1.The Burden Imposed by Electronic Discovery.
Email is a hybrid form of communication. Email affords employees the opportunity to communicate casually, as they would in a typical conversation, even though a permanent record may be created. People frequently take less care in composing email messages than they do when writing formal letters or memoranda, which may create potential problems in litigation. Employees also use email for a host of communications unrelated to their direct job-related responsibilities. The volume of irrelevant email therefore typically is staggering for most companies.
Although data mining software is making it somewhat easier to search for records when responding to discovery requests, the burdens and costs associated with electronic discovery may be quite high for most companies. Email may reside in multiple different locations within an organization, including on a network server, the hard drives of office computers assigned to both the sender and recipient of a message, back-up tapes, home or portable computers where email may be accessed remotely, and in hard-copy form (when messages are printed). A single message also may appear as multiple separate documents, if it has been forwarded to third parties.
Large companies bear disproportionate risks and burdens, in part because of the greater volume of email they generate. In addition, burdensome email discovery requests most frequently are propounded in securities fraud, tort and employment cases or in other lawsuits where individuals or small companies have sued a large entity. When big companies face each other in litigation, such requests are less commonly propounded or reasonable restrictions may be agreed upon by opposing counsel because both sides in the litigation face equivalent burdens in responding to electronic discovery requests.
2. Liability Risks Imposed by Electronic Discovery.
a. Email Is Discoverable
Whether a company intends to do so or not, its employees may be creating an invisible, digital paper trail that can be used against the company in court. Email, when printed in hard copy or stored electronically, is usually recognized as equivalent to a document. Rule 34 of the Federal Rules of Civil Procedure expressly provides that any party can request documents, such as "other data compilations from which information can be obtained, translated, if necessary, by the respondent through detection devices into reasonably usable form." Email therefore generally is discoverable.
b. Email May Be Used Against a Company
Federal Rule of Evidence 1001 treats email and other computer generated data as writings and recordings. Employee email frequently may be used against a company as a party admission. By contrast, depending on its internal policies, a company may not be able to introduce a comparable message if the email communication fails to satisfy the requirements for a "business record." See, e.g., Monotype Corp. PLC v. International Typeface Corp., 43 F.3d 443, 450 (9th Cir. 1994). Companies that adopt specific policies on email retention, however, should be able to establish that particular email messages were generated and retained in the ordinary course of business, which therefore should be admissible.
c. The Potentially Prejudicial Effect of Email Evidence
When used in litigation, an email message may create a false -- and potentially unduly prejudicial -- impression of a company's business practices. A hard copy printout of an email message may not accurately convey the tone, impression or level of care actually associated with its creation. Even when it does, it is not always apparent that the author of an email message was an authorized speaker, or "speaking agent," for a corporate employer.
Although prejudicial, employee email may be admissible. Evidence may be excluded in federal court when its probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues or misleading the jury. Fed. R. Evid. 403. As a practical matter, a court has wide discretion in determining whether otherwise admissible evidence should nonetheless be excluded on this basis. For example, in Kelley v. Airborne Freight Corp., No. 96-2057, 1997 U.S. App. LEXIS 23793 (1st Cir. Sept. 3, 1997), the First Circuit explained that, in reviewing a trial court's decision under Rule 403 for abuse of discretion, "[o]nly rarely -- and in extraordinarily compelling circumstances -- will [this court], from the vista of a cold appellate record, reverse a district court's on-the-spot judgment concerning the relative weighing of probative value and unfair effect." Id., quoting Freeman v. Package Machinery Co., 865 F.2d 1331, 1340 (1st Cir. 1988).
By far the largest number of cases in which email evidence has been introduced have involved employment-related disputes, including wrongful termination, employment discrimination and sexual harassment suits. A well thought out email policy and employee education may reduce the creation of needlessly harmful email evidence and reduce employee friction.
3. The Law of Document Retention.
a. Email Deletion as Spoliation of Evidence
Email messages are routinely received, stored, copied and deleted by companies on a daily basis. Under the spoliation of evidence doctrine, when evidence is allowed to spoil or be destroyed, or is simply not retained, an adverse party may be entitled to a jury instruction, or in extreme cases the entry of judgment, based on a presumption that the evidence was not preserved because it was not favorable to the party's position.
