms a court can add to a protective order.
Once again, the writers are hoping to give the court tools whereby
it can encourage responsible and inexpensive options for discovery
from all parties.
Finally, as in Rule 16(b)(3)(B) above, the new amendments in
Rule 26(f)(3) include a reference to the Federal Rule of Evidence 502
as another reason that can be included in an agreed-upon order for
production as a remedy for the accidental production of privileged
data. This would be included as part of the “Discovery Plan” that is
outlined in this rule.
1.2.1.4 Rule 37 Safe Harbor When you are thinking about what is
reasonably accessible, you also need to consider a concept called spo-
liation. This might be thought of along the lines of “the dog (or com-
puter) ate my homework (or e-mail).”
You might be accused of (and sanctioned for) spoliation if you go
into court with bad arguments for relevant electronic evidence being
not reasonably accessible because you allowed it to be deleted or lost
or damaged somewhere along the way, when you should have real-
ized it would be important to a case that you should have known was
coming (all of these “should haves” are important and as usual pretty
ambiguous, so we talk about them more later).
I think spoliation was best described in a case known as Mosaid
Technologies, Inc. v. Samsung Electronics Corporation from the New
Jersey District courts in 2004 as follows: Spoliation is “the destruction
or significant alteration of evidence, or the failure to preserve prop-
erty for another’s use as evidence in pending or reasonably foreseeable
litigation.”*
* Applied Discovery, Online Law Library, Case Summary, MOSAID Techs. Inc. v.
Samsung Elecs. Co.: http://www.applieddiscovery.com/ws_display.asp?filter=Case%
20Summaries%20Detail&item_id=%7B781012C0-1342-4A84-8BA9-9BC1FC9
FDE57%7D. Retrieved February 25, 2011.
12 El ec t r o ni c a l ly S t o red In f o rm ati o n
after case we find that this can be extremely difficult to prove unless
you have very well-documented and audited policies and procedures.
Rule 37(f) also sets rules for sanctions against parties who refuse
to participate in good faith in the discovery conference procedures
outlined in Rule 26(f). This is basically the teeth behind the Rule 26
guidelines for the “meet and confer” and is meant to encourage all
parties to set a level playing field early in the litigation process to avoid
costs and delays later on.
In the current amendments Rule 37(e) has some important new
language that better defines how courts should decide whether to
sanction parties for failing to provide electronic evidence. In fact, they
have changed the word “provide” to “preserve.”
This is important, because again it hearkens back to the idea that
everyone should be playing fair and this should not take so much
time and money. Organizations now will have the duty to preserve
electronically stored information but only to produce it if it has been
agreed upon by all parties as relevant and important to the case.
The second part of this change is also notable in that it notes that
if ESI that should have been preserved is lost and not retrievable
because reasonable steps were not taken, a court should consider
whether that lost evidence actually creates “prejudice” to the other
party. In other words, does the loss of that evidence harm the other
party’s case?
If the court feels that is the case, the amendment goes on to say that it
“may order measures no greater than necessary to cure the prejudice …”
Finally, it clarifies that a bit more by suggesting that if the court
finds that there was intent to commit spoliation, the court may impose
greater sanctions from instructions to the jury that it should presume
the evidence would have been bad for the spoliators case, up to a dis-
missal of the case or a default judgment.
These sanctions can be significant to a case and we will see case law
later in which judges threw the book at bad actors. However, it seems
the writers of these new amendments are trying to set some standards
to assist courts in making better and more thoughtful decisions about
when sanctions are appropriate.
Another impor-
1.2.1.5 Rule 34(b) Producing Documents Procedures
tant rule that was amended in 2006 was Rule 34(b), which allows
14 El ec t r o ni c a l ly S t o red In f o rm ati o n
the requesting party to set protocols for how it would like electronic
documents to be produced. The idea was to ensure that everyone
agreed up front how the evidence would be produced and in what for-
mat (native format or something more accessible for the parties, with
or without metadata, etc.).
Again, this is an important thing to discuss with your attorneys.
You can be a big help to them if you have talked beforehand about
how data are stored in native format, what is included, and what is
stripped away. You can make decisions up front about how you retain
information so that it will be the most advantageous to you whether
for litigation or just for records retention and archiving purposes. But
considering this in the light of possible litigation can be illuminating
and may change the decisions you and your organization make.
