Limitations and Pitfalls in Modern e-Discovery and Information Governance: Addressing ESI protocols in active litigation, and navigating your preservation obligations and defensible deletion across your organization

David Kessler
Ellen Blanchard
Esther Clovis
Andrea L. D'Ambra
Susana Medeiros
David Kessler | Norton Rose Fulbright
Ellen Blanchard | Norton Rose Fulbright
Esther Clovis | Norton Rose Fulbright
Andrea L. D'Ambra | Norton Rose Fulbright
Susana Medeiros | Norton Rose Fulbright
On-Demand: September 16, 2024

2 hour CLE

This program is only available to All-Access Pass Members.
Subscribe to myLawCLEs All-Access Pass...
Get this course, plus over 1,000+ live webinars.
Learn More

Program Summary

Session I - Have ESI Protocols Outlived Their Usefulness? How to avoid being cudgeled by your own protocol – David Kessler, Esther Clovis, Ellen Blanchard

This session examines the limitations and potential pitfalls of Electronically Stored Information (ESI) protocols in modern e-discovery. The session delves into the non-mandatory nature of ESI protocols, the risks associated with data preservation, and the importance of clear communication and notice in the discovery process. It also critiques the rigidity of Technology-Assisted Review (TAR) protocols and provides strategies for customizing protocols to optimize efficiency and effectiveness, particularly in complex and large-scale matters.

Key topics to be discussed:

  • ESI Protocols are Not Mandatory
  • Why Preservation is a Dangerous Topic and How to Address It
  • The Difference between “Agreeing to Agree” and Providing Notice of Discovery Process
  • TAR Protocols Undermine Their Agility and Power
  • Push Back on Standard Protocols Especially in Larger Complex Matters

Session II - The Pitfalls of Over-Preservation: Strategies for defensible deletion – Andrea L. D'Ambra, Susana Medeiros

In this session we will discuss the critical importance of balancing data retention with the need for defensible deletion, including the complexities introduced by automated deletion policies. This session emphasizes the necessity of conducting a thorough investigation of data sources to ensure that documents under legal hold are not mistakenly deleted, thus safeguarding against potential spoliation sanctions. Panelists will share practical advice on identifying and eliminating unnecessary data while minimizing discovery costs and risks. This session will also cover the advantages and challenges of automated deletion, as well as best practices for implementing a defensible deletion strategy that ensures compliance with legal obligations and effectively manages data storage.

Key topics to be discussed:

  • The Importance of Thorough Data Source Investigation
  • Defensible Deletion Strategies and Automatic Deletion Policies
  • Balancing Data Retention and Deletion

Closed-captioning available

Speakers

David Kessler_myLawCLEDavid Kessler | Norton Rose Fulbright

David Kessler is the Global Head of the firm’s E-Discovery and Information Governance practice and the Head of the US Privacy practice. He is a thought leader on discovery, data privacy, records management and cyber security.

David counsels’ clients on a range of data privacy matters focusing on compliance and cross border data transfers. David has provided advice regarding the Stored Communication Act (SCA), the Health Insurance Portability and Accountability Act (HIPAA), the Children’s Online Privacy Protection Act (COPPA) and Family Educational Rights and Privacy Act (FERPA). He also provides advice to multinational clients regarding compliance with EU data protection and privacy laws including the General Data Protection Regulation (GDPR), where he works closely with his colleagues in the EU.

David is a Certified Information Privacy Professional (CIPP/E) through the International Association of Privacy Professionals (IAPP).

David acts as global discovery counsel for technology, finance, pharmaceutical and manufacturing companies where he helps them address litigation readiness, cross border discovery complications and acts as special discovery counsel in complex litigations. David focuses not only on tactical e-discovery issues in particular cases but advises clients regarding strategic e-discovery portfolio management and data governance. For example, David has helped clients with emergency ex parte preservations orders; negotiations with opposing counsel regarding disaster recovery data; establishing that opponents had fabricated e-mails; and developed litigation readiness protocols.

David has a particular focus on cross-border discovery. David was recently the counsel of record for an amicus brief before the United States Supreme Court in United States v. Microsoft addressing the importance of comity in cross border discovery. David has helped clients preserve, collect, process and transfer data from countries all over the world including, by way of example, Australia, Brazil, Canada, China, Germany, India, Italy, Nigeria, Japan, South Africa, Spain, Switzerland, and the United Kingdom. David is a contributor to and has been a faculty member for the Sedona Conference’s (one of the world’s leading e-discovery organizations) Work Group 6 on International Electronic Information Management, Discovery and Disclosure.

