Skip to Content
  • Home
  • About the Bar
  • Mission
  • Forms
  • Sitemap
    • Licensee Directory
      Last Name:
      First Name:
      Bar Number:
      City:


    • Login
OSB Logo

Oregon State Bar Bulletin — FEBRUARY/MARCH 2009

The smaller the law firm, the more paralyzing the notion of electronic evidence seems to be. Solo practitioners, in particular, seem to writhe in agony when confronted with cases involving e-evidence. How afraid are they? The authors have actually overhead two solo attorneys conferring in a courthouse corridor, exchanging mutual promises: “I won’t go near electronic evidence if you won’t.” “Absolutely, you have a deal.” Ethical implications of that conversation aside, the fear it reflects is all too common. Below is a wealth of practical advice regarding electronic discovery for the solo and small law firms handling electronic discovery.

We live in a world where all the studies agree that more than 95 percent of our information is generated electronically and will never be converted to paper. That statistic alone makes it clear that in many, many cases, electronic data will be pivotal.

It may well be that the mega-cases are part of the reason for the panic response felt by so many lawyers when confronted with electronic evidence. Without question, cases involving Fortune 500 clients and their pricy electronic discovery firms tend to rack up huge bills. The price range can be in the millions — six figure cases are garden variety. This is daunting, but rest assured, there is another world out there, one in which small electronic discovery firms work with solos and small firms on a much reduced and inexpensive scale.

We should note that computer forensics is typically the starting point for electronic evidence in small cases as it "captures" all of the electronics and not just that which is visible to the user. Some cases may not even need computer forensics and you can move right to the harvesting of electronic data.

So what is a small case? Here are some common examples:

A divorce with some assets, but the parties are not millionaires. If their assets are small enough, they can barely afford an attorney, much less a foray into electronic discovery.

A breach of contract suit between an individual and a small company.

Suits involving defamation or slander, where neither is a large entity.

Criminal matters involving the possession of child pornography or online stalking.

Theft of proprietary data — again,where neither party is a Goliath.

In small cases, the cost of electronic discovery should, most of the time, fall under the $10,000 mark. Mind you, that’s a ballpark; there are small cases that turn out to have unexpectedly large volumes of data. Or perhaps the information to be unearthed is complex and in many different places. Nonetheless, if you have a trustworthy vendor you can expect most truly small cases to fall under $10,000, provided that only a computer or two is involved. If there are a handful of computers and not a vast volume of data, you may find yourself in the $10,000-$20,000 range. Most vendors will charge a flat fee for imaging if it can be done on their own premises, usually charging $500-$1,000 per hard drive. Hourly rates for analysis are usually in the $200-$350 range.

The hardest part of electronic data discovery (EDD), from the point of view of a honest vendor (and we use that term pointedly, since spiraling costs are the No. 1 complaint against EDD vendors) is that you can never be sure exactly what you’re dealing with when you first get into a case. If you know you only have a computer or two to analyze, most of the time you know the case will be a small one. However, it doesn’t take many more machines and case complexities to ramp up the price.

Understandably, lawyers want their experts to give them a quote. Remember the line from "Star Trek?" Mr. Spock intones gravely to Captain Kirk, "I will try to give you my very best guess." Well, that’s what you’re going to get. A principled company will give you their very best guess and then tell you that that’s exactly what it is, a best guess.

Happily, once the forensics acquisitions are done and they are immersed in the case, they will generally know a great deal after six to eight hours and can provide a far better estimate of ultimate costs. Now they have a sense of how much data they are dealing with and how difficult or easy it may be to find and export the data into a format that the attorney can use to review it.

Therein lies another challenge for the small-firm attorney: what format do you want electronic evidence in? The vast majority of these attorneys have no access to big name e-discovery reviews tools — in fact, only a tiny fraction of them even have Concordance or Summation (two of the more well used EDD tools). All this is less of a problem than you might imagine. Again, small cases are a beast unto themselves. With a limited amount of volume, it is simple enough for your computer forensics company to extract the relevant evidence and place it on a CD or DVD in a format that you can easily open using Word, Outlook, Acrobat, Internet Explorer, etc.