For instance, your organization may be required by law to retain
business-related records for a given period of time. One of my for-
mer organizations had to keep contract documentation for a period
of 6 years, and other types of business decision documentation for
3 years.
However, the format in which we keep those documents can be
equally important to consider. We will probably not store copies of
drafts because those might contain edits and comments that the
preparers of those documents were considering but that were never
meant for public consumption and did not in fact become part of the
final documentation.
Understand, however, that those edits and comments might be
considered important and relevant to opposing counsel in a legal
dispute. And they might equally be considered detrimental to your
organization.
This is not to suggest that you should have policies that purposely
destroy any documentation that might ever be used against you. That
would be both impractical and in some cases illegal. It is just to sug-
gest that as you and your organization are developing records retention
policies and procedures, you should carefully weigh the advantages
and business needs around what and how you retain electronic data,
against the unnecessary retention of metadata, draft documents, and
so forth, which might be used against you at some point in the future.
In the more recent changes, the language in Rule 34(b)(2)(B) has
been clarified to say that if a party objects to production, it must
W h at Is It ? 15
1.2.1.7 Rule 45 Subpoena This rule simply made it clear that sub-
poenas to produce evidence should include electronic evidence. This
basically intended to put an end to any arguments about whether elec-
tronically stored information should be considered “documents” in a
court of law.
Figure 1.3 A small sample of Form 35. The full text is included in Appendix II.
when it comes to being able to prove its authenticity and that it has
not been tampered with in any way.
This is another case where excellent forensics capabilities can be an
important advantage to you or your organization. A good computer
forensics expert has the tools, expertise, and experience to be able to
establish authenticity to a much greater degree of certainty than is
possible without those resources. Again, we discuss this in greater
detail later in the book.
1.2.2.3 FRE 802 Finally, FRE 802 is called the Hearsay Rule.
There is a dynamic and ongoing discussion in the courts about how
this rule should be applied to electronic evidence. Hearsay is defined
in Rule 801 as “a statement, other than one made by the declarant
while testifying at the trial or hearing, offered in evidence to prove the
truth of the matter asserted.”
Rule 802 states that hearsay is not admissible as evidence, except,
and there follows a group of exceptions (that we will not delve into
here), which might allow a statement into evidence that was not made
by a declarant (i.e., someone making a sworn statement in court under
penalties of perjury) while testifying at the actual trial.
Electronic evidence by its very nature could nearly always be con-
sidered hearsay, so there are many cases where that evidence has been
challenged and the courts have had to decide whether it is admissible
under one of the exceptions to the hearsay rule.
We spend more time with this later as well, when we look at some
case law. But this is an evolving area of the law and a great example
of how the world of electronic data has changed and challenged the
legal landscape.
In the next section we talk about recent rulings that affect e-discovery
and electronic evidence. The thing to note about these is that most
are relatively recent rulings. This gives you an idea of how fast this
area of law is changing and evolving. It is meant to impress upon you
the need to stay in tune and up to date with these cases so you can be
of service to your organization in understanding their liabilities and
responsibilities.
W h at Is It ? 19
Figure 1.4 This case is one of many that involved social media sites.
1.2.3.1.3 Romano v. Steelcase (N.Y. Sup. Ct. 2010) Another Social Media
Privacy Case In this case, the defendant, Steelcase, sought the plain-
tiff’s current and historical Facebook and MySpace pages including
deleted information.
22 El ec t r o ni c a l ly S t o red In f o rm ati o n
1.2.3.2 Spoliation Cases Some of the following cases are older, but
I wanted to include them to illustrate specifically the kinds of ways
the courts address spoliation. If you do not remember what that is,
check back a little in this chapter where we discussed the federal
rules.
Other newer cases are also noted here, as they illustrate the evolu-
tion of the way courts are addressing spoliation issues.
the procedures that you will follow to put a litigation hold in place to
preserve the relevant electronic evidence.
case sometimes to try to get an idea of what the facts in the case were
and to try to understand why the court makes its decisions.
The bottom line is that these are just human beings, and their
decisions will be based on their best understanding of the law and
precedent, as well as on the facts of the case at hand. So do not assume
you know how a case will be decided simply based on your under-
standing of precedence in past cases.
