www.logikcull.com Open in urlscan Pro
52.212.43.230  Public Scan

Submitted URL: http://logikcull.com/guide/legal-hold
Effective URL: https://www.logikcull.com/guide/legal-hold
Submission: On December 14 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: email-form-2POST https://go.logikcull.com/l/689843/2021-07-16/69v2c

<form id="email-form-2" name="email-form-2" data-name="Email Form 2" action="https://go.logikcull.com/l/689843/2021-07-16/69v2c" method="post" aria-label="Email Form 2"><label for="First_Name-4" class="field-label">First Name*</label><input
    type="text" class="text-field w-input" maxlength="256" name="First_Name" data-name="First_Name" placeholder="Your first name" id="First_Name-4" required=""><label for="Last_Name-4" class="field-label">Last Name*</label><input type="text"
    class="text-field w-input" maxlength="256" name="Last_Name" data-name="Last_Name" placeholder="Your last name" id="Last_Name-4" required=""><label for="Email-3" class="field-label">Email*</label><input type="email" class="text-field w-input"
    maxlength="256" name="Email" data-name="Email" placeholder="Enter your work email" id="Email-3" required=""><input type="submit" value="Get the Guide" data-wait="Please wait..." class="button submit w-button"></form>

Name: wf-form-2021-Redesign---Website---Demo-single-fieldGET

<form id="wf-form-2021-Redesign---Website---Demo-single-field" name="wf-form-2021-Redesign---Website---Demo-single-field" data-name="2021 Redesign - Website - Demo single field" method="get" redirect="/demo" data-redirect="/demo"
  class="home-form-email" aria-label="2021 Redesign - Website - Demo single field"><input type="email" class="text-field _70 w-input" data-input="email" maxlength="256" name="Email" data-name="Email" placeholder="Enter work email" id="Email"
    required=""><input type="submit" value="See how it works" data-wait="Please wait..." class="button home-form-btn w-button"></form>

Text Content

THIS WEBSITE USES COOKIES

Click 'show details' for more information.
[#OOI_PERSONAL_INFORMATION#]
Use necessary cookies only Allow all cookies Show details
OK
Use necessary cookies onlyAllow selectionAllow all cookies
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (10)  Preferences (10)  Statistics (16)  Marketing (69)  Unclassified
(23)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryType__cf_bm [x2]www.g2.com
CrowdThis cookie is used to distinguish between humans and bots. This is
beneficial for the website, in order to make valid reports on the use of their
website.1 dayHTTP__sharethis_cookie_test__SharethisThis cookie determines
whether the browser accepts cookies.SessionHTTP_ce.cchCrazyeggStores the user's
cookie consent state for the current
domainSessionHTTPCookieConsentCookiebotStores the user's cookie consent state
for the current domain1 yearHTTPcookies.js_dtestNBC NewsThis cookie determines
whether the browser accepts
cookies.SessionHTTPcom.adobe.reactor.dataElementCookiesMigratedNBC NewsUsed in
context with the cache-function on the website, facilitating data transfer
between Adobe DTM onto Adobe Launch. PersistentHTMLlanguageLinkedInSaves the
user's preferred language on the
website.SessionHTTPvisitorIdws.zoominfo.comPreserves users states across page
requests.1 yearHTTPCONSENTYouTubeUsed to detect if the visitor has accepted the
marketing category in the cookie banner. This cookie is necessary for
GDPR-compliance of the website. 2 yearsHTTP

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

NameProviderPurposeExpiryTypelang [x2]LinkedInRemembers the user's selected
language version of a websiteSessionHTTPloglevelWistiaMaintains settings and
outputs when using the Developer Tools Console on current
session.PersistentHTMLDRIFT_openTabsDriftUsed to make the chat function
consistent across tabs, if the user has multiple browser tabs open for the same
website. PersistentHTMLDRIFT_SESSION_IDDriftAllows the website to recoqnise the
visitor, in order to optimize the chat-box functionality.
SessionHTMLDRIFT_SESSION_STARTEDDriftStores a unique ID string for each chat-box
session. This allows the website-support to see previous issues and reconnect
with the previous supporter. SessionHTMLDRIFT_visitCountsDriftDetermines the
number of visits of the specific visitor. This is used in order to make the
chat-box function more relevant.PersistentHTMLdriftt_aidDriftNecessary for the
functionality of the website's chat-box function. 2 yearsHTTPgeoEditionNBC
UniversalThis cookie is used to determine what country the visitor comes from -
This allows the website to set the language accordingly, if possible. The
information can be determined through the visitor’s IP-address. 1
dayHTTPnext-i18nextNBC NewsNecessary for maintaining language-settings across
subpages on the website.1 yearHTTP

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypeundefinedEmbedlyCollects data on visitor
interaction with the website's video-content - This data is used to make the
website's video-content more relevant towards the visitor.
PersistentHTML_gaGoogleRegisters a unique ID that is used to generate
statistical data on how the visitor uses the website.2 yearsHTTP_ga_#Google Tag
ManagerUsed by Google Analytics to collect data on the number of times a user
has visited the website as well as dates for the first and most recent visit. 2
yearsHTTPwistiaEmbedlyUsed by the website to track the visitor's use of
video-content - The cookie roots from Wistia, which provides video-software to
websites.PersistentHTMLcollectGoogleUsed to send data to Google Analytics about
the visitor's device and behaviour. Tracks the visitor across devices and
marketing channels.SessionPixelAnalyticsSyncHistoryLinkedInUsed in connection
with data-synchronization with third-party analysis service. 29
daysHTTP_ce.swww.logikcull.comCollects data on the user’s navigation and
behavior on the website. This is used to compile statistical reports and
heatmaps for the website owner.1 yearHTTP_dc_gtm_UA-#GoogleUsed by Google Tag
Manager to control the loading of a Google Analytics script tag.1
dayHTTP_gatGoogleUsed by Google Analytics to throttle request rate1
dayHTTP_gidGoogleRegisters a unique ID that is used to generate statistical data
on how the visitor uses the website.1 dayHTTP_parsely_sessionNBC NewsThis cookie
is used to collect data on visitor behavior on the website.1
dayHTTPajs_anonymous_idSegmentThis cookie is used to count how many times a
website has been visited by different visitors - this is done by assigning the
visitor an ID, so the visitor does not get registered twice.1
yearHTMLce_clockwww.logikcull.comSets a timestamp for when the visitor entered
the website. This is used for analytical purposes on the website.
PersistentHTMLIXWRAPPERLiveRampIpNBC NewsCollects anonymous data on the user's
visits to the website, such as the number of visits, average time spent on the
website and what pages have been loaded with the purpose of generating reports
for optimising the website content.PersistentHTMLIXWRAPPERMerkleIpNBC
NewsCollects anonymous data on the user's visits to the website, such as the
number of visits, average time spent on the website and what pages have been
loaded with the purpose of generating reports for optimising the website
content.PersistentHTMLslideshare.experimentsLinkedInUsed by SlideShare to
determine if the visitor is participating in a design experiment.PersistentHTML