Spoliation has been described as "the destruction or significant alteration of evidence, or the failure to preserve property for another's use as evidence, in pending or future litigation." Willard v. Caterpillar, Inc., 40 Cal. App. 4th 892, 907, 48 Cal. Rptr. 2d 607, 616 (1995) (citing other sources). Where the doctrine is recognized, spoliation of evidence may result in the entry of judgment, an adverse inference or merely an award of attorneys' fees, depending on the severity and significance of the destruction to the case at bar and the destroying party's intent.
A court may enter a range of sanctions, leading up to and including entry of default judgment, for a party's failure to comply with a discovery request and/or subsequent court order compelling discovery. See Fed. R. Civ. P. 37(b); see also, e.g., Telectron, Inc. v. Overhead Door Corp., 116 F.R.D. 107 (S.D. Fla. 1987) (default judgment entered where relevant documents were destroyed at counsel's direction on the day he was served with the complaint and a request for production of documents); see generally Insurance Corp. of Ireland v. Compagnie des Bauxities de Guinea, 456 U.S. 694 (1982) (upholding the constitutionality of entering a default judgment as a discovery sanction). Sanctions may be imposed under Federal Rule 37(b) even where evidence was destroyed prior to the entry of a discovery order. See, e.g., Turner v. Hudson Transit Lines, Inc., 142 F.R.D. 68, 72 (S.D.N.Y. 1991); In re: Air Crash Disaster near Chicago, Illinois on May 25, 1979, 90 F.R.D. 613, 620-21 (N.D. Ill. 1981).
Sanctions for document destruction also may be imposed for violations of a pre-trial scheduling order if the order specifically addressed the preservation of evidence. See Fed. R. Civ. P. 16(f); In re: The Prudential Insurance Co. Sales Practices Litigation, 169 F.R.D. 598 (D.N.J. 1996). Courts likewise have inherent authority to sanction litigants when a party has engaged in conduct which abuses the judicial process. Chambers v. Nasco, 501 U.S. 32, 43 (1991) (recognizing the inherent power of courts to impose sanctions because courts, in order to achieve the orderly and expeditious disposition of cases, must have the control necessary to manage their own affairs); Turner v. Hudson Transit Lines, Inc., supra, 142 F.R.D. at 72 (acknowledging the court's inherent power to sanction a party for spoliation of evidence); Capellupo v. FMC Corp., 126 F.R.D. 545, 550-51 n.14 (D. Minn. 1989) (sanctions for document destruction should be imposed pursuant to a court's inherent power, rather than under Rule 37). Where a discovery response fails to acknowledge spoliation of evidence because of a party's failure to make reasonable inquiry, sanctions may also be imposed pursuant to Rule 26(g). Turner v. Hudson Transit Lines, Inc., supra, 142 F.R.D. at 72, citing National Association of Radiation Survivors v. Turnage, 115 F.R.D. 543, 554-55 (N.D. Cal. 1987).
In evaluating whether to impose the most extreme sanction of a default judgment as a discovery sanction, the court in Telectron, Inc. v. Overhead Door Corp., 116 F.R.D. 107, 130 (S.D. Fla. 1987), held that it first had to find that: (1) the defendant acted willfully or in bad faith; (2) plaintiff was prejudiced by defendant's conduct; and (3) lesser sanctions would not serve the objectives of punishment and deterrence. Where a party is subject to a court order to preserve documents or compelling their production, and thereafter destroys documents subject to the order, more extreme sanctions are likely to be imposed. See, e.g., In re: The Prudential Insurance Co. Sales Practices Litigation, 169 F.R.D. 598 (D.N.J. 1996).
California, Alaska, Florida and Kansas have also recognized torts for intentional or negligent spoliation of evidence, while Georgia, the District of Columbia, Maryland, Missouri and New York have declined to do so. Willard v. Caterpillar, Inc., 40 Cal. App. 4th 892, 48 Cal. Rptr. 2d 607 (1995) (surveying and summarizing the law in other jurisdictions as of 1995), citing Nolte, The Spoliation Tort: An Approach to Underlying Principles, 26 St. Mary's L.J. 351 (1995). Although the specific elements of the tort vary from state to state and in some cases are not well defined, common elements include: (1) pending or probable civil litigation, (2) defendant's knowledge that litigation is pending or probable; (3) willful destruction of evidence; (4) intent to interfere with plaintiff's prospective civil suit; (5) a causal relationship between the evidence destruction and the inability to prove the lawsuit; and (6) damages. Willard v. Caterpillar, Inc., supra, 40 Cal. App. 4th at 910-11, 48 Cal. Rptr. 2d at 618, citing Foster v. Lawrence Memorial Hospital, 809 F. Supp. 831, 836 (D. Kan. 1992); and Smith v. Howard Johnson Co., 67 Ohio St. 3d 28, 615 N.E.2d 1037, 1038 (1993).
