<img height="1" width="1" src="https://www.facebook.com/tr?id=1214483435298340&amp;ev=PageView &amp;noscript=1">

Posts on Legal Tech, Litigation, & E-Discovery

E-Discovery Prep: Client Interviews and Opposition Research

May 28, 2020
Posted by Jeff Kerr

Preparing for E-Discovery

It’s safe to say electronic evidence—text messages, digital photos, cloud storage, and the internet of things—will be involved in every new case you have. As a result, it’s important you prepare to produce and request electronic evidence from the start of your case.

Early preparation for e-discovery doesn’t only reduce risk, it gives you the best odds of winning your case. Moreover, early preparation for e-discovery is the best antidote to clients who conceal facts or evidence from their own lawyers. Nothing matches the peace of mind you’ll experience from knowing all the facts, good or bad, before you start the formal discovery process.

In this post, I’ll cover two important preparatory steps: the client interview and opposition research.

Step 1: The Client Interview

When you begin working with a client on a new litigation matter, you’ll know something about the facts of the case, but next to nothing about the electronic evidence in your client’s custody. Even inadvertent destruction or modification of evidence can lead to heavy penalties or an outright dismissal of your case. To avoid spoliation, you’ll need a clear picture of what evidence your client has and where it lives.

Question Mark SquareTo do this, you’ll ask a lot of questions, and most clients don’t love answering them. Some clients get nervous because there’s something in their digital lives that they don’t want you to know about. It could be about the case (e.g., evidence that contradicts parts of the client’s story or supports the other side’s claims), or it could be something more personal (scandalous text messages or embarrassing browser history). Either way, it’s better to deal with these problems upfront while you can do something about them (or, alternatively, walk away from the case).

In my practice, I helped clients understand the need for my questions by saying the following:

  • “I want you to get the best outcome; that’s my job. To make sure that happens, we’re going to force the other side to turn over emails, files, text messages, digital photos, social media posts, and anything else they have so that we can prove you’re right. They will ask the same things from you, and we have to be prepared. If we don’t have a strong defensive position on discovery, we won’t be able to be aggressive about getting the evidence we need.”
  • “It’s also very important to go over sources of electronic sources so that we can determine a cost-effective preservation strategy. This is the best way to control costs and avoid problems at a later date. If we’re going to win your case, we can’t lose it first because of a spoliation issue.”

E-Discovery Q Checklist_IMGOnce you’ve gotten over any objections, you can proceed to ask questions about different categories of electronic evidence. Even if you’re an expert on IT issues, it helps to have a checklist or a script, which you can download here.

Tailor the questions from this checklist to your specific case. For example, if a business client was sued by a former employee, then you’ll gather more information about personnel records, compensation data, internal email, HR databases, and the plaintiff’s former workstation. On the other hand, if your client was involved in a slip-and-fall incident, you’ll focus more on SMS records, geolocation data, fitness tracker data (to verify injuries), and social media (to verify pain and suffering). Also, note that even though the focus is on e-discovery, treating paper documents as part of the same puzzle is a good practice.

Don’t let the questions listed limit your imagination or your follow-up questions in any way. Software and hardware is constantly evolving. Also be sure to take good notes. You’ll come back to them again and again as the case progresses. While your client may find the level of detail puzzling, a thorough interview pays dividends and is a necessary pre-condition for a strong preservation strategy.

Step 2: Opposition Research

Taking an inventory serves a defensive purpose, exposing what needs to be preserved and collected to provide iron-clad protections against spoliation claims. Here, we turn from defense to offense: gathering information from your client and other sources to help you map out enemy territory.

chess board

Effective opposition research for e-discovery draws from two often-overlooked sources: your client and Google.

Mining Your Client and Friendly Witnesses for Information

In most cases, litigation parties knew each other before one of them decided to file suit against the other. These cases include business disputes, family law proceedings, employment cases, and worker’s compensation claims. (Personal injury and product liability lawsuits are common exceptions.)