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

NameProviderPurposeExpiryTypeTDIDThe Trade DeskRegisters a unique ID that
identifies a returning user's device. The ID is used for targeted ads.1
yearHTTPMUIDMicrosoftUsed widely by Microsoft as a unique user ID. The cookie
enables user tracking by synchronising the ID across many Microsoft domains.1
yearHTTPuidCriteoCollects visitor data related to the user's visits to the
website, such as the number of visits, average time spent on the website and
what pages have been loaded, with the purpose of displaying targeted ads.1
yearHTTPpunchv-e-fGoogleUsed to implement the content through Google Docs.
PersistentHTMLpunchv-e-nGoogleUsed to implement the content through Google Docs.
PersistentHTMLpunchv-e-vGoogleUsed to implement the content through Google Docs.
PersistentHTMLIDEGoogleUsed by Google DoubleClick to register and report the
website user's actions after viewing or clicking one of the advertiser's ads
with the purpose of measuring the efficacy of an ad and to present targeted ads
to the user.1 yearHTTPpagead/landing [x2]GoogleCollects data on visitor
behaviour from multiple websites, in order to present more relevant
advertisement - This also allows the website to limit the number of times that
they are shown the same advertisement. SessionPixeltest_cookieGoogleUsed to
check if the user's browser supports cookies.1 dayHTTPfrFacebookUsed by Facebook
to deliver a series of advertisement products such as real time bidding from
third party advertisers.3 monthsHTTPtrFacebookUsed by Facebook to deliver a
series of advertisement products such as real time bidding from third party
advertisers.SessionPixelvisitor_id# [x3]SalesforceUsed in context with
Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses,
time spent on the website and page requests for the visit. This is used for
retargeting of multiple users rooting from the same IP-addresses. ABM usually
facilitates B2B marketing purposes.10
yearsHTTPvisitor_id#-hash [x3]SalesforceUsed to encrypt and contain visitor
data. This is necessary for the security of the user data. 10
yearsHTTPads/ga-audiencesGoogleUsed by Google AdWords to re-engage visitors that
are likely to convert to customers based on the visitor's online behaviour
across websites.SessionPixelNIDGoogleRegisters a unique ID that identifies a
returning user's device. The ID is used for targeted ads.6
monthsHTTPpagead/1p-user-list/#GoogleTracks if the user has shown interest in
specific products or events across multiple websites and detects how the user
navigates between sites. This is used for measurement of advertisement efforts
and facilitates payment of referral-fees between websites.SessionPixelIMRIDThe
Nielsen CompanyRegisters anonymised user data, such as IP address, geographical
location, visited websites, and what ads the user has clicked, with the purpose
of optimising ad display based on the user's movement on websites that use the
same ad network.1 yearHTTPSSCVERThe Nielsen CompanyRegisters anonymised user
data, such as IP address, geographical location, visited websites, and what ads
the user has clicked, with the purpose of optimising ad display based on the
user's movement on websites that use the same ad network.1
yearHTTPbcookieLinkedInUsed by the social networking service, LinkedIn, for
tracking the use of embedded services.2 yearsHTTPbscookieLinkedInUsed by the
social networking service, LinkedIn, for tracking the use of embedded services.2
yearsHTTPlidcLinkedInUsed by the social networking service, LinkedIn, for
tracking the use of embedded services.1 dayHTTPUserMatchHistoryLinkedInUsed to
track visitors on multiple websites, in order to present relevant advertisement
based on the visitor's preferences. 29 daysHTTP__tld__SegmentUsed to track
visitors on multiple websites, in order to present relevant advertisement based
on the visitor's preferences. SessionHTTP_fbpFacebookUsed by Facebook to deliver
a series of advertisement products such as real time bidding from third party
advertisers.3 monthsHTTP_gcl_auGoogle Tag ManagerUsed by Google AdSense for
experimenting with advertisement efficiency across websites using their
services. 3 monthsHTTP_lfasc.lfeeder.comUsed in context with
Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses,
time spent on the website and page requests for the visit. This is used for
retargeting of multiple users rooting from the same IP-addresses. ABM usually
facilitates B2B marketing purposes.2 yearsHTML_lfa_expirysc.lfeeder.comContains
the expiry-date for the cookie with corresponding name.
PersistentHTML_lfa_test_cookie_storedsc.lfeeder.comUsed in context with
Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses,
time spent on the website and page requests for the visit. This is used for
retargeting of multiple users rooting from the same IP-addresses. ABM usually
facilitates B2B marketing purposes.1 dayHTTP_uetsidMicrosoftCollects data on
visitor behaviour from multiple websites, in order to present more relevant
advertisement - This also allows the website to limit the number of times that
they are shown the same advertisement. 1 dayHTML_uetsid_expMicrosoftContains the
expiry-date for the cookie with corresponding name.
PersistentHTML_uetvidMicrosoftUsed to track visitors on multiple websites, in
order to present relevant advertisement based on the visitor's preferences. 1
yearHTML_uetvid_expMicrosoftContains the expiry-date for the cookie with
corresponding name. PersistentHTMLajs_user_idSegmentCollects data on visitors'
preferences and behaviour on the website - This information is used make content
and advertisement more relevant to the specific visitor.
PersistentHTMLcto_bundleNBC NewsPresents the user with relevant content and
advertisement. The service is provided by third-party advertisement hubs, which
facilitate real-time bidding for advertisers.1 yearHTMLcto_pub_test_tldNBC
NewsUsed to track visitors on multiple websites, in order to present relevant
advertisement based on the visitor's preferences. 1 dayHTTPcto_writeableNBC
NewsThis cookie is set by the audience manager of a website in order to
determine if any additional third-party cookies can be set in the visitor’s
browser – third-party cookies are used to gather information or track visitor
behavior on multiple websites. Third-party cookies are set by a third-party
website or company.1 dayHTTPdrift_aidDriftSets a unique ID for the specific
user. This allows the website to target the user with relevant offers through
its chat functionality. 2 yearsHTTPdrift_campaign_refreshDriftSets a unique ID
for the specific user. This allows the website to target the user with relevant
offers through its chat functionality. 1 dayHTTPDRIFT_SESSION_CAMPAIGNSDriftUsed
to determine when and where certain pop-ups on the website should be presented
for the user and remember whether the user has closed these, to keep them from
showing multiple times.PersistentHTMLadEditionNBC UniversalTargets ads based on
behavioural profiling and geographical location.1
dayHTTPIXWRAPPERAdserverOrgIpNBC NewsThis cookie is set by the audience manager
of the website to determine the time and frequencies of visitor data
synchronization - cookie data synchronization is used to synchronize and gather
visitor data from several websites.PersistentHTMLlpv#SalesforceUsed in context
with behavioral tracking by the website. The cookie registers the user’s
behavior and navigation across multiple websites and ensures that no tracking
errors occur when the user has multiple browser-tabs open. 1
dayHTTPcgi-bin/gnThe Nielsen CompanyRegisters user data, such as IP address,
geographical location, visited websites, and what ads the user has clicked, with
the purpose of optimising ad display based on the user's movement on websites
that use the same ad
network.SessionPixelWIDGET::local::assignmentsSoundcloudUsed by audio-platform
SoundCloud to implement, measure and improve their embedded content/service on
the website - The collection of data also includes visitors’ interaction with
embedded content/service. This can be used for statistics or marketing purposes.
PersistentHTMLhttps://tr.lfeeder.com/LeadfeederTracks the individual sessions on
the website, allowing the website to compile statistical data from multiple
visits. This data can also be used to create leads for marketing
purposes.SessionPixelVISITOR_INFO1_LIVEYouTubeTries to estimate the users'
bandwidth on pages with integrated YouTube videos.179
daysHTTPYSCYouTubeRegisters a unique ID to keep statistics of what videos from
YouTube the user has seen.SessionHTTPyt.innertube::nextIdYouTubeRegisters a
unique ID to keep statistics of what videos from YouTube the user has
seen.PersistentHTMLyt.innertube::requestsYouTubeRegisters a unique ID to keep
statistics of what videos from YouTube the user has
seen.PersistentHTMLytidb::LAST_RESULT_ENTRY_KEYYouTubeStores the user's video
player preferences using embedded YouTube
videoPersistentHTMLyt-remote-cast-availableYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-cast-installedYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-connected-devicesYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-device-idYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-fast-check-periodYouTubeStores the user's video
player preferences using embedded YouTube
videoSessionHTMLyt-remote-session-appYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-session-nameYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTML_ce.gtldCrazyeggPendingSessionHTTP_mutiny_impressionsclient-registry.mutinycdn.comPendingPersistentHTMLce_successful_csp_checkwww.logikcull.comPendingPersistentHTMLmutiny.user.sessionclient-registry.mutinycdn.comPending1
dayHTTPmutiny.user.session_numberclient-registry.mutinycdn.comPending1
dayHTTPmutiny.user.tokenclient-registry.mutinycdn.comPending3
yearsHTMLquery.client-registry.mutinycdn.comPendingSessionHTML

