Electronic Discovery

ESI Preservation and Litigation Holds

Preservation is not accomplished by sending a generic hold notice and hoping the systems obey. ESI preservation requires knowing where the evidence lives, how it changes, who controls it, and what must be done before routine use or retention rules alter the record.

The Duty Has to Reach the Actual Data

A litigation hold is only as good as its connection to real sources. Email accounts, cloud drives, shared folders, mobile phones, laptops, messaging platforms, databases, project-management systems, social-media accounts, backups, and third-party platforms can all hold responsive information. If the hold notice reaches the right people but not the right systems, preservation can fail quietly.

PowellPath helps counsel translate a legal preservation duty into a technical preservation plan. That means identifying custodians, systems, account owners, retention rules, deletion behavior, backup realities, mobile-device risks, and cloud settings before the evidence is disturbed.

Digital Evidence Changes While People Wait

ESI can be altered by ordinary activity: syncing, app updates, automatic deletion, retention policies, device replacement, account cleanup, cloud folder moves, collaboration edits, message expiration, and user access. A party does not have to act maliciously for relevant data to become harder to collect.

That is why early preservation should address both people and systems. Custodians need clear instructions. Administrators may need to suspend retention rules or preserve mailboxes. Devices may need to be imaged or collected. Cloud repositories may need exports, holds, or audit-log preservation. The plan should reflect how the data source actually behaves.

What a Useful Hold Map Identifies

  • Likely custodians, former employees, shared accounts, administrators, and third-party holders.
  • Devices, mailboxes, cloud folders, chat systems, mobile apps, file shares, databases, and backups.
  • Retention settings, auto-delete rules, message-expiration features, and synchronization risks.
  • Preservation steps already taken and gaps that still need attention.
  • Metadata, native-file, and chain-of-custody concerns that may affect later collection.
  • Systems or sources that require legal process, vendor assistance, or administrator-level access.

FRCP 37(e) Makes Process Matter

Federal Rule of Civil Procedure 37(e) addresses failures to preserve electronically stored information when litigation is anticipated or pending. The rule focuses attention on whether ESI should have been preserved, whether reasonable steps were taken, whether the information can be restored or replaced, and whether prejudice or intent is present.

Technical documentation matters because it helps counsel show what was reasonable. A preservation plan, custodian map, hold instructions, collection notes, export logs, and chain-of-custody records may become important if the adequacy of preservation is later challenged.

Preservation Also Needs Proportionality

A defensible hold is not necessarily the broadest possible hold. Over-preservation can create cost, privacy, privilege, and operational problems. Under-preservation can create sanctions risk and evidentiary loss. The right plan identifies the sources most likely to matter and documents the reasoning behind scope decisions.

PowellPath assists counsel by separating must-preserve sources from lower-priority sources, identifying fast-moving data, and flagging technical limits that should be addressed in discovery discussions or court filings.

What Counsel Receives

Deliverables may include a preservation source map, custodian questionnaire, hold-risk memo, technical preservation checklist, collection priority list, or chain-of-custody plan. The work is designed to help attorneys preserve what matters before it becomes a sanctions issue, a motion issue, or an avoidable evidentiary gap.