1.2.3.2.9 United Central Bank v. Kanan Fashions, Inc. (N.D. Ill. 9/21/11):
Spoliation Sanctions That Hurt the Party but Not Their Attorney In this
case, we get to see what happens when you try to fool the judge. The
defendants, Kanan Fashions, had a server with relevant informa-
tion stored on it that was slated to be sold as part of an acquisition.
However, they were told numerous times by their attorneys that they
had a duty to preserve it due to the court case they were involved in
with the United Central Bank.
They “forgot” and let the server be sold and moved to a company in
Dubai where it was subsequently reimaged and “lost” to production
for the case. The court called this “elaborate spoliation” and recom-
mended sanctions against the defendants.
The judge declined to sanction the attorneys because they were lied
to and kept in the dark about the server being sold and sent away.
Bottom line: it is always the responsibility of the organization in
the end. If you do a good job as an attorney and document that you
did so, you can avoid sanctions.
The lesson here is that if you are going to rely on your data retention
policy to assert inaccessibility, you had better be very familiar with
what it actually says and ensure that you have followed it to the letter.
* Case Law Update and E-Discovery News, Recent E-Discovery and Computer
Forensics Court Decisions, 3(August; 8), 2003: https://www.krollontrack.com/
newsletters/clu_0803.html. Retrieved April 6, 2011.
W h at Is It ? 31
Aigrette
Aiguillette
Apron
Backscratcher
Baldric
Bandana, or Bandanna
Beard
Beaver
Blouse
Bonnet
Braid
Burnous
Buskin
Caftan
Chape
Chatelaine
Costume
Cravat
Crinoline
Cuff
Cummerbund
Depilatory
Dolman
Doublet
Dress
Farthingale
Frock
Gaberdine
Girdle
Glove
Golosh, or Galosh
Gown
Haik
Hat
Hood
Hose
Jerkin
Kaross
Kilt
Kohl
Mantle
Mitten
Moccasin
Moustache
Muff
Parasol
Patten
Pelisse
Peruke
Petticoat
Plaid
Pomade
Pomander
Poncho
Puttee
Queue
Razor
Robes
Sandal
Scarf
Shampoo
Shirt
Sleeve
Snowshoes
Sombrero
Sporran
Stockings
Tabard
Tarbush
Toilet
Towel
Trousers
Tunic
Turban
Veil
Whisker
Wig
Biographical A study of the lives of great women
Study will interest any one, and if this study
is pursued by means of the Britannica
the reader will have the double advantage of getting full and
authoritative material presented in the most attractive and excellent
style. From the lists that follow of articles on women in the
Britannica, interesting groups may easily be chosen, such as:
Famous American Women:—Anne Hutchinson, Alice and
Phoebe Cary, Margaret O’Neill Eaton, Margaret Fuller, the
Grimké sisters, Harriet Beecher Stowe.
Women of Ancient Times:—Acca Larentia, Lucretia, Agrippina,
Artemisia, Aspasia, Cleopatra, Cornelia, Faustina, Messallina,
Virginia, Erinna, Corinna, Sappho, Hypatia, Zenobia.
Heroines of Fiction in History: compare Kingsley’s Hypatia with
the real woman, Ware’s Zenobia with the queen as she is represented
by a historian in the Britannica; the women of Dumas and of Scott in
their historical novels and their originals as seen in the Britannica,
for instance Mary Queen of Scots as portrayed by Sir Walter in The
Abbot and by Swinburne in the Britannica, Elizabeth and Amy
Robsart in Kenilworth and in the Britannica, Catherine de’ Medici in
Chicot the Jester and in fact; or the women of Shakespeare’s
historical plays as compared with their true place in history.
Women in American political reform:—Amelia B. Bloomer,
Susan B. Anthony, Elizabeth Cady Stanton, Lucretia Mott and
Lucy Blackwell Stone.