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

NameProviderPurposeExpiryTypewistia-video-progress-#WistiaPendingPersistentHTML_g2_session_idwww.g2.comPendingSessionHTTPevents_distinct_idwww.g2.comPendingSessionHTTPDRIFT_ALWAYS_SEND_IDSDriftPendingSessionHTMLquery.__hsfpclient-registry.mutinycdn.comPendingSessionHTMLquery.__hsscclient-registry.mutinycdn.comPendingSessionHTMLquery.__hstcclient-registry.mutinycdn.comPendingSessionHTMLquery.1fd188c7_pageclient-registry.mutinycdn.comPendingSessionHTMLquery.39c9136d_pageclient-registry.mutinycdn.comPendingSessionHTMLquery.3c522a76_pageclient-registry.mutinycdn.comPendingSessionHTMLquery.5540add2_pageclient-registry.mutinycdn.comPendingSessionHTMLquery.71816636_pagewww.logikcull.comPendingSessionHTMLquery.dvd2client-registry.mutinycdn.comPendingSessionHTMLquery.f91aa943_pageclient-registry.mutinycdn.comPendingSessionHTMLquery.sclient-registry.mutinycdn.comPendingSessionHTMLquery.utm_mediumclient-registry.mutinycdn.comPendingSessionHTMLquery.utm_sourceclient-registry.mutinycdn.comPendingSessionHTMLadops_master_kvsNBC
NewsPendingPersistentHTMLakaas_NBCNewsNBC NewsPending9 daysHTTPBIConsole.$tNBC
NewsPendingPersistentHTMLcp-sessNBC
NewsPendingPersistentHTMLnbcnews_geolocationNBC
NewsPendingSessionHTTPshouldIterateLoadNBC NewsPendingPersistentHTML

 [#IABV2_LABEL_PURPOSES#]  [#IABV2_LABEL_FEATURES#]  [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]

Logikcull.com, like many other sites, uses small files called cookies to help
customize your experience, assist with navigation, analyze your use of our
products and services, assist with our promotional marketing efforts and provide
content to third parties. Most visitors have a better experience with cookies
enabled, but you can opt out at any time during your visit to Logikcull.com by
editing your cookies settings in your browser.



Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.
Cookie declaration last updated on 10.12.21 by Cookiebot


GET "THE ULTIMATE GUIDE TO EDISCOVERY"

First Name*Last Name*Email*
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Your privacy matters to us. See our privacy policy here.

Products

Products

Logikcull Discovery

Axe high-cost vendors & noisy data with powerfully simple end-to-end automation.


Logikcull Hold

Burn your spreadsheets! Use Hold to automatically send and track legal hold
notices.

Use Cases
Investigations

The clock is ticking. Cull the noisy data to surface 🚬🔫s.

Litigation

Make your outside firms & vendors come to you.

Early Case
Assessment

Instantly answer the five W's with Culling Intelligence® .

Subpoena Response

Whether high-volume or one-off, find responsive docs fast with minimal business
impact.

FOIA & Open Records

Never miss a response deadline again. Trusted by NYC & CHI.

Legal Holds

Doing holds with email & Excel? There's a better way.

Logikcull for...
In-House Legal & IT

Need an easy win? This is it. Your CFO is already smiling.

Government

Mow through FOIA backlogs and litigation logjams. Your taxpayers will love you.

Law Firms

Why pay a vendor when you can capture more hours AND pass on lower client
costs? 

Resources

Resources
Case Studies

Learn how your peers are getting big wins with Logikcull.

Whitepapers

Best practices and discovery how-tos at your fingertips.

Guides

Step-by-step guidance on how to tackle discovery challenges.