David was an adjunct professor at the University of Pennsylvania Law School where he taught an advanced seminar on “E-Discovery.”

As part of his information governance practice, David has advised clients on where and how to store and manage data globally as well as how to integrate record retention, data security and e-discovery into the fabric of their IT infrastructure. Beyond helping clients stand up information governance programs with policies and record retention schedules, David counsels’ clients on mobile device management, ephemeral data, disaster recovery and business continuity systems and the cloud. He also has represented clients in defensible data disposition projects and examining the contours of their own dark data.

As part of the firm’s cybersecurity team, David has represented clients both preparing for and responding to cyber incidents. He has drafted and revised incident response plans (IRPs), run tabletop exercises and helped clients select and contract with forensic and public relations vendors. David has advised clients about the scope of data breaches and the company’s obligations to notify the appropriate authorities, and the people affected by the breach. Finally, David has represented clients in investigations by the FTC into suspected incidents and the quality of the clients’ preparations and response.

 

Ellen Blanchard_myLawCLEEllen Blanchard | Norton Rose Fulbright

Ellen Blanchard is Senior Counsel in the Global Cybersecurity and Privacy group of Norton Rose Fulbright. With extensive experience across all phases of discovery, Ellen has represented clients from a variety of industries in complex commercial litigations cybersecurity incidents, and government investigations involving securities, antitrust, healthcare and IP issues. She also advises clients on information governance issues such defensible disposition, AI Acceptable Use policies and record retention. Prior to joining Norton Rose Fulbright, Ellen served as Director of Discovery and Information Governance at an international telecommunication company where she was responsible for developing the strategic vision for discovery and providing leadership in managing the company’s data. She led a team that was responsible for proactively managing electronic and document discovery for active litigation matters, including complex and high-stakes disputes such as mergers, government investigations, cyber investigations, and class actions. She successfully managed the team responding to the regulatory requests stemming from the TMobile Sprint merger approval. Prior to T-Mobile, Ellen was a litigator at Boies, Schiller & Flexner and Associate GC and Director, eDiscovery Consulting at Evolver Legal Services. As a frequent speaker at conferences and podcasts, she enjoys sharing war stories of life in the discovery trenches.

 

Esther Clovis_myLawCLEEsther Clovis | Norton Rose Fulbright

Esther Clovis is a Senior Associate in the Global Cybersecurity and Privacy group of Norton Rose Fulbright’s New York office. She has assisted clients address issues regarding the general operation of their data protection and privacy programs through both proactive and reactive measures. Esther has experience in identifying and defining data classification models, drafting corresponding memoranda for companywide use, reviewing clients’ data retention practices, and creating new corresponding policies in accordance with relevant laws and best practices. She has also assisted global clients identify risks relevant to cross-border transfers of personal information and other data. Additionally, Esther is familiar with drafting clients’ internal and external policies, standards, procedures, guidelines and website policies and terms in accordance with the with CCPA, CPRA, GDPR and other relevant state and federal laws. Prior to joining the firm, she served as lead associate for numerous matters involving data breaches and other incident responses. Additionally, she assisted with the defense of privacy class actions on a variety of claims, including breach of contract, breach of warranty, negligence, breach of state privacy laws and the TCPA, FCRA and the Wiretap Act. Esther also served as a judicial law clerk to the Honorable L. Felipe Restrepo on the Third Circuit Court of Appeals.

 

Andrea L. D'Ambra_myLawCLEAndrea L. D’Ambra | Norton Rose Fulbright

Andrea L. D’Ambra is a partner in the New York office and spearheads the firm’s outreach to Technology sector clients in the United States. She is also the U.S. Head of eDiscovery and Information Governance. Andrea focuses her practice on data privacy, e-discovery, cross border discovery, and cybersecurity.

Andrea works with clients to manage information risk, whether it is related to litigation or regulatory inquiries, navigating foreign data privacy laws, assessing the impact of a cybersecurity incident, or managing the day-to-day retention of an organization’s data. Andrea works with numerous technology clients and has deep expertise in addressing the unique issues that arise for tech sector clients. She is also a recognized thought leader on the challenges posed by emerging technologies. During the past five years, she has championed the leveraging of advanced technology to quickly, efficiently, and defensibly respond to Hart-Scott-Rodino (HSR) second requests and other regulatory investigations. Recently, she represented a target corporation in the first European Commission DG Comp investigation where the parties were permitted to use Technology Assisted Review to identify documents relevant to the inquiry.