Better yet, your expert can give you a full report containing hyperlinks to the evidence so you can go through the story from beginning to end and take a look at the e-evidence at various waypoints along the journey. As an example, your expert may conclude at the outset that there is evidence of adultery and dissipation of marital assets. From there, the expert report may reference a volume of correspondence between the defendant and a particular paramour, then giving you a link to those e-mails so you can review the trail of cybersex and rendezvous arrangements in sequence. Perhaps there is evidence of assets hidden in off-shore accounts followed by a link to the Internet evidence showing the deposits in the account. Possibly there are documents in which various assets are listed with a link to those. These reports can be quite tidy and useful. Without a lot of technological know-how and skill, an attorney can review and hone in on the facts that are most relevant to the case.

Sometimes, you may look at the evidence in the hyperlinks and be confused by what you see. No worries, mate, that’s why you have an expert. Just pick up the phone and your expert can talk you through what you’re looking at piece by piece. Frequently, attorneys are confused by information found in "slack space" (we promise not to give you any ultra-technical definitions here). Slack space contains data that has been previously deleted and is partly but not wholly overwritten.

Sometimes, you may find something that’s quite the smoking gun ("Robert, we’ve been lovers for four years and I’m so tired of waiting") but you cannot attach it necessarily to a person or date because of the information around those words has been overwritten. Still, if the suspect paramour is named "Robert," this evidence is fairly persuasive.

Whether the case involves family law, business law or criminal matters, never assume you know all the relevant e-mail addresses. Trust us, when someone crosses over to the dark side to do something they shouldn’t, it is common practice to do so under something other than their normal e-mail address. The guy who steals a client database from his employer almost invariably has a web-based e-mail account such as Gmail or Hotmail and sends the data to himself at home. Likewise, a wandering spouse is very likely to use an e-mail that their other half doesn’t know about.

Another thing often overlooked in small cases is the whereabouts of the evidence. The normal process is to fixate on an individual’s computer. It’s a great place to start, but does that individual use other computers, at home or at work? Do they use thumb drives or iPods (iPods have become a fast growing phenomenon in computer forensics — remember, they carry data of any kind, not just music)? Do they have a cell phone? And, oh my, the text messages we have seen that scorch our eyebrows! Don’t forget the disks and CDs that they have cluttering their desk. Check out their activity on social networks too. So think technology, but think globally — no tunnel vision.

Another oft-asked question: can my client install spyware and monitor their spouse to gain the evidence they need? Though there is not yet a federal spyware act, and state laws vary widely, the answer is no, no, no! The use of spyware means that you are intercepting electronic communications, forbidden under the Federal Wiretap Act. Even if it is inter-spousal, and both parties live in a state where spyware is not expressly forbidden, the federal law will still apply because the Internet is a vehicle of interstate commerce. Once you click "Send," even if the recipient is just a block away, your message might traverse communication lines in several states. We have seen divorce cases where the adulterous spouse got a "free ride" because evidence gather using by spyware was held to be inadmissible. (In our own state of Virginia, which has a state wiretap act, evidence gathered through the interception of electronic communications is expressly excluded, as it is in most states with similar laws.) We have also seen parties to a divorce forced to take the Fifth Amendment in a deposition because they only found out subsequent to their use of spyware that they had committed a crime. In that case, not only does the adulterous spouse get off scot-free, but the wronged spouse may be charged with a crime. This is not a happy or fair outcome, but we see it all too often.