Industry Reports

Original research on trends you need to know.

Webinars

Experts share practical learnings to help you do your job better.

Blog

News, guidance & interviews to keep you in the know.

View all resources
Featured Blog articles
September 30, 2021
5 Reasons Why You Can’t Miss InHouse 21

As we start warming the engines for this two-day event that will take place
virtually on November 4-5, it’s a good time to take a quick glimpse at what
InHouse 21 has to offer.

September 16, 2021
How eDiscovery Uncovered the Theranos Smoking Gun

The story of Theranos is so wild it even makes eDiscovery interesting. See how a
late night doc review turned up the smoking-gun email that will be central to
the prosecution of Theranos CEO Elizabeth Holmes.

Pricing

Pricing
Discovery Pricing

Yes! We publish our pricing, because discovery should be transparent.

Legal Hold Pricing

Our basic plan is zero dollars — because legal hold should be free.

See pricing
1-844-363-3347
Login
Create Free Account


Create free account
Products
Discovery
Holds
Use Cases
Investigations
Subpoena response
Early case assessment
Litigation
Legal holds
FOIA & open records
Resources
Case studies
Whitepapers
Guides
Industry reports
Webinars
Blog
Pricing
eDiscovery pricing
Legal hold pricing

1-844-363-3347
Login
Create free account



THE ULTIMATE GUIDE TO EDISCOVERY

Everything you wanted to know about eDiscovery, but were afraid to ask


HomeChapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8
Chapter 2


LEGAL HOLDS

Preserving Data Defensibly

Legal holds or litigation holds are a key part of eDiscovery as they involve the
entire organization and happen far more frequently than other steps of the
eDiscovery process, like data collection or review. Therefore, legal
professionals need to have a good understanding of the technological and legal
requirements that must be navigated to meet their preservation obligations.


Litigation Hold Basics

Legal Hold Process Step-By-Step
How to Issue a Legal Hold
Legal Hold Release Notice
Legal Hold Compliance
Documenting Your Hold Process
Legal Hold Software


Download Now


LITIGATION HOLD BASICS

‍


WHAT IS A LEGAL HOLD?

A legal hold, also known as a litigation hold, is the process by which
organizations preserve potentially relevant information when litigation is
pending or reasonably anticipated. By issuing a legal hold, organizations notify
custodians about their duty not to delete ESI or physical documents relevant to
a case. 


Since under FRCP Rule 37(e) (the section that governs the spoliation of
electronic evidence) organizations have a duty to "undertake reasonable actions"
to preserve information that is relevant to the case when they anticipate
litigation or another type of formal dispute, they need to be able to prove that
they have taken "reasonable and good-faith efforts" to ensure that data is not
deleted after the triggering event occurs. A triggering event is the event or
occurrence that precipitates the party to begin preserving information (for
example, when expecting another organization or an employee to initiate
litigation.)


Therefore, having a legal hold process in place and using a legal hold-specific
tool is crucial to show defensible and good faith efforts to preserve evidence. 

Although it's common to think about legal holds as the notification that is sent
to custodians in order to preserve information, the legal hold process actually
consists of multiple steps:

IDENTIFICATION OF INFORMATION TO BE PRESERVED:

This is usually the first step in creating a legal hold. The legal team must
determine which information could be potentially relevant to a matter. Nowadays,
it’s common for this data to be electronically stored information (or “ESI”),
but it might also include physical documents, like logbooks and paper files. 

IDENTIFICATION OF CUSTODIANS:

A custodian is the person who personally possesses and is in charge of the
information that needs to be preserved. Before issuing the hold, legal teams
usually work with the IT department to identify all custodians relevant to the
case. Custodians can also be “silent custodians”, that is, people in the
organization whose data is preserved without getting a notification about it.
This type of custodians is frequent in internal investigations, for example.

ISSUANCE OF A LEGAL HOLD NOTICE:

The legal hold notice is the communication sent to all custodians letting them
know that they’re on hold and specifying which information needs to be
preserved. This is a key part of the legal hold process that we’ll cover in more
detail later.

REMINDER NOTICES:

Reminders should be sent to ensure custodians remember they’re still under a
legal hold. Oftentimes, reminders are also needed to make sure custodians
acknowledge their legal hold obligations.

RELEASE OF THE LEGAL HOLD:

Once the legal matter ends, you need to let custodians know that their duty to
preserve has ended. Having a sound release process is important so that no
custodians are released from their obligations when they shouldn’t, and no
custodians stay on hold forever.

‍

Below, we will dive more deeply into all the important aspects about legal holds
and best practices in managing them.


LOGIKCULL + MS365

Logikcull integrates seamlessly with Office 365 for incredibly fast, always
reliable cloud-to-cloud eDiscovery.

Book demo



MAKE LEGAL HOLDS FAST, EFFECTIVE AND FREE

Burn your spreadsheets with Logikcull
Get Logikcull Hold Demo
or
Try for Free


CORPORATE LEGAL HOLD POLICY

In order to minimize the risk of spoliation sanctions, it’s good practice for
organizations to have a corporate legal hold policy, where the goals, different
steps, and any other aspects of the legal hold process are clearly laid out. 

The main goal of the legal hold policy is to ensure a consistent and defensible
approach to the preservation obligation. And while this obligation might be well
known by legal teams and high-level management, it’s usually not familiar to
most employees, including potential custodians of relevant ESI. Therefore,
another goal of a litigation hold policy is to help employees understand the
duty to preserve information and the potential consequences for the entire
organization for failing to comply with this obligation. 


A legal hold policy usually covers:


 * The preservation duty
 * The definition and scope of triggering events
 * The notification system of potential trigger events
 * The different types of ESI and their locations
 * The main agents involved in the legal hold process
 * The steps to take when creating and issuing a legal hold

For reference, here’s an example of a legal hold policy from the American Board
of Pediatrics.

There is no “one size fits all” solution when it comes to corporate legal hold
policies. Each organization needs to find the set of procedures that work best
for their specific characteristics like industry, data architecture, retention
policies, organizational hierarchy, etc. 


However, when developed and implemented the right way, a legal hold policy can
significantly improve the organization’s ability to respond and react to its
preservation obligations. The key is to keep everyone informed of their role
within the organization’s compliance obligations to minimize the risks
associated with litigation.

‍

In this insightful webinar,  Lindsay Kolar, Corporate Paralegal at Gordon Food
Service, goes over the 6 most common challenges legal holds present, and how to
meet them successfully with the right processes and tools.