Acca Larentia
Accoramboni, Vittoria
Acland, Lady Harriett
Adelaide
Agnes of Meran
Agreda, Abbess of
Agrippina
d’Aiguillon, Duchesse
Albany, Louise, countess of
Alice, Princess
Amalasuntha
Anna Amalia of Saxe-Weimar
Anna Leopoldovna
Anne of Brittany
Anne of Cleves
Anne of Denmark
Anne of England
Anne of France
Anne (of Russia)
Arria
Arsinoë
Artemisia
Aspasia
Barton, Elizabeth
Berenice
Blanche of Castile
Boadicea
Boleyn, Anne
Borgia, Lucrezia
Brunhilda
Cappello, Bianca
Caroline, Amelia Augusta
Caroline of England
Castro, Inez de
Catherine of Aragon
Catherine of Braganza
Catherine de’ Medici
Catherine I and II (Russia)
Catherine of Valois
Châteauneuf, La Belle
Christina, Maria
Christina of Sweden
Clarke, Mary Anne
Cleveland, Duchess of
Cleopatra
Clotilda, St.
Colonna, Vittoria
Corday, Charlotte
Cornelia
Cornaro, Caterina
Diane de France
Diane de Poitiers
Du Barry
Eaton, Margaret O’Neill
Eleanor of Aquitaine
Elizabeth of Austria
Elizabeth (Carmen Sylva)
Elizabeth, Electress Palatine
Elizabeth of England
Elizabeth (princess)
Elizabeth of France
Elizabeth Petrovna
Este, Beatrice d’
Estrées, Gabrielle d’
Etampes, Duchesse d’
Eudocia
Eudoxia
Eugénie
Euphrosyne
Elizabeth Farnese
Faustina
Feuchères, Baronne de
Fredegond
Gilbert, M. D. E. R. (“Lola Montez”)
Godiva
Gontaut, Duchesse de
Grey, Lady Jane
Hachette, Jeanne
Henrietta Maria of England
Howard, Catherine
Ida of Bernicia
Irene
Isabella of Bavaria
Isabella of Castile
Isabella of Hainaut
Isabella II of Spain
Jacoba
Joan of Arc
Joan (Pope)
Joanna the Mad
Joanna of Naples
Josephine
Junot, Laure
Kingston, Elizabeth, Duchess of
La Fayette, Louise de
Lamballe, Princesse de
La Sablière, Marguerite de
La Vallière, Louise de
Lenclos, Ninon de
Lennox, Countess of
Lisle, Alice
Livia Drusilla
Longueville, Duchesse de
Louise of Prussia
Louise of Savoy
Lucretia
Macdonald, Flora
Maintenon, Mme. de
Maine, Duchesse du
Mailly, Comtesse de
Margaret of Austria
Margaret of Denmark
Margaret Maultasch
Margaret (Maid of Norway)
Margaret of Scotland, St.
Margaret of Scotland
Maria Stella
Marie Antoinette
Marie Leszczynska
Marie Louise
Marie de’ Medici
Marie Amelie Thérèse
Marie Thérèse
Matilda of Tuscany
Mary of Burgundy
Mary I and II of England
Mary of Lorraine
Mary of Modena
Mary of Orange
Mary, Queen of Scots
Masham, Lady
Matilda
Messallina
Mignot, Claudine
Marquise de Montespan
Marquise de Montesson
Montpensier, Duchesse de
Octavia
Olga
Orkney, Countess of
Orleans, Henrietta of
Parr, Catherine
Perrers, Alice
Philippa of Hainaut
Phryne
Pompadour, Marquise de
Portsmouth, Duchess of
Prie, Marquise de
Radegunda, St.
Rich, Penelope
Robsart, Amy
Rosamond (“The Fair”)
Rothelin, Marquise de
Roxana
Semiramis
Serres, Olivia
Sforza, Caterina
Shore, Jane
Snell, Hannah
Sophia Aleksyeevna
Sophia of Hanover
Sophia Dorothea of Hanover
Sorel, Agnes
Stanhope, Lady Hester
Stuart, Arabella
Swynford, Catherine
Talbot, Mary Anne
Tanaquil
Tarpeia
Theodora
Theophano
Ursins, Princess des
Victoria
Virginia
Walter, Lucy
Wilhelmina
Zenobia
Quite as long and much more impressive is the list of women who
have produced literature—excluding the heroines of mythology and
literature—on whom there are separate articles in the Encyclopaedia
Britannica.
Ackermann, Louise
Adam, Juliette
Agoult, Comtesse d’
Aguilar, Grace
Aisse, Mlle.
