Percipient LogoPercipient LogoPercipient LogoPercipient Logo
  • About
  • Services
  • Articles & Resources
  • Contact
✕

E-Discovery & Legal Ethics – What to Do About It Part 5: Protecting ESI Integrity During Collection

October 16, 2015
Image of hard drive

This the fifth in a series of posts examining e-discovery concepts addressed in legal ethics opinions, such as State Bar of California Opinion CAL 2015-193,  relating to an attorney’s duty of competence.

 

Download our complete Legal Ethics E-Book now

 

 

In short, the California opinion states that attorneys handling matters involving e-discovery must do one of the following: 1) acquire sufficient skill and learning before handing cases involving e-discovery; 2) associate with counsel or consultants familiar with e-discovery, or 3) decline the representation.

 

The opinion also specifically identifies e-discovery tasks about which counsel must gain a working knowledge or enlist co-counsel or e-discovery consultants to assist. The tasks, which are discussed in this series of articles, are:

 

  • initially assess e-discovery needs and issues, if any, and analyze and understand a client’s electronically stored information (ESI) systems and storage;
  • direct the implementation of appropriate ESI preservation procedures and advise the client on available options for collection and preservation of ESI;
  • identify custodians of potentially relevant ESI;
  • engage in competent and meaningful meet and confer with opposing counsel concerning an e-discovery plan;
  • collect responsive ESI in a manner that preserves the integrity of that ESI
  • perform data searches; and
  • produce responsive non-privileged ESI in a recognized and appropriate manner.

 

This article addresses the fifth task, collecting ESI in a manner that preserves its integrity.

What Does it Mean to Preserve ESI Integrity?

Before addressing preservation of ESI integrity, an explanation is probably helpful. In sum, protecting the integrity of electronically stored information means that it is not altered during collection.  This is important because if it is necessary at a later date, it may be established that collected data is an exact copy of original data. This is done by taking precautions not to alter a file’s contents or metadata. Proving the authenticity of electronic data is often important in criminal matters and when the authenticity of individual files is disputed in civil litigation.

 

Hash Values are Used to Establish Forensically Sound Collection Methods

To prove copies are the same as originals, when ESI is collected in a forensically sound, or “defensible” manner, “hash values” are generated for each file. Hash values are strings of numbers and letters assigned to each file by a computer algorithm and sometimes referred to as the file’s “digital fingerprint.” Two of the most common hash value algorithms are the MD5 and the SHA-1.  To determine whether two files are exact copies, the hash value for the copied file is compared against the hash value for the original file. If the hash values match, then it establishes they are exact copies.

 

To ensure files are not altered during collection, they should not be opened, edited and the file type should not be changed. For instance, a pdf version of a text file should not be created during collection. To prevent against changes during collection, some e-discovery collection software uses “write-blocking” technology which prevents changes to the media from which the data is collected.

 

Protecting against changes to ESI during collection may also be accomplished by creating container files to hold the data. For instance, when email is collected for e-discovery purposes, individual messages are collected and then grouped together in a PST file.

 

Additionally, to protect the integrity of ESI, it is generally an ESI collection best practice to create a working copy of the data to analyze and keep access to the original file at a minimum.

 

Two Types of Collection: Targeted and Forensic Imaging

There are generally two methods of collecting ESI: targeted collections and creating forensic images of storage media.

 

Targeted collections often only collect electronic documents from selected data custodians or network locations, or target only ESI containing keywords or search terms.  Targeted collections may also only capture files created within a certain date range. Targeted collections are good for limiting the amount of data collected and decreasing the number of irrelevant files gathered.

 

The second method of ESI collection is copying all contents of a computer drive or storage media.  This is done by creating a forensic image of the media.  As defined by the Sedona Conference Glossary E-Discovery and & Digital Information Management, a forensic image is “an exact copy of an entire physical storage media (hard drive, CD-ROM, DVD-ROM, tape, etc.), including all active and residual data and unallocated or slack space on the media. Forensic copies are often called images or imaged copies.” Once the image is taken, the computer may be returned to service and the copied hard drive may be examined for relevant evidence without worry of information deletion or destruction.

 

Self Selection Not Suggested

It is often inadvisable to let individual litigants and data custodians collect their own ESI. It is unlikely that the client is trained to collect electronic data which makes it more likely that files may be altered during collection because of the method in which the data is copied.  Additionally, clients may not understand the legal significance of documents they are tasked with identifying and collecting.

However, that is not to say custodian input is not important the process. Custodians are often in the best position to identify sources of relevant information.  To assist with the identification of potential sources and locations of relevant evidence, ESI custodian questionnaires and interviews are often quite helpful.

 

Document Chain of Custody

Another ESI collection best practice is documenting chain of custody to the extent possible. This is especially true if you are creating forensic images of hard drives. Possession of the device from which ESI is collected should be documented at every step of via a chain of custody form documenting the identities of persons in possession of the devices and the dates and time of possession.

 

For additional reading on proper ESI collection methods, a good resource is the EDRM Collection Standards.

 

Share
Chad Main
Chad Main

Related posts

Your guide to eDiscovery Review Protocol
September 29, 2022

The Complete Guide to Drafting Legal Document Review Protocols


Read more
Image for article on ediscovery search in microsoft 365
July 21, 2022

What Version of Microsoft 365 Do We Need for eDiscovery?


Read more
Artificial Intelligence Defensibility
June 23, 2022

Artificial Intelligence and Legal Defensibility – Distinguishing AI Concepts and Explaining in Plain Language


Read more
Percipient Logo

Learn

Articles & Resources

Technically Legal Podcast

Company

About

Services

Contact

Talk to Us
(c) Percipient, LLC – not a law firm and
not licensed to practice law in any jurisdiction.
Privacy Policy
Website construction by WorkSite, LLC