‍


THE LEGAL DUTY TO PRESERVE POTENTIAL EVIDENCE

Legal holds arise from a common-law duty to avoid the spoliation of evidence.
That duty stretches back to 1722 and the case of Armory v. Delamirie, a dispute
between a young chimney sweep and a goldsmith over a found jewel. Since then,
the requirements to avoid spoliation have slowly evolved over hundreds of years
of case law, which eventually resulted in today’s legal hold requirements.

Although there is no federal rule requiring the implementation of legal holds,
and the concept is a fairly recent development, the practical requirements of
data preservation have been well fleshed out in case law over the past decade,
following Judge Shira Scheindlin’s historic rulings in Zubulake v. UBS Warburg,
a case that is regarded as marking the beginning of modern eDiscovery.

In Zubulake, Judge Scheindlin made it clear that parties have an obligation to
conduct legal preservation of relevant information as soon as litigation is
imminent. However, the process of arriving at that determination—gauging when
litigation is “imminent” or "reasonably anticipated" and deciding what qualifies
as “potentially relevant information”—can be more complex than it seems…

‍


LOGIKCULL + MS365

Logikcull integrates seamlessly with Office 365 for incredibly fast, always
reliable cloud-to-cloud eDiscovery.

Book demo


WHEN IS THE DUTY TO PRESERVE TRIGGERED?

The most critical step in the legal hold process is determining when the duty to
preserve information begins. As established by Zubulake and many other cases, a
legal hold is triggered when litigation is “reasonably anticipated.” But what
does “reasonably anticipated” actually mean?


Unfortunately, there is no perfect standard for interpreting the phrase. It’s as
ambiguous as it sounds. When evidence is lost or the scope of preservation is
otherwise questioned, courts tend to weigh other factors, such as whether
parties acted with good faith and performed a reasonable evaluation of relevant
facts at the time of preservation, to determine whether sanctions are
appropriate.

Therefore, it’s important to develop a sound process to identify preservation
triggers and issue legal holds accordingly, rather than just wait for litigation
to happen, which is a risky practice still followed by many organizations.

‍

FACTORS INFLUENCING WHEN LITIGATION IS REASONABLY ANTICIPATED:

 * Explicit communication
 * Receipt of summons or complaint
 * Subpoenas
 * Cease-and-desist letters
 * Local regulations
 * Specific events, like a major defect in a company’s product
 * Preservation orders
 * Credible threats of litigation

On the plaintiff’s side, intentional acts such as sending a cease-and-desist
letter are enough to trigger preservation obligations. But the duty may arise
earlier than that. In some cases, courts have held that a plaintiff is under a
duty to preserve either as soon as they determine that legal action is
appropriate or when they decide to bring an action.

The trigger for defendants can seem nebulous at times. Receipt of written notice
from the other party would definitely trigger a duty to preserve, but courts
disagree on how certain the recipient must be that litigation will actually
occur. Generally speaking, the duty to preserve does not require that the threat
of litigation be “unequivocal.” A letter threatening litigation could be
sufficient to prompt preservation procedures, for example.

In the most clear-cut cases, the duty to preserve is triggered by explicit
communication of impending litigation, such as service of process, subpoena, or
written or verbal notice. Receipt of notice by an employee or another agent
generally triggers preservation for companies. 

Additionally, preservation obligations can be triggered by other circumstances,
such as local regulations or a preservation order already entered in another
case.

However, the threat of litigation must be at least somewhat credible to trigger
a duty to preserve. Aimless grumbling shouldn’t bring companies to a grinding
halt. As one court explains, “it is not reasonably foreseeable [sic] that every
internal employment complaint may result in litigation if not resolved to the
employee’s satisfaction.” Courts have long held that, if the notice is merely an
“equivocal statement of discontent,” then litigation may not qualify as
“reasonably anticipated,” and deletion procedures can continue. (Cache La Poudre
Feeds, LLC v. Land O' Lakes, Inc., 2007 WL 684001 (D. Colo. Mar. 2, 2007))

That being said, companies cannot simply ignore vague threats to avoid
preservation. If the threat level of litigation is unclear, organizations have
an obligation to investigate the situation before purging their files.

Determining exactly when the duty to preserve kicks in can get complicated. But
recent amendments to FRCP Rule (37)(e), have brought a new level of
predictability to the process—and bestowed renewed power on defensible
procedures, such as properly administered legal hold notices. In fact, 2015
amendments to the Federal Rules of Civil Procedure have led to a reduction of
35% in spoliation sanctions.


LOGIKCULL + MS365

Logikcull integrates seamlessly with Office 365 for incredibly fast, always
reliable cloud-to-cloud eDiscovery.

Book demo


LEGAL HOLD PROCESS STEP-BY-STEP


GETTING STARTED ON YOUR LEGAL HOLD

Once you have identified an event that triggers a duty to preserve potentially
relevant ESI, you need to make sure you issue a legal hold as soon as possible.
But before you can even draft and circulate a legal hold notice, there are a few
things you need to determine:


 * What information needs to be preserved
 * Where does this information live
 * Who are the relevant custodians
 * How to determine the scope of the information that needs to be preserved so
   that it’s not too burdensome for custodians
   

When ESI is involved (that is, in 99% of cases nowadays), your IT or legal
operations teams are great allies in helping you locate information sources and
custodians. Having a robust information governance program in place is also key
in easily identifying the location of potentially relevant ESI and who is
ultimately responsible for its preservation. 


In terms of deciding the scope of the information that needs to be preserved,
keep in mind these factors:

 * The nature of the issues raised in the matter
 * The accessibility of the information
 * The probative value of the information
 * The relative burdens and costs of the preservation effort

To better understand all the steps and lifecycle of a legal hold, see the
diagram below (click on the image to expand it):



WHERE WILL YOU FIND POTENTIALLY RELEVANT INFORMATION?

When you’re under a duty to preserve, you need to act diligently and in good
faith to make sure no potentially relevant information is destroyed. This
information can come in different forms—from electronic data, to physical
documents and tangible things—and be stored in multiple locations, such as
email, desktop drives, portable devices, shared drives, tablets, smartphones,
and document management systems, and also dusty drawers and archived folders. 

Nowadays, most of the potentially responsive information is electronically
stored information or ESI. The most common way to locate potentially responsive
ESI is through custodians, the individuals who personally possess the
information. Examples of custodian data sources are: email, personal storage on
hardware devices or cloud accounts, allocated storage, data storage, data
associated with social networking sites used by the custodian, tablets,
smartphones, or even private web-based email accounts.

However, non-custodian ESI is a critical type of ESI, as well. Examples of
non-custodian data sources include: databases, cloud storage databases hosted by
third parties, and shared network storage locations.