Andrea counsels’ clients on preservation and data management issues and has drafted information governance and records management policies for several multi-national companies. In addition to counselling, she has assisted clients in navigating foreign data privacy laws while complying with U.S. discovery obligations. She also counsels’ clients on breach preparedness, assessing potential cybersecurity incidents and the regulatory notifications required when an incident rises to the level where it must be reported. Andrea regularly speaks on cybersecurity, data protection and e-discovery issues, and has written on various information risk topics.

Andrea served for over seven years as an officer in the United States Navy. Her diverse Naval experience includes serving as an action officer for high-profile investigations within the Bureau of Naval Personnel and managing the administrative and legal issues of the Navy’s computer network defense command.

Andrea was an adjunct professor of law at Temple and William and Mary Law Schools where she taught classes on Electronic Discovery for over 10 years. Andrea spent three years as a member of the Steering Committee of the Sedona Conference’s Working Group 1 that focuses on Electronic Document Retention and Production. She was recently appointed to the Georgetown Advanced eDiscovery Institute’s advisory board. She is also a member of Sedona Working Group 6 which focuses on Cross Border Discovery and Working Group 11 that considers data privacy and cybersecurity.

Andrea is a Certified Information Privacy Professional for both the European Union (CIPP/E) and the United States (CIPP/US) through the International Association of Privacy Professionals (IAPP).

 

Susana Medeiros_myLawCLESusana Medeiros | Norton Rose Fulbright

Susana Medeiros is an associate and a member of the Information Governance, Privacy, and Cybersecurity team. She is a Chambers ranked attorney recognized as an Associate to Watch for her experience in eDiscovery and Information Governance.

Susana has extensive experience advising on complex eDiscovery issues including defensible collection of electronically stored information and conducting spoliation investigations. She formulates creative strategies for the defensible and efficient preservation, identification, collection, review, and production of electronically stored information in response to requests in civil investigations and litigation. She focuses not only on tactical eDiscovery issues in particular cases but advises clients regarding strategic e-discovery portfolio management, and data governance. Susana has advised clients on how to best manage electronic discovery and preservation, and helped clients develop litigation readiness protocols for use across their matters.

As part of her information governance practice, Susana helps clients mature their information governance program by developing internal information management, preservation, and data classification policies and procedures and record retention schedules. This includes providing advice on data migrations, defensible disposition, mobile device management, ephemeral data, and disaster recovery and business continuity systems.

Susana has represented clients both preparing for and responding to cyber incidents. Leveraging her traditional eDiscovery experience, Susana also assists clients with efficiently and defensibly responding to cyber incidents to quickly identify data subjects impacted and the types of personal information impacted and advise clients about the scope of the incident and the company’s obligations to notify the appropriate authorities, and the people affected by the breach. She also assists with providing advice around CCPA, CPRA, and GDPR compliance from an information governance and data minimization perspective.

Agenda

Session I – Have ESI Protocols Outlived Their Usefulness? How to avoid being cudgeled by your Own protocol | 1:00pm – 2:00pm

  • ESI Protocols are Not Mandatory
  • Why Preservation is a Dangerous Topic and How to Address It
  • The Difference between “Agreeing to Agree” and Providing Notice of Discovery Process
  • TAR Protocols Undermine Their Agility and Power
  • Push Back on Standard Protocols Especially in Larger Complex Matters

Break | 2:00pm – 2:10pm

Session II – The Pitfalls of Over-Preservation: Strategies for defensible deletion | 2:10pm – 3:10pm

  • The Importance of Thorough Data Source Investigation
  • Defensible Deletion Strategies and Automatic Deletion Policies
  • Balancing Data Retention and Deletion

Credits

Alaska

Approved for CLE Credits
2 General

Our programs are CLE-eligible through Alaska's recognition of multi-jurisdictional reciprocity.
Alabama

Pending CLE Approval
2 General

Arkansas

Approved for CLE Credits
2 General

Our programs are CLE-eligible through Arkansas's recognition of multi-jurisdictional reciprocity.
Arizona