If the parties had (or still have) a relationship, they probably know a lot about each other, and this knowledge often encompasses details that are extremely useful in e-discovery. For example, say that your client is a former employee of the defendant. You can ask the following questions:

  • What program did you use to check your email at work? Do you know if your email was backed up in any way?
  • Did employees have mobile devices issued to them by the business? If so, how did they use the devices?
  • Who did you contact for technical support issues at work? Was there an IT department?
  • What software did you use at work? Do you know if the data from these programs was stored on-premises or in the cloud?
  • Do you know any specifics about the devices (smartphones, tablets, notebooks) used by the bad actors in this case?
  • Did the company have any rules about backing up data or purging old data or emails? Did employees follow these rules?
Devices

On the other hand, if the opposition is an individual (perhaps you’re defending the business in the above example), the following questions can be helpful:

  • What do you know about the devices (smartphone, tablet, notebook) the plaintiff uses? How does the plaintiff use them, if you know?
  • Does the plaintiff use social media? Are you friends with the plaintiff on any of these accounts? Do you know how often and for what purposes the plaintiff uses these accounts?
  • What email addresses do you have for the plaintiff? Do you know what the plaintiff uses these accounts for?
  • Is the plaintiff tech-savvy or not very good with technology?
  • Do you know if the plaintiff carried a thumb drive or other portable storage device?

Another reason to ask your client questions like this is that judges expect you to obtain this sort of information. Too often, attorneys seek information in discovery that they could get from their own clients. This often comes up in e-discovery, where parties routinely ask each other questions about devices and IT infrastructure. While your client can’t give you all the information you need, you will almost always get information that will help you make your discovery requests more targeted and, consequently, more likely to lead to valuable evidence.

Google: The Holy Grail of Opposition Research

Ah, Google. What can’t you find on Google? My favorite story of the power of Google search is how an IRS agent used Google’s “advanced search” feature to discover the identity of the mastermind behind the illegal Silk Road marketplace–a problem that had baffled numerous government agencies with access to expensive proprietary tools for years. To get the best results out of Google, you have to be creative and you have to know advanced search operators.

GoogleThe first and most obvious technique is to search Google for names and nicknames of the opposing parties and witnesses. Doing this, you’ll often find blogs, social media profiles, LinkedIn profiles, wish lists, forum posts, and more.

In addition to finding interesting personal information through name searches about individuals, you can find tons of information about business IT systems. If you want to know what kinds of technology and software a particular business uses, search for press releases, employee LinkedIn profiles, technical blog posts, and job postings. You’ll often find announcements about the installation of new systems or job postings stating the technologies that employees in various departments will need to know. Once you have this information, you can almost always download manuals for those technologies that explain exactly how information is stored and how it can be both search and exported.

This last tip may only be embraced be hardcore nerds like myself, but it is powerful indeed. It’s wonderful to sit down at a Rule 26(f) conference knowing more about your opponent’s IT infrastructure and export capabilities than your opposing lawyer. And nothing is more powerful than using your opponent’s own website to rebut their counsel’s assertions about the feasibility of various search or export tasks.

Ensuring What You Have Found is Admissible

Inspect what you find and print to PDF (including the URL and timestamp headers and footers). You can also take screenshots of things that don’t format well for print to PDF.

I recommend save-to-PDF and screenshots, but some will object that these duplications may not be admissible. This is only somewhat accurate. On their own, those may be difficult to authenticate, but you’ll have ample opportunities to authenticate them during discovery, often simply by having the parties and witnesses who created the relevant content authenticate the evidence during depositions. Accordingly, it’s probably not necessary to buy expensive web-based evidence collection software unless you’re handling criminal cases.

access-application-browser-connection-267469

If you have a cagey or dishonest opposing party who you think might deny authoring their own LinkedIn profile or social media posts, then I suggest a strong setup before asking authentication questions directly in a deposition. Here’s a sample series of questions that you can use to lock down authentication of Facebook messages:

  • You use a password when your access your Facebook account, right?
  • You don’t give away your Facebook password or tell it to strangers?
  • Do you keep your password secret?
  • You protect your account with a password because you don’t want someone breaking into your Facebook account and pretending to be you?
  • To your knowledge, no one has broken into your Facebook account and pretended to be you?
  • No one has made unauthorized posts on your Facebook account under your name?
  • All of the posts under your name on Facebook were posted by you?

This line of questioning works because the witness feels smart when providing the answers that you need. By answering “yes,” the witness blocks off any escape routes and will be compelled to authenticate the evidence you found.

You can go very deep when preparing for e-discovery. These lines of inquiry may seem too time-consuming and too far from the core facts of the case for some lawyers to pursue. But the rewards of preparation—which include both finding valuable evidence and smooth handling of the e-discovery process—are worth the effort.

Are you working on a complex litigation case now? If so, sign up for a free trial of CaseFleet to get full-text search and streamlined document review for your whole team!

*This post was originally published in the three-part "Preparing for E-Discovery" series on Lawyerist.com.