These are some of the most common types of ESI and their usual locations:


 * Emails
   

Users of corporate computers usually have emails stored on one or more email
servers. These servers may be physical hardware managed by IT staff, but more
often than not they live on virtual servers leased from a cloud provider, like
Microsoft Exchange. A third potential source is a Software as a Service (SaaS)
offering from a cloud provider, which are ubiquitous. Webmail may be as simple
as a single user’s Gmail account or, like the Microsoft 365 product, a complete
replication of an enterprise email environment. On desktops and laptops, email
is found locally (on the user’s hard drive) in container files with the file
extensions .pst and .ost for Microsoft Outlook users or .nsf for Lotus Notes
users, for example. Each user may be expected to have a substantial volume of
archived email spread across several on- and offline sources.


 * Chats and instant messages
   

Chat data from applications like Slack, Google Chat or Microsoft Teams has
turned into a highly relevant source of ESI, especially as more teams turn to
remote work, where once in-person conversations now take place over
collaboration apps. These tools usually come with preservation and exporting
features, so the biggest challenge with this type of ESI usually lies in the
review process. 


 * Word-processed documents, spreadsheets, and presentations
   

Custodians generate a lot of content in the form of productivity documents like
Microsoft Word documents, Excel spreadsheets, PowerPoint presentations, and the
like. These may be stored locally, i.e., in a folder on the C: or D: drive of
the user’s computer or in an area reserved to them on a network file server and
mapped to a drive letter on the user's local machine. The user sees a lettered
drive indistinguishable from a local drive, but on the latter, all data resides
on a server, where it can be regularly backed up. This is called the user's
network share or file share.

‍However, thanks to cloud services like Google Workspace or Microsoft 365,
productivity documents can also be created and stored online, where they’re
usually accessible through the built-in preservation tools of these services
like Google Vault. 


 * Social media content
   

Data generated in social networking sites like Facebook, Twitter, Instagram has
turned into a critical source of potentially relevant ESI. With more than 1.28
billion people logging into Facebook alone every day, the amount of data
produced in the more than 150 social networking sites available is almost
unmeasurable. For cases in areas such as insurance fraud, IP infringement, and
even terrorism, social media evidence is playing a critical role today, so
lawyers need to become familiar with best practices to preserve and collect
social media evidence.


 * Video, audio, and image files
   

Multimedia data has become a more relevant type of ESI in recent years. Similar
to word-processed documents, it can be found in a wide variety of sources, from
local storage locations like hard drives or local folders, to cloud locations,
like Dropbox or Google Drive, and even on social media sites, like YouTube or
TikTok. 


Other relevant types and locations of ESI include:


• Online banking, credit card, and other relevant account records.

• Accounting application data, often found in applications like QuickBooks,
NetSuite, Sage, etc.

• Databases (e.g., Access, Oracle, SQL Server data, SAP.)

• Contact and Customer Relationship Management (CRM) data (stored in software
like Salesforce, Outlook, MS Dynamics.)

• Calendar, journaling and diary application data (found in Outlook PST, Google
Calendar, blog posts, etc.)

• Online access data like browsing history and other online activity logs.


LOGIKCULL + MS365

Logikcull integrates seamlessly with Office 365 for incredibly fast, always
reliable cloud-to-cloud eDiscovery.

Book demo


HOW TO ISSUE A LEGAL HOLD


BEST PRACTICES FOR DRAFTING AND ISSUING A LEGAL HOLD

Once the information that needs to be preserved and all custodians have been
identified, the next step is to draft and issue a litigation hold notice. 

While it’s good practice to have email templates and a streamlined process in
place to issue legal holds as efficiently as possible, a legal hold notice must
be a thoughtful document tailored to the needs of each case. 

Although there are no specific legal requirements for the structure or the
content of a legal hold notification, there are certainly a series of best
practices that you can follow when drafting a legal hold.

‍

LEGAL HOLD BEST PRACTICES CHECKLIST:


MAKE IT TIMELY:

In a world of automatic deletion, timing is everything, and failure to issue a
timely legal hold can put you at risk of sanctions. Courts have found that
“failure to adopt good practices is a factor in the determination of whether
discovery sanctions should be issued.” A thoughtful legal hold police and a
legal hold automation tool can help you issue a legal hold as quickly as
possible after the triggering event.

PUT IT IN WRITING:

An oral threat of litigation can trigger preservation, but issuing only a verbal
hold notice does not count as taking “reasonable steps” to actually preserve
relevant information. To be safe, write it down.

MAKE IT CLEAR AND SPECIFIC:

Not everyone reading your hold notice is a lawyer. The point of a legal hold is
to ensure that custodians comply with their obligation to preserve relevant
data. Make sure your notice is not full of legalese, clearly establishes the
specific information that needs to be preserved, including details about the
documents’ names, dates, and offers relevant examples to custodians.

EXPLAIN THE MATTER AT ISSUE:

It’s important that custodians understand the scope of the matter at issue so
that they have more context on why it is so crucial that they comply with their
duty to preserve. In some cases, knowing what the matter is about can also help
custodians determine whether they have further potentially relevant ESI that
should be preserved.

ASK FOR A NOTICE OF RECEIPT—AND FOLLOW UP WITH CUSTODIANS THAT DON’T SEND
ACKNOWLEDGMENT:

If any data goes missing, you’ll want to have hard evidence of preservation
efforts. Implementing a legal hold is an essential first step, but you also want
to demonstrate that the hold actually reached relevant custodians (and more
importantly, that they understood their obligations at the time). Always ask
custodians to acknowledge receipt of the legal hold notification, and follow up
with them consistently until they do so.

OFFER HELP:

Your legal hold notice should also offer an easy way for the custodian to get in
touch with the legal team for any questions or concerns.

REVISE, REVISE, REVISE:

An obvious—but sometimes overlooked—step. Make sure you’re not forgetting any
important detail on your notification and that you’re including all relevant
custodians. If possible, get an extra set of eyes on it before issuing the hold.

DOCUMENT EVERYTHING:

To make the legal hold process as defensible as possible, keep track of every
action consistently, like emails sent, acknowledgments received, follow-ups,
etc. We’ll cover this in more detail later on.

Download a printable version of the legal holds best practices checklist here.


OTHER KEY LITIGATION HOLD PROCEDURES

A thorough legal hold process shouldn’t end after the hold has been issued. Many
matters can be open for long periods of time, so it’s important to make sure
custodians don’t mistakenly assume that an active hold is no longer in effect,
while making sure they’re also properly notified when their obligation to
preserve is over.