Approved for CLE Credits
2 General

California

Approved for CLE Credits
2 General

Colorado

Approved for Self-Study Credits
2 General

Connecticut

Approved for CLE Credits
2 General

District of Columbia

No MCLE Required
2 General hours

Delaware

Pending CLE Approval
2 General

Florida

Approved via Attorney Submission
2.5 General

Receive CLE credit in Florida via attorney submission.
Georgia

Approved for CLE Credits
2 General

Hawaii

Approved for CLE Credits
2 General

Iowa

Pending CLE Approval
2 General

Idaho

Pending CLE Approval
2 General

Illinois

Pending CLE Approval
2 General

Indiana

Pending CLE Approval
2 General

Kansas

Pending CLE Approval
2 General

Kentucky

Pending CLE Approval
2 General

Louisiana

Pending CLE Approval
2 General

Massachusetts

No MCLE Required
2 General hours

Maryland

No MCLE Required
2 General hours

Maine

Pending CLE Approval
2 General

Michigan

No MCLE Required
2 General hours

Minnesota

Approved for Self-Study Credits
2 General

Missouri

Approved for CLE Credits
2.4 General

Mississippi

Pending CLE Approval
2 General

Montana

Pending CLE Approval
2 General

North Carolina

Pending CLE Approval
2 General

North Dakota

Approved for CLE Credits
2 General

Our programs are CLE-eligible through North Dakota’s recognition of multi-jurisdictional reciprocity. Section 1, Policy 1.14
Nebraska

Pending CLE Approval
2 General

myLawCLE reports attendance to Nebraska on each attorney's behalf for all programs. Please do not self-report.
New Hampshire

Approved for CLE Credits
2 General

As of July 1, 2014, the NHMCLE Board no longer provides pre- or post-approval of courses. Attendees must self-determine whether a program is eligible for credit, and self-report their attendance online at www.nhbar.org, based on qualification provisions of Rule 53.
New Jersey

Approved for CLE Credits
2.4 General

Our programs are CLE-eligible through New Jersey's recognition of multi-jurisdictional reciprocity, except for the courses required under BCLE Reg. 201:2
New Mexico

Approved for Self-Study Credits
2 General

Nevada

Pending CLE Approval
2 General

New York

Approved for CLE Credits
2.4 General

Our programs are CLE-eligible through New York’s Approved Jurisdiction Group “A”.
Ohio

Pending CLE Approval
2 General

Oklahoma

Pending CLE Approval
2.5 General

Oregon

Pending CLE Approval
2 General

Pennsylvania

Approved for Self-Study Credits
2 General

Rhode Island

Pending CLE Approval
2.5 General

South Carolina

Pending CLE Approval
2 General

South Dakota

No MCLE Required
2 General hours

Tennessee

Approved for Self-Study Credits
2 General

Texas

Approved for CLE Credits
2 General

Utah

Pending CLE Approval
2 General

Virginia

Not Eligible
2 General hours Hours

Vermont

Approved for CLE Credits
2 General

Washington

Approved via Attorney Submission
2 Law and Legal

Receive CLE credit in Washington via attorney submission.
Wisconsin

Approved for Self-Study Credits
2 General

West Virginia

Pending CLE Approval
2.4 General

Wyoming

Pending CLE Approval
2 General

#1 CLE Access Program

  • Over 1,000 Live CLE Webinars each year
  • All CLE webinars broadcasted in last 12 months
  • Programs covering over 35 practice areas
  • Hot topics & changes in the law
  • All formats: Live, Replay, and On-demand
  • Accreditation in every state

Access every CLE webinar,
every format, all year long!

myLawCLE All-Access Pass

only $395 yearly


Register Now

#1 CLE Access Program

  • Over 1,000 Live CLE Webinars each year
  • All CLE webinars broadcasted in last 12 months
  • Programs covering over 35 practice areas
  • Hot topics & changes in the law
  • All formats: Live, Replay, and On-demand
  • Accreditation in every state

Access every CLE webinar,
every format, all year long!

myLawCLE All-Access Pass

only $395 yearly


More CLE Webinars
Upcoming CLE Webinars
Deposing the Financial Expert (2025 Edition)
Deposing the Financial Expert (2025 Edition) Fri, March 14, 2025
Live Webcast
Microsoft Copilot 365 AI tool for Lawyers (Part 1)
Microsoft Copilot 365 AI tool for Lawyers (Part 1) Fri, March 14, 2025
Live Webcast
Dispositive Motions in Federal Court and Florida State Court
Dispositive Motions in Federal Court and Florida State Court Wed, March 19, 2025
On-Demand
Live Replay
Insurance and Bad Faith Litigation in Fire Loss Cases
Insurance and Bad Faith Litigation in Fire Loss Cases Thu, March 20, 2025
On-Demand
Live Replay
Divorce Law 101 (2025 Edition)
Divorce Law 101 (2025 Edition) Fri, March 21, 2025
Live Webcast
Gun Trust 101 (2025 Edition)
Gun Trust 101 (2025 Edition) Fri, March 21, 2025
On-Demand
Live Replay
Ethical Strategies with Law Firm Podcasts
Ethical Strategies with Law Firm Podcasts Mon, March 24, 2025
Live Webcast
AI-Generated Trade Secret Litigation
AI-Generated Trade Secret Litigation Wed, March 26, 2025
Live Webcast
Litigation CLE Webinars