Alcott, Louisa May
Anna Commena
Arnim, Elisabeth von
Aulnoy, Baronne d’
Austen, Jane
Austin, Sarah
Baillie, Lady Grizel
Baillie, Joanna
Bartauld, Lady Anne
Barnard, Anna Letitia
Bashkirtseff, Maria
Behn, Aphra
Bekker, Elizabeth
Bernauer, Agnes
Berners, Juliana
Blamire, Susanna
Blessington, Marguerite, Countess of
Blind, Mathilde
Bosboom-Toussaint, Anna
Braddon, Mary Elizabeth
Bremer, Frederika
Brontë, Charlotte and Emily
Brooke, Frances
Browning, Elizabeth Barrett
Brunton, Mary
Burnett, Frances E. Hodgson
Carter, Elizabeth
Cary, Alice and Phoebe
Cenci, Beatrice
Centlivre, Susanna
Charrière, Agnes de
Child, Lydia Maria
Cockburn, Alicia
Coleridge, Sara
Colet, Louise
Cook, Eliza
Cooke, Rose Terry
Corelli, Marie
Corinna
Cork, Mary, countess of
Cottin, Marie
Cowley, Hannah
Craddock, Charles Egbert
Craigie, Pearl (“John Oliver Hobbes”)
Craik, Dinah Maria
Craven, Pauline
D’Arblay, Frances
Dashkov, Catherina
Deffand, Marquise du
Delany, Mary Granville
Dickinson, Anna Elizabeth
Droste-Hülshoff, Freiin von
Duff-Gordon, Lucie
Edgeworth, Maria
Edgren-Leffler, Anne Charlotte
Edwards, Amelia Ann Blandford
Eliot, George
Engelbrechtsdatter, Dorthe
Épinay, Louise d’
Erinna
Ewing, Juliana
Ferrier, Susan E.
Flygare-Carlén, Emilie
Foote, Mary Hallock
Fuller, Margaret
Fullerton, Lady
Gaskell, Elizabeth Cleghorn
Gay, Marie F. S.
Genlis, Comtesse de
Girardin, Delphine de
Godwin, Mary Wollstonecraft
Gore, Catherine G. F.
Gyllembourg-Ehrensvärd, Baroness
Gyp
Hahn-Hahn, Ida von
Havergal, Frances Ridley
Hamilton, Elizabeth
Haywood, Eliza
Hemans, Felicia Dorothea
Houdetot, Comtesse de
Howe, Julia Ward
Hrosvitha
Hypatia
Inchbald, Elizabeth
Ingelow, Jean
Jackson, Helen Maria (“H. H.”)
Jameson, Anna Brownell
Jewett, Sarah Orne
Kavanagh, Julia
Krüdener, Baroness von
Lamb, Mary
Lazarus, Emma
Lee, Sophia
Levy, Amy
Lewald, Fanny
Lyall, Edna
Malet, Lucas
Marguerite de Valois
Marie de France
Markham, Mrs.
Martineau, Harriet
Meynell, Alice C.
Mitford, Mary Russell
Molesworth, Mary Louise
Monk, Maria
Montagu, Elizabeth R.
Montagu, Mary Wortley
More, Hannah
Morgan, Lady Sydney
Moulton, Louise Chandler
Mundt, Klara (Luise Mühlbach)
Naden, Constance
Nairne, Baroness
Negri, Ada
Norton, Caroline E. O.
Oliphant, Margaret
Opie, Amelia
Orzeszko, Eliza
Ouida
Pardoe, Julia
Pardo-Bazan, Emilia
Philips, Katharine
Piozzi, Hester Lynch
Pisan, Christine de
Ploennies, Luise von
Porter, Jane
Praxilla
Radcliffe, Ann
Reeve, Clara
Rossetti, Christine
Sablé, Marquise de
Sand, George
Sappho
Schelling, Karoline
Schreiber, Charlotte Elizabeth
Scudéry, Madeleine de
Serao, Matilda
Sévigné, Marquise de
Seward, Anna
Sherwood, Mary Martha
Sigourney, Lydia H.