Whether the deletion of email should be deemed to constitute the destruction of evidence, entitling other parties in litigation to certain evidentiary presumptions, should depend on whether a message was deleted (1) pursuant to a company's consistently, and uniformly enforced policy on retention and destruction of email messages, or (2) before a specific discovery request was propounded or the party could reasonably have expected, based on the nature of the actual or reasonably anticipated litigation, that the message in question would be subject to discovery.
b. The Significance of Document Retention Policies
The existence of a document policy may under certain circumstances be deemed a mitigating factor in litigation when documents are destroyed pursuant to it, while a company's failure to have a coherent policy may be an aggravating factor. Compare Willard v. Caterpillar, Inc., 40 Cal. App. 4th 892, 921, 48 Cal. Rptr. 2d 607, 625 (1995) ("good faith disposal pursuant to a bona fide consistent and reasonable document retention policy could justify a failure to produce documents in discovery."), citing Carlucci v. Piper Aircraft Corp., 102 F.R.D. 472, 481-82 (S.D. Fla. 1984); Turner v. Hudson Transit Lines, Inc., 142 F.R.D. 68, 76 (S.D.N.Y. 1991) (destruction pursuant to a document policy evidenced negligence, rather than intentional conduct); with Telectron, Inc. v. Overhead Door Corp., 116 F.R.D. 107, 123 (S.D. Fla. 1987) (The absense of a coherent document retention policy during the pendency of this lawsuit . . . was cited as leading to Apossibly damaging document destruction occurring in both routine and non-routine manners . . . .).
In evaluating whether a company's destruction of documents pursuant to a document retention policy should give rise to a negative evidentiary presumption, the Eighth Circuit, in Lewy v. Remington Arms Co., 836 F.2d 1104, 1112 (8th Cir. 1987), suggested that courts consider three factors.1
As a general rule, when a party destroys documents pursuant to routine procedures, no evidentiary presumption should be drawn about the destruction (assuming that the retention period is otherwise reasonable). See Smith v. Uniroyal, Inc., 420 F.2d 438, 442-43 (7th Cir. 1970). Likewise, no evidentiary presumption may be appropriate when documents are destroyed after a period of years. See Vick v. Texas Employment Commission, 514 F.2d 734, 737 (5th Cir. 1975). Although there is no magic number, the term of retention should be at least as long as any applicable statute of limitations or regulatory review period.
Case law suggests that any document retention policy, in addition to being neutral, should be adjusted over time. Counsel may need to override a document destruction policy when lawsuits are filed or appear likely to be filed, and should periodically revise the policy when new case law or statutes impose additional record retention requirements, or when a category of documents relates to matters which have been the subject of significant or repeated non-frivolous complaints by customers or other third parties.
Whether given documents need to be retained longer than the ordinary retention period because of the existence of actual or potential litigation may be a difficult judgment call, especially for a large corporation which may generate millions of documents at multiple locations around the world. The allegations of a complaint and specific document requests will be looked at most closely in evaluating whether a party was on notice, and therefore had a duty -- notwithstanding the terms of its document retention policy -- to retain specific material for use in litigation. Communications threatening litigation may also place a party on notice that it should retain certain documents.
On the other hand, even where a company has notice of an impending lawsuit, it may not have notice that certain categories of documents may be relevant. As explained in cases from the Southern District of New York, "no duty to preserve arises unless the party possessing the evidence has notice of its relevance." Turner v. Hudson Transit Lines, Inc., 142 F.R.D. 68, 72-73 (S.D.N.Y. 1991), citing Danna v. New York Telephone Co., 752 F. Supp. 594, 616 n.9 (S.D.N.Y. 1990).
As stated by one court:
William T. Thompson Co. v. General Nutrition Corp., 593 F. Supp. 1443, 1455 (C.D. Cal. 1984) (citations omitted), cited with approval in Turner v. Hudson Transit Lines, Inc., 142 F.R.D. 68, 73 (S.D.N.Y. 1991).