Do you really need to know the science of forensics to handle an EDD case? Absolutely not — that’s why you have an expert. Having said that, the process (not the science) of the average case is not all that hard to understand. Generally, your expert will assist you first in locating all of the evidence. Let us say that a single computer is at issue and that a court has granted you the right to have your expert image the computer and analyze the evidence. The forensic technologist will carefully log the computer in on a chain of custody sheet and take photographs to document the computer and its condition (at times we’ve even been able to document evidence of tampering via digital photos). The technologist will then do a forensic image of the computer, which is not a copy or a "ghost," but a bit-by-bit image of the computer. The data in the imaged computer is not touched at all — the imaging is done in a read-only mode. At the end there will be a mathematical algorithm (normally an "MD5 hash," a sort of digital fingerprint) which precisely matches the MD5 fingerprint of the acquired computer hard drive. Ordinarily, the expert will scan the evidence for any viruses or Trojans that might have to be dealt with. Sadly, the next step is to scan for child pornography, using algorithms for known images. Following this point, the image will be held under lock and key until analysis is authorized.

Analysis presents its own set of problems, but generally the expert can ferret out the correct search protocol by asking the attorney questions. Again, the attorney is not expected to be savvy in computer forensics. If the attorney can explain clearly what he or she is looking for, the expert will tell you how best (and most economically) to search the electronic evidence. It is helpful if the expert is given the original pleadings in the case, as well as any other documents that may be pertinent to forming a search protocol. If money is a huge concern, make sure you are narrowly tailoring the search. The greater the volume of responsive data, the greater the cost to bookmark and extract search results.

If you actually get to trial, make sure you adequately prepare your expert. There is nothing worse than listening to an attorney fumble for words about a subject he or she doesn’t understand, often thereby confusing the very expert on whose testimony he depends. Forensic technologists who are frequently expert witnesses can help outline the questions for you, so that you appear to be "telling a story" which can be readily understood. There is always a danger that this sort of technical testimony is obtuse to a judge or jury, so keep it straightforward and simple, and in plain English. If you are comfortable with PowerPoint, use it; most forensic technologists can help you translate any case complexities into an easy-to-understand presentation format.

If you’re just taking baby steps into EDD, educating yourself is important. It is not nearly as hard as you might imagine. These days, there are many CLE programs on the subject of ED, and often they can be found online. Books and periodicals abound, as do online resources. A very good starting point is www.discoveryresources.org. If you want to get a flavor for ED in case law quickly, we recommend reading the whole line of Zubulake opinions (there are seven) in Zubulake v. U.B.S. Warburg, a standard discrimination case which resulted in writings that are still referred to as the "gold standard" in ED. The Southern District of New York has really put itself on the ED map with this series of cases. If metadata really confuses you (or if, horrors of horrors, you don’t know what metadata is) a great guide to metadata can be found in the Williams v. Sprint case, 230 F.R.D. 640 (D. Kan. 2005). Finally, you can download all of the EDD work of the Sedona Conference at www.thesedonaconference.org/. Courts very frequently cite to the works of the Sedona Conference, and woe betide the lawyer who is unfamiliar with its guidelines.

The most important thing you can do if you are a new voyager in this esoteric land is to find an expert you trust. Experts are used to hand-holding and patient teaching. Good experts will also have forms that you can use as a template for your cases and will guide you at each juncture of your case. Once you’ve done a few ED cases, you’ll be surprised at the extent of your knowledge.

Remember the immortal words of Confucius: "What I hear, I forget; what I, see I remember; what I do, I understand." Immerse yourself in EDD, get a few cases under your belt, and you too will join the legions of lawyers who have learned to travel comfortably in the world of electronic evidence.

Happy voyaging!

 

ABOUT THE AUTHORS
The authors are the president and vice president of Sensei Enterprises, Inc., a legal technology and computer forensics firm based in Fairfax, Va. They can be reached at (703) 359-0700 or through the firm’s website, www.senseient.com.

© 2008 Sensei Enterprises, Inc.