Smith, Charlotte
Southworth, Emma
Staal, Baronne de
Stael, Mme. de
Steele, Flora Annie
Stein, Charlotte von
Stowe, Harriet Beecher
Strickland, Agnes
Tautphoeus, Baroness von
Taylor, Ann and Jane
Thaxter, Celia
Tighe, Mary
Tucker, Charlotte Maria
Ward, Elizabeth Stuart Phelps
Ward, Mrs. Humphry
Wardlaw, Lady
Wiggin, Kate Douglas
Wilkins, Mary E.
Winchelsea, Countess of
Wood, Mrs. Henry
Wordsworth, Dorothy
Yonge, Charlotte Mary
Although women have appeared on the stage only in the last two
centuries the list of actresses and singers on whom there are articles
in the Britannica is a long one. A partial list in alphabetical order
follows:
Abbott, Emma
Abington, Frances
Albani, Mme.
Albert, Mme.
Alboni, Marietta
Anderson, Mary
Ashwell, Lena
Bartet, Jeanne Julia
Bernhardt, Sarah
Birch-Pfeiffer, Charlotte
Bracegirdle, Anne
Campbell, Beatrice Stella
Calvé, Emma
Cary, Anna Louise
Celeste, Mme.
Chaminade, Cécile
Clairon, La
Clive, Catherine
Coghlan, Rose
Cushman, Charlotte
Després, Suzanne
Drew, Louisa Lane
Dumesnil, Marie
Duse, Eleanora
Elssler, Fanny
Farren, Elizabeth
Faucit, Helena
Félix, Lia
Fenton, Lavinia
Fiske, Minnie Maddern
Gilbert, Ann
Grisi, Giulia
Guilbert, Yvette
Guimard, Marie Madeleine
Gwyn, Nell
Hading, Jane
Horton, Christiana
Jordan, Dorothea
Keeley, Mary Anne
Kellogg, Clara Louise
Keene, Laura
Klafsky, Katharina
Lacy, Harriette Deborah
Langtry, Lillie
Lecouvreur, Adrienne
Lind, Jenny
Mara, Gertrude E.
Marlowe, Julia
Mars, Mlle.
Melba
Menken, Adah Isaacs
Modjeska, Helena
Morris, Clara
Neilson, Adelaide
Nethersole, Olga
Nisbett, Louisa C.
Nordica, Lilian
Oldfield, Anne
O’Neill, Eliza
Patey, Janet Monach
Philips, Adelaide
Pope, Jane
Porter, Mary
Raabe, Hedwig
Rachel
Raucourt, Mlle.
Rehan, Ada
Réjane, Gabrielle
Ristori, Adelaide
Robinson, Mary
Sacher, Rosa
Sainton-Dobly, C. H.
Schröder, Sophie
Schröder-Devrient, Wilhelmine
Seebach, Marie
Siddons, Sarah
Smithson, Henrietta C.
Sterling, Antoinette
Sterling, Fanny
Taglioni
Tempest, Marie
Terry, Ellen
Tietjens, Thérèse
Verbruggen, Susanna
Vestris, Lucia Elizabeth
Vincent, Mary Ann
Vokes, Rosina
Woffington, Peg
Yates, Mary Ann
Both in Great Britain and in the United States the great social
reform movements of the last century numbered among their most
able advocates brilliant and devoted women. This is true of
temperance, abolition of slavery, prison reform, the treatment of the
insane and defectives, and nearly every branch which this Guide has
enumerated, especially in Part 4, where there is a general outline of
these reforms. For the part played by women see the biographies of
the women just mentioned and, among many others, Jane Addams,
Clara Barton, Baroness Burdett-Coutts, Dorothea Lynde Dix,
Emily Faithful, Elizabeth Fry, Octavia and Miranda Hill, Mary
A. Livermore and Lucretia Mott. More particularly the following
list of names of women connected with educational progress will
supplement what has been said in the chapter of this Guide For
Teachers and in the part of the Guide dealing with advances in
education and educational problems in the chapter Questions of the
Day:
Astell, Mary
Beale, Dorothea
Bodichon, Barbara L. S.
Brace, Julia
Bridgman, Laura
Bass, Frances Mary
Carpenter, Mary
Clough, Anne Jemima
Crandall, Prudence
Keller, Helen
Lyon, Mary
Shirreff, Emily
Swanwick, Anna
MOTORING