Some important steps to take while the legal hold is still active are:


 * Send reminders to custodians that don’t acknowledge receipt of the legal hold
   notice: To have a defensible process, you'll want to do more than just issue
   a hold. You should be able to demonstrate that custodians were aware of their
   obligation to preserve. 
 * Remind custodians that the hold is still active: Custodians are busy
   employees, just like you, and they can forget about an ongoing hold if not
   reminded about it. Keep a consistent reminder schedule that restates their
   preservation duty. This doesn’t need to be a manual process, however. The
   right legal hold software can easily automate your reminders during the life
   of a hold. ‍
 * Conduct periodic reviews of the legal hold: The scope of your legal hold
   might change as new sources of information are found or when certain events
   occur. Make sure to review the scope of your hold frequency and consider
   adding amendments, if necessary (and notify custodians accordingly!)

‍


LEGAL HOLD RELEASE NOTICE: WHEN THE OBLIGATION TO PRESERVE IS OVER

Your legal hold process is not complete if it doesn’t include provisions for
releasing the hold when the duty to preserve is over. A legal hold release
notice enables your organization to resume its normal retention policies and
schedule, and lets custodians—both internal and any third-parties—return to
their regular workflows without fear of spoliation.‍

Here’s an example of a legal hold release notice from the Association of
Corporate Counsel. 

When releasing a legal hold, it’s important to verify the information or
custodians released are not subject to other preservation obligations through a
different legal hold. Having a robust and centralized tracking system of all
legal holds is essential here.

ARTICLE

TIPS FOR ISSUING A CORPORATE LEGAL HOLD

Putting together a reliable, defensible legal hold process can save hours of
frustration and set you on the right path not only for initial matters, but
whatever may arise in the future.

Get the tips


LEGAL HOLD COMPLIANCE


HOW TO ENSURE DATA PRESERVATION COMPLIANCE WITH A LEGAL HOLD

As mentioned earlier, sending frequent reminders to custodians is one way to
minimize the chances of data spoliation.

But apart from forgetful custodians, there are other challenges that can get in
the way of successfully preserving all relevant data for a case:


TERMINATIONS AND CHANGING CUSTODIANS:

This turns into a bigger challenge the bigger an organization is and the longer
a legal hold lasts. Both when determining who the original custodians are and
reassessing the scope of a legal hold, you need to account for any potential
changes in employee statuses such as leaves of absence, promotions, new roles,
etc.

Solution: It’s important to work closely with your HR team to verify custodians
and get notified about any important changes throughout the lifetime of a legal
hold. One great way to always stay abreast of any relevant changes in
custodians’ status is to use a legal holds software that integrates with your
employee database or employee management system. 

CUSTODIAN AND LEGAL HOLDS OVERLAPS:

As mentioned above, some matters can go on for long periods of time, while some
custodians may possess ESI relevant to multiple matters, so it’s common for
companies to have several legal holds active at once and for certain custodians
to be subject to multiple holds. For example, Gordon Food Service, the largest
family-owned food distributor in the U.S., issues an average of 10 legal holds
per month, and some of them can last several years. It is therefore not uncommon
to have one custodian involved in multiple holds at a time, which can create
management challenges if you don’t have effective tracking and clear
communication.

Solution: A diligent and reliable tracking method of your legal holds is the
best way to navigate the risks associated with overlapping holds and custodians.
Traditionally, this has largely been a spreadsheet-based process, but
organizations are more and more relying on available legal hold technology to
automate this process and make it less prone to human error.

NEGLIGENT OR UNRESPONSIVE CUSTODIANS:

No matter how clear, specific and easy-to-act-on your legal hold notification
might be, you will surely need to deal with custodians who ignore you or even
fail to comply with their preservation obligations altogether—even after
acknowledging receipt of the legal hold notice. And while this can be one of the
most frustrating parts of the legal hold process, there are certain actions you
can take that don’t involve manually sending dozens of reminders per week. 

Solution: Before escalating a situation with an unresponsive custodian, you
should try to exhaust any method of direct communication with them. To make your
life easier, you can keep a consistent follow-up schedule and make sure you
notify unresponsive custodians a certain number of times before taking further
action. There are legal hold tools that allow you to automate follow-up emails,
which makes this process much easier. However, if after multiple follow-ups
custodians keep ignoring you, an escalation notice might be necessary. This
means notifying the custodian’s manager about their inaction, alerting them
about the risks the company might be exposed to, and asking them to intervene.

ENSURING PRESERVATION BY THIRD-PARTIES

If there’s any third party that maintains data on your behalf, may still be
considered to be under your own possession, custody, and control. If you have
access to that data, you are also responsible for preserving and potentially
producing it. However, identifying third-party data and making sure third
parties meet their obligations to preserve aren’t always straightforward tasks. 

Solution: A robust information governance program should help your organization
determine where data lives, and the obligations that third parties need to
comply with in order to manage your company’s data.


MONITOR COMPLIANCE REGULARLY

When it comes to ensuring all custodians are complying with their preservation
obligations, consistent monitoring is key. Apart from regular reminders and
asking for periodic acknowledgments of the hold obligations, compliance training
sessions, where the negative consequences for noncompliance are clearly laid
down, can be powerful tools to ensure compliance.

This monitoring process is more effective when tailored to the custodian.
Consider your custodians’ technical expertise and familiarity with your
preservation policies, as well as their understanding of the importance of legal
hold compliance in determining how frequent and detailed reminders need to be. 

Numerous decisions have shown that it’s not enough to issue a hold notice and
rely on individuals to meet their preservation obligations (See, e.g., Concord
Boat Corp. v. Brunswick Corp., 207 F.3d 1039 (8th Cir. 2000).) Courts have found
that counsel has a duty to monitor—and sometimes even intervene—in a party’s
efforts to comply with their preservation obligations.


‍


HOW ARE ‘POSSESSION, CUSTODY, AND CONTROL’ DETERMINED?

When an organization knows litigation is coming, corporate defendants must
preserve anything under their “possession, custody, or control”—but how far does
that “control” go? Are corporations responsible for ensuring that employees and
other non-parties fully comply with preservation practices?

The short answer is yes. Certainly, companies have an obligation to identify key
custodians and make sure they preserve their data. But the duty often goes
further than that. Named parties may also be responsible for ensuring subpoenaed
or otherwise notified non-parties, including employees, also comply with the
terms of relevant legal holds. That may include obtaining discovery into
employee's personal devices, for example.