— return to top
— return to Table of Contents

  • For The Public

      Public Legal Information

    • Public Information Home
    • Legal Information Topics
    • Oregon Juror Guide
    • Submit Ethics Complaint

    • Getting Legal Help

    • Finding The Right Lawyer
    • Hiring A Lawyer
    • Lawyers Fees

    • Client Services

    • Client Assistance Office
    • Client Security Fund
    • Fee Dispute Resolution
    • Public Records Request
    • Locating Attorney Files

    • Unlawful Practice of Law

    • UPL Information
    • UPL FAQ

    • Volunteer Opportunities

    • Public Volunteer Application
  • For Licensees

    OSB Login

    • Log In To OSB Site
    • Licensee Account Setup
    • Non-Licensee Account Setup
    • Reset Password

    OSB Resources

    • Attorney's Marketplace
    • Career Center
    • Events
    • Forms Library
    • Online Resources
    • OSB Group Listings
    • Performance Standards
    • Rules Regulations and Policies
    • Surveys and Research Reports
    • Unclaimed Client Funds
    • Voting Regions and By-City
      County Information

    Benefits for
    Oregon Lawyers

    • Log in to Decisis
    • – Decisis Information
    • – Decisis FAQ
    • – Inactive Licensee Subscriptions
    • No Cost Trust & Billing Software

    Legal Ethics

    • Legal Ethics Home
    • Find an Ethics Opinion
    • Bulletin Bar Counsel Archive

    Company Administrator

    • Company Administrator Home
    • Company Administrator FAQ
    • Authorization Form

    State Lawyers
    Assistance Committee

    • SLAC Info

    Volunteering

    • Volunteer Opportunities

    Court Information

    • Judicial Vacancies
    • Court Info | Calendars | Jury Info
    • Oregon Attorneys
      in Federal Court
    • Tribal Courts of Oregon

    OSB Publications

    • Bar Bulletin Magazine
    • – Bulletin Archive
    • – Legal Writer Archive
    • Capitol Insider
    • Disciplinary Board Reporter

    PLF Programs

    • (OAAP) Oregon Attorney
      Assistance Program
    • Practice Management Attorneys
    • Malpractice Coverage
  • CLE/Legal Publications

    CLE Seminars

    • CLE Seminars Home
    • Online Seminar Registration
    • General Info/FAQ

    My Account

    • My Content
    • My Events
    • Order History

    Legal Publications

    • Legal Publications Home
    • Log in to BarBooksTM
    • BarBooksTM FAQ
    • Online Bookstore
    • Legal Pubs Blog
  • Bar Programs

    Diversity & Inclusion

    • Diversity & Inclusion Home
    • Diversity Story Wall
    • D&I Programs
    • ACDI Roster
    • D&I Staff Contacts
    • D&I Links

    Legislative/Public Affairs

    • Legislative Home
    • Committee Contacts
    • Legislative Sessions
    • Staff Contacts
    • Useful Links

    Legal Services Program

    • LSP Home

    Oregon Law Foundation

    • OLF Home
    • Partners in Justice

    Fee Dispute Resolution

    • Fee Dispute Resolution Home

    Pro Bono

    • Pro Bono Home
    • Pro Bono Reporting
    • Volunteer Opportunities

    Lawyer Referral and Information Services

    • RIS Login
    • Summary of Referral and Information Services Programs
    • Lawyer Referral Service Info and Registration
    • Modest Means Program Registration Forms
    • Military Assistance Panel Training Info and Registration Form
    • Problem Solvers Registration Form
    • Lawyer To Lawyer Registration Form

    (LRAP) Loan Repayment Assistance Program

    • LRAP Home
    • LRAP FAQ
    • LRAP Policies
  • Licensee Groups

    Sections

    • Section Info/Websites
    • Joining Sections
    • CLE Registration Services
    • Standard Section Bylaws (PDF)
    • Leadership Resources
    • Treasurers Tools

    Committees

    • Home
    • Leadership Resources
    • Professionalism Commission
    • Volunteer Opportunities

    House of Delegates

    • HOD Home
    • HOD Resources
    • Meetings
    • Rules (PDF)
    • Roster (PDF)
    • Staff Contacts