4. Electronic Record Retention.
Email, although classified as a document under the Federal Rules of Civil Procedure and Federal Rules of Evidence, should not be treated exactly the same way as a paper document for purposes of discovery. By its very nature, email is more ephemeral than formal written memoranda. As a hybrid form of communication, email messages frequently are more like telephone or face-to-face communications than official corporate documents. An order mandating preservation of all internal email communications during the course of a lawsuit thus would not be that different (in terms of burden and intrusiveness) from an order mandating that a corporation tape record and transcribe telephone conversations and live meetings. At the very least, a ruling compelling preservation of email could have a stultifying effect on business and is not warranted under case law intended to preserve -- rather than mandate the affirmative creation of -- documentary evidence.
Email also should be treated differently because otherwise a company's burden in litigation may arbitrarily be determined by the particular technology used by the company. Businesses which use UNIX-based email systems, which automatically purge messages once they have been read (unless a recipient affirmatively stores the communication) could have much lighter discovery burdens than comparably-sized businesses which employ Apple or Windows-based systems which automatically store email unless it is affirmatively deleted. It would be fundamentally unfair if the discovery system imposed wildly disproportionate burdens on individual litigants based solely on the particular software each runs.
Rules applicable to destruction of paper documents likewise should not be applied uncritically to all forms of electronic records. For example, a large percentage of corporate email should not be considered evidence "reasonably available" to a producing party, such that a party's failure to mandate retention of it (even though such email would not otherwise be reasonably available to the adverse party), may, because the email system is under a company's control, create an inference "that the evidence is unfavorable to the party who could have produced it and did not." See Lewy v. Remington Arms Co., 839 F.2d 1104, 1111 (8th Cir. 1987) (setting forth the test for finding spoliation of evidence), quoting E. Devitt, C. Blackmor & M. Wolff, 3 Federal Jury Practice and Instructions, 72.16 (4th ed. 1987). While email generally will be deemed to be under a company's control (unless its email policy grants employees ownership rights in messages sought in discovery), the overwhelming burden on a company to retain copies of all email messages as they are generated (in contrast to providing whatever historic email may exist in company files, for a given time period) is such that email generated on an ongoing basis should not be considered reasonably available to the producing party.
To reduce the risk of being subject to adverse rulings based on electronic document management, businesses should adopt email retention and destruction systems.
5. Reducing the Burdens of Litigation With an Email Retention and Destruction System.
a. The Theory of an Email Retention and Destruction System
Companies should adopt an email system, rather than merely a policy. A policy involves user discretion and is appropriate for document retention, as well as for delineating when email should be stored or filed. A system implies the use of technology to automatically purge all historic email (other than official communications which, pursuant to company policy, should be retained). A system also implies that a company's policy is merely one component of its overall strategy for managing electronic records, which should also include employee education to ensure that any policies are implemented routinely and systematically.
b. Policies Should Distinguish Official From Unofficial Email
To minimize the risk of being subject to unreasonably broad court orders or retention obligations, companies should adopt email policies intended to delineate official company email, which should be treated as a paper document and subject to regular document retention policies, and personal or unofficial email, which should be routinely deleted. Although somewhat cumbersome, it is advisable to mandate that official email messages be printed in hard copy and filed, or stored electronically in special locations, within a reasonable time after a message is sent or received. Depending on the business and volume of email, that time period could be as short as a few weeks or as long as a few months. At regular intervals -- such as every Friday evening or every third Saturday -- email in all company inboxes and outboxes sent earlier than a pre-determined period of time (such as 60 or 90 days) should then be automatically purged. Because official email would be retained, a company adopting such a policy should not be subject to exposure for spoliation of evidence. By defining and distinguishing between official and unofficial email, companies also may minimize the risk that unauthorized communications among employees may later be used against a company in litigation.
In lieu of designating email as official or unofficial, which may place an unreasonable administrative burden on employees, some companies assign employees two separate email accounts -- one for official business and another for personal and/or administrative communications. This arrangement is easier to implement than a policy requiring employees to delineate between official and unofficial email, however a company which formally designates a given email account as a business account may have some obligation to retain email messages sent to or from that account, if messages are automatically stored electronically. Even if it establishes separate accounts, a company therefore may still find it advantageous to adopt a policy requiring employees to save or print and file certain categories of email communications.