The “possession, custody, and control” standard is established by Rule 45 of the
Federal Rules of Civil Procedure. Federal courts have taken different approaches
to interpreting that requirement, leading to three general standards:

 * The Legal Right Standard: Data is considered under a party’s possession,
   custody, and control when the party has a legal right to obtain the ESI. This
   standard is applied in the Third, Fifth, Sixth, Seventh, Eighth, Ninth,
   Tenth, and Eleventh Circuits.‍
 * The Legal Right Plus Notification Standard: Data is considered under a
   party’s possession, custody, and control when the party has a legal right to
   obtain the ESI, plus, if no such right exists, the party has been put on
   notice that the ESI is in the hands of a third party and thus, must notify
   its adversary. This standard is applied in the First, Fourth, Sixth, and
   Tenth Circuits.‍
 * The Practical Ability Standard: Data is considered under a party’s
   possession, custody, and control when, regardless of whether the party has a
   legal right to the data, it has the practical ability to obtain the ESI. This
   standard is applied in the Second, Fourth, Eighth, Tenth, Eleventh, and D.C.
   Circuits.
   

Webinar

SIX LEGAL HOLD CHALLENGES — AND HOW TO MEET THEM

Without a well-defined process, legal holds can turn into a quagmire of
spreadsheets, flustered custodians, and accidentally-deleted email responses.
Learn how to overcome the most common legal hold challenges.

Watch Webinar


HOW TO DOCUMENT YOUR LEGAL HOLD PROCESS


HOW TO ENSURE DATA PRESERVATION COMPLIANCE WITH A LEGAL HOLD

In the context of legal holds, your main focus should be to create a process
that is defensible, meaning that your opposition, judge, jury, or regulator will
regard it as appropriate and sufficiently thorough. While perfection is not
required, your actions will need to be reasonable given the information
available at the time of the action.

That’s why it’s important that you document the preservation notice process to
show when and how a legal hold was issued, acknowledged, and whether it was
properly maintained from the moment of the triggering event. You should keep
track of all the custodians and actions taken throughout the process—hold
issuance, custodian acknowledgments, hold revisions, reminders, and legal hold
release. The most efficient way to do this is by using legal hold automation
software to get all your actions automatically logged. 

Once your legal hold notice is distributed, you will require recipients to
acknowledge receipt of the communication and understanding of their preservation
duty. This can be tracked through an email reply or by adding a special link to
your email that recipients can just click on to acknowledge that they understand
and will comply with the legal hold requirements. This option is usually
available only on legal hold software. 

Any reminders to recipients reiterating that the hold and its instructions are
still in place and that potentially relevant information should not be altered
should also be tracked.

Lastly, it’s also important to document when the hold was released and why (i.e.
what was the event that made the preservation duty no longer necessary?). 

You’ll want to make sure that your legal hold process and technology is capable
of recording and reporting on the following details, for individual matters and
custodians:


Matter name
Triggering event
Date legal hold issued
Custodian full name
Department
Title
Location
Email address
Supervisor name
Supervisor email
Custodian interview answers
Data preserved
Acknowledgment date
Reminder date(s)
Hold release date

In addition to documenting actions taken throughout the legal hold process, it’s
also important to keep track of the reason behind your actions. For example, if
the scope of the hold changes at some point and new custodians are notified or
existing custodians released, you should include an explanation of why that
decision was made. 

All these being said, you may never need to disclose this information. However,
if opposing parties were to challenge your organization’s preservation efforts,
a well-documented legal hold process and implementation efforts can be effective
methods of demonstrating your organization has taken reasonable steps to comply
with its preservation obligations.

‍



PICKING THE RIGHT LEGAL HOLD SOFTWARE

Managing legal holds using spreadsheets is not efficient nor secure. More and
more, legal teams are relying on existing technology to streamline their legal
holds and have most of the steps covered in this guide done automatically for
them.


When evaluating legal hold software, look for a solution that meets these
requirements:


CUSTOMIZABLE:

Create and send legal hold notices based on built-in templates with your own
messaging. This can really help speed up the process of issuing the hold.

EASY TO DISTRIBUTE:

Selecting existing custodians or adding new ones should be a simple process.

AUTOMATED:

Set your notice and reminders and let the software handle the rest.

TRACKABLE:

See at a glance your legal hold activity in a dashboard that updates in
real-time. 

COLLABORATIVE:

Communicate across teams in order to preserve data.

EASY TO RELEASE:

Simply and easily lift your holds when data no longer needs to be preserved.

SCALABLE:

Find a product that can scale to your needs, whether you’re managing one hold or
hundreds.

PREDICTABLE:

Litigation is expensive. Your legal hold software shouldn’t be.

COMPREHENSIVE:

Look for a solution that integrates smoothly with your eDiscovery process, so
when a hold transforms into a full-blown investigation or litigation, you can
instantly turn your hold into a discovery matter.

Chapter 3
Information Governance

Information Governance pertains to any program or system designed to get your
electronic house in order for the purposes of mitigating risk and cost, and
making wiser business decisions. Information governance is not a litigation
tactic, but a program that should be in place from the initial creation of ESI
through its final disposition. While it sounds like a straightforward program,
there are many complications that make it difficult to actually make an
information governance plan work in the face of litigation.

Read this chapter
ARTICLE

7 STRATEGIES FOR A DEFENSIBLE LEGAL HOLD PROCESS

When exactly do you should issue a legal hold? Who should receive it to How to
improve your own legal hold process? Learn 7 easy-to-apply strategies for a
defensible hold process.

Learn strategies


PUT AN END TO TIME-CONSUMING AND RISKY LEGAL HOLDS


For free. Forever.
Get Logikcull Hold Demo
or
Try for Free


Join 1,500+ customers using Logikcull to sort and cull the noise for faster,
more affordable discovery.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Create a free account

Cull the noise.
Find the signal.

Company
About UsCareers
Press
Wine
Merch
Contact Us

Product
eDiscoveryLegal Hold
Security
Compare eDiscovery Software
eDiscovery Pricing
Legal Hold Pricing
Support

Resources
BlogThe Ultimate Guide to eDiscovery
Intro to eDiscovery Basics
Guide to Slack Investigations
eDiscovery Sanctions Research
Legal Hold and Preservation

Popular Links
What Is eDiscovery Software?CLE Webinars
Culler Certification
eDiscovery Cost Calculator
Internal Investigations Technology
Subpoena Response Best Practices
Get a Demo

Privacy and Terms of Use
© 2021 All rights reserved. Logik Systems, Inc.


InHouse 21 On-Demand is now available! 1,600+ legal teams represented. 7 CLE
hours.

Access InHouse 21