    Board of Governors

    • BOG Home
    • Meetings & Agendas
    • Members
    • Liaisons
    • Committees
    • Resources
    • Task Forces

    Oregon New Lawyers Division

    • ONLD Home
    • Law Students
    • Student Loan Repayment
    • Committees
    • Upcoming Events

    Task Forces and Special Committees

    • Task Forces Home

    Volunteer Bars

    • List/Contacts
    • Leadership Resources

    Volunteering

    • Volunteer Opportunities
  • Licensing/Compliance

    Admissions

    • Admissions Home
    • Alternative Admittance
    • Applicants for Admission
    • Admissions Forms
    • Past Bar Exam Results

    Supervised Practice Portfolio Examination

    • SPPE Home

    Licensed Paralegal Program

    • LP Home

    Lawyer Discipline

    • Discipline Home
    • Disciplinary Board Reporter
    • Disciplinary Boards
    • Client Assistance Office
    • (SPRB) State Professional Responsibility Board

    Membership Records

    • Address Changes
    • Good Standing Certificate
    • Request Discipline File Review

    MCLE

    • MCLE Home
    • Program Database
    • Forms
    • Rules (PDF)

    IOLTA Reporting

    • IOLTA Home
    • IOLTA FAQ
    • No Cost Trust & Billing Software

    Licensing Fees

    • Licensing Fee FAQ
    • Licensing Fee Payment

    Status Changes

    • Status Changes FAQ
    • Inactive Status Form
    • Retired Status Form
    • Active Pro Bono Status Form
    • Reinstatement Forms
    • Resignation Form A
    • Pending Reinstatements

    Unlawful Practice of Law

    • UPL Information
    • UPL FAQ

    Pro Hac Vice/Arbitration

    • Pro Hac Vice
    • Arbitration

    New Lawyer Mentoring Program

    • New Lawyer Mentoring Program Home

    Professional Liability Fund

    • Professional Liability
      Fund Website
For The Public

Public Information Home
Legal Information Topics
Oregon Juror Guide
Finding The Right Lawyer
Hiring A Lawyer
Lawyers Fees
Client Assistance Office
Public Records Request
Unlawful Practice of Law
Fee Dispute Resolution
Client Security Fund
Volunteer Opportunities
for the Public

For Licensees

BarBooksTM
Bulletin Archive
Career Center
Decisis
Judicial Vacancies
Legal Ethics Opinions
OSB Group Listings
OSB Login
OSB Rules & Regs
SLAC Info
Surveys and Reports
Volunteer Opportunities

CLE/Legal Pubs

CLE Seminars Home
Legal Publications Home

Bar Programs

Diversity & Inclusion
Fee Arbitration/Mediation
Legal Services Program
Legislative/Public Affairs
Loan Repayment
Assistance Program

Oregon Law Foundation
Pro Bono

Licensee Groups

Board of Governors
Committees
House of Delegates
Volunteer Bars
Oregon New
Lawyers Division

OSB Sections
Professionalism
Commission

Volunteer Opportunities

About The Bar

About the Bar
ADA Notice
Contact Info
Copyright Notice
Directions to the Bar
Meeting Room Rentals
Mission Statement
OSB Job Opportunities
Privacy Policy
Staff Directory
Terms of Use

Licensing/Compliance

Admissions
Client Assistance Office
Client Security Fund
IOLTA Reporting
Lawyer Discipline
MCLE
Licensee Fee FAQ
New Lawyer
Mentoring Program

Professional Liability Fund
Status Changes

Oregon State Bar Center

Phone: (503) 620-0222
Toll-free in Oregon: (800) 452-8260
Facsimile: (503) 684-1366

Building Location:
16037 SW Upper Boones Ferry Road
Tigard, OR 97224

Mailing Address:
PO Box 231935
Tigard, OR 97281

Oregon State Bar location Map

Copyright ©1997 Oregon State Bar  ®All rights reserved | ADA Notice | Mission Statement | Privacy Policy | Terms of Use