Tagged: Archive

SEC Document Destruction Policy Suspended

The SEC recently admonished its enforcement staff attorneys to cease any efforts to purge documents from investigative files amidst criticism that the agency wrongfully destroyed thousands of documents related to high profile enforcement matters, including major fraud investigations involving Wall Street banks. The cease order was disclosed in a letter last month from the SEC’s general counsel. The order was precipitated by a whistleblower — long-time SEC enforcement attorney Darcy Flynn — who advised key congressional representatives that the agency had destroyed thousands of investigative files from preliminary enforcement investigations (internally referred to as “MUIs” — or matters under inquiry).

How Useful is Facebook’s “Download Your Information” Feature in E-Discovery?

In October 2010, Facebook announced a new Download Your Information (“DYI”) feature, billed as “an easy way to quickly download to your computer everything you’ve ever posted on Facebook and all your correspondences with friends: your messages, wall posts, photos, status updates and profile information.” The Facebook announcement included a short video detailing how to use the feature. Cnet TV has a more in-depth video. Craig Ball also wrote an article about this feature in the February 23, 2011 issue of Law Technology News.

New York Appellate Court Refuses to Amend Confidentiality Order to Address Runaway Data Issue

Confidentiality agreements and protective orders are a commonplace, yet indispensable, feature of modern commercial litigation. These agreements are typically the end result of a series of negotiations between counsel specifically designed to balance the seemingly incompatible objectives of ensuring ready access to vital evidence and ensuring that sensitive information, such as trade secrets, remains carefully shrouded from the public eye and industry competitors. The importance of ensuring that sensitive information remains confidential vis-à-vis the world at large during a lawsuit cannot be overstated. Confidentiality agreements often provide detailed provisions addressing who may access information and how information may be used. Once the litigation has concluded, parties are often faced with the sometimes challenging task of ensuring that all confidential information is either returned to the producing party or destroyed. Without proper planning, it may be difficult to put the proverbial genie back into the bottle.