P2P

Summer25

Peer to Peer: ILTA's Quarterly Magazine

Issue link: https://epubs.iltanet.org/i/1538025

Contents of this Issue

Navigation

Page 95 of 99

96 interviews, and ascertaining a comprehensive understanding of the client's systems, equips legal teams to identify hyperlink issues early, reduce downstream disputes, and align discovery efforts with both legal obligations and practical limitations. The ESI protocol is a tool to establish clear and mutually agreeable standards for the identification, collection, preservation, review, and production of documents. As data has evolved, so has the approach to negotiating ESI protocols. Start with technical competence. The complexity of modern data requires attorneys to possess, or collaborate with counsel who possesses, an understanding of potential risks and proven strategies to navigate discovery requests for their clients effectively. (Model R. Prof Conduct 1.1, Comment 8 (www.americanbar.org)) Lawyers with technical literacy in complex or ephemeral forms of data, including collaborative platform content, hyperlinks, cloud storage systems, and metadata, are better prepared to identify and address potential risks to their clients in the negotiation of ESI protocols and the development of preservation strategies. Lawyers who collaborate with custodians and IT professionals to ask critical questions during early case assessment are then best positioned to explain the burdens associated with the identification, review, and production of hyperlinked files based on their clients' systems and scope of use. They are also more persuasive in meet- and-confer negotiations and arguing for proportionality before the court. Custodial interviews Before an ESI protocol is negotiated, or even considered, custodial interviews should be conducted. Custodial interviews help you to understand the client's systems and how those systems are being utilized. One best practice is to include questions related to the use of hyperlinks in custodial interviews and coordinate with the client's IT department to understand the licensing structure applicable to the custodians, thereby understanding potential impacts on collections. Understanding the current state of your client's technical capabilities related to linked content is critical to assessing your position when negotiating the ESI protocol. In some cases, certain types of linked data may only be retrievable under specific system configurations or access levels. If these conditions are not met, it is essential to communicate any limitations to the requesting party clearly. Further, different systems have varying capabilities for collecting contemporaneous versions of hyperlinked documents. Often, only the current version of a hyperlinked document is available for collection. The limitation of collecting only the current version of a document hyperlinked to an email can create problems. Understanding the current state of your client's technical capabilities related to linked content is critical to assessing your position when negotiating the ESI protocol.

Articles in this issue

Links on this page

Archives of this issue

view archives of P2P - Summer25