P2P

Summer25

Peer to Peer: ILTA's Quarterly Magazine

Issue link: https://epubs.iltanet.org/i/1538025

Contents of this Issue

Navigation

Page 96 of 99

P E E R T O P E E R M A G A Z I N E · S U M M E R 2 0 2 5 97 For example, presenting a later version of a document to a witness during a deposition does not accurately reflect what the witness knew at the time of the event. The version shown may include different information or language from what the witness initially viewed as part of the email. Coordinate with your client's IT department. Because this area of technology is continually evolving, it is essential to maintain regular communication with your client's IT department. Even when a system has the technical capability to capture contemporaneous versions of linked documents, that functionality may not be enabled due to concerns about data volume or organizational policy. Not all users within the organization may have the same level of access or functionality. Importantly, once such capture capabilities are activated, they typically apply only to communications made after the activation date. Additionally, the ability to collect contemporaneous versions of linked content may vary depending on the type of communication or file format. To properly advise and negotiate, you must have a clear understanding of both the capabilities and limitations within your client's environment. ESI protocol – definitions matter. While gathering information through custodian and IT interviews to understand your client's systems, it is best practice to avoid stipulating an ESI protocol that requires hyperlinked files to be defined, collected, or produced, as this is similar to traditional attachments. Unlike traditional attachments, hyperlinked files are often not embedded within the original message and may exist independently in cloud-based systems, lacking self-contained metadata. This disconnect can give rise to disputes over scope, production format, and accessibility, especially when links point to content that has been modified, moved, or deleted before legal holds or preservation measures are implemented. A growing body of case law recognizes the significant practical and technological distinctions between traditional email attachments and hyperlinks. (Nichols vs. Noom, 2021 WL 948646, at *4 (S.D.N.Y., Mar. 11, 2021). Notwithstanding this judicial trend, parties who agree to treat hyperlinks as equivalent to attachments within an ESI protocol risk having courts enforce the protocol as written. Such deference can lead to unintended discovery obligations, delays, and increased costs for clients. The courts assume you are best positioned to agree to the terms of an ESI protocol based on your knowledge of your client's data systems and abilities and will therefore tend to defer to the agreement, at least initially, as a matter of course. For example, in In re Stubhub, in considering a Defendant's Motion to Modify the ESI protocol and Plaintiff's Motion for Sanctions for violating the same ESI protocol, the court noted "the harm that StubHub's wrongful conduct caused was a big, expensive fight that lasted more than a year concerning the hyperlink issue. But this harm wasn't caused by the violation of the ESI Order; it was caused by StubHub's foolish decision to stipulate to the hyperlink requirement in the first place." (In re Stubhub, 2024 WL 2305604, at *4 (N.D. Cal, May 20, 2024)) Leverage knowledge to meet and confer. ESI protocols should reflect a willingness to negotiate a reasonable scope and format for the preservation, collection, and production of hyperlinked files. Emerging technologies that create a greater burden to meet discovery obligations and respond to production requests in a defensible manner will lead the parties to examine the level of burden. Hence, preparation

Articles in this issue

Links on this page

Archives of this issue

view archives of P2P - Summer25