An email retention system that provides that only official email will be retained also improves a company's chances of being able to use email evidence offensively in litigation -- as a business record -- rather than being limited to having email used only against it. Without a system in place ensuring that email records are generated and retained in the ordinary course of business, such communications may be used against a company, but not by it, in litigation.
c. Historic Email Should Be Automatically Purged
Email inverts the normal pattern of document retention. Paper records traditionally have been saved or thrown out on a daily basis by employees who make judgment calls about the lasting significance of documents generated or received that day, such as scribbled notes about a meeting, a joke circulated by an office-mate or an advertisement distributed by an employee selling Amway products. A similar filtering process may not normally take place with respect to email unless a company uses a UNIX-based system that requires recipients to affirmatively save an email message in order to avoid its automatic deletion once the message is read. Most email programs used by large corporations provide that email messages remain in an employee's in-box unless affirmatively deleted. These messages typically are either stored on a user's hard drive or on network servers. Whereas with paper documents an employee must make an affirmative decision to file -- and hence retain -- a given piece of paper, most email systems will automatically store all communications which are not affirmatively deleted. Thus, meaningless, trivial and potentially unimportant email piles up on individual hard drives or on network servers (and potentially in storage drives or backup tapes), creating a potential nightmare when, as a result of litigation, someone is forced to sift through all of the historic email.
An important component of a company email policy therefore should be the requirement that -- in addition to regular purges of old email -- historic email records not be retained on back up tapes. While a company's email system may be routinely backed up to protect data in case of a network crash or other malfunction, historical back-up tapes should not be retained. If a business routinely backs up its entire network -- including its email system -- and retains back up tapes in the same way that it retains documents for a period of years, it potentially exposes itself to horrendous burdens in discovery when it is sued. Thus, where practicable, backup tapes should regularly be overwritten so that at any given moment a company only has records of email for the preceding week or two.
The specific policy suggested here may not be practical for all companies2. A business which fails to implement an adequate policy, however, may find itself unnecessarily reviewing millions of email messages. This is especially true where attorney-client communications occur by email, since a company producing email back up tapes could risk waiving the attorney-client privilege if it inadvertently produces privileged email messages interspersed among millions of more routine communications. The risk of this type of inadvertent disclosure is substantial and courts are divided on the issue of whether an inadvertent disclosure waives the privilege. Compare, e.g., Genentech, Inc. v. ITC, 122 F.3d 1409 (Fed. Cir. 1997) (inadvertent disclosure of 12,000 pages of documents was found to have been the result of inadequate procedures and therefore held to have effected a general waiver of the attorney-client privilege and work product doctrine with respect to those documents); with Redland Soccer Club, Inc. v. Department of the Army, 55 F.3d 827, 856 (3d Cir. 1994) (inadvertent production of five documents did not effect a waiver of the deliberative privilege because the disclosure was not voluntary); Alldread v. City of Grenada, 988 F.2d 1425, 1434 (5th Cir. 1983); KL Group v. Case, Kay & Lynch, 829 F.2d 909, 919 (9th Cir. 1987) (no waiver when disclosure is inadvertent); and In re Sealed Case, 877 F.2d 976, 980 (D.C. Cir. 1989); Texaco Puerto Rico v. Dept. of Consumer Affairs, 60 F.3d 867 (1st Cir. 1995); In re Grand Jury proceedings, 727 F.2d 1352, 1356 (4th Cir. 1984) (even an unintentional or inadvertent disclosure waives the privilege).
The retention time for email legitimately should be much shorter than for other forms of documentary evidence (especially if a company adopts a specific policy requiring that "official" communications be separately retained). The speed with which email is communicated, the nature of such communications (which often address immediate needs, which are meaningless days or even hours later) and the tremendous volume that is generated in many companies all justify a shorter time period within which email must either be saved as "official" or automatically deleted. This form of email deletion should not be treated as equivalent to document destruction. Rather, it merely corrects for the inversion of employee document retention patterns caused by most non-UNIX-based email programs and systemizes what most people naturally do every day with tangible communications.
Footnotes:
1. Courts may assess the reasonableness of both the general retention period and categories of documents subject to destruction, as well as considering whether a longer retention period should apply for certain specific categories of documents.
2. For example, U.S. government regulations may compel more stringent retention policies for certain government contractors.
Originally Published in The Essentials of Computer Discover Seminar Course Materials. By Glasser LegalWorks Copyright (c) 1999 Glasser LegalWorks. All Rights Reserved.