Posted on: October 01, 2014in Blog
Good Record Retention Policies Help Thwart Government Sanctions
After the storm of financial scandals that erupted at the dawn of the last decade, the Sarbanes-Oxley Act of 2002 (“SOX”) was passed by Congress to ensure, among other things, more transparency from business enterprises. As it pertains to record retention, SOX often triggers the need for companies to preserve data regardless of whether a government investigation has actually commenced.
Importance of Information Management Prior to Investigations
Where such investigations are reasonably anticipated, it is therefore all the more important to fully comply with established data preservation requirements. Fortunately, companies are able to proactively protect themselves by implementing legally compliant document retention policies capable of satisfying requirements and helping to steer them clear of obstruction of justice claims and related sanctions.
Determining what to preserve and what to delete
The most pressing issue that record retention policies must effectively address is determining when data may be purged and when it ought to be preserved. There are internal and external factors that must be considered before establishing how long records should be retained. Internal factors include: ongoing business use, internal audit requirements, and the historical value of data.
Decision makers would be wise to give thorough consideration to internal factors when forming specific policies, such as an email retention policy. In the event that retention policy maximums must be increased in length, a risk assessment should be performed to determine the potential risks and costs that the company bears.
Statute of limitations and legal requirements
The key external factor relevant to forming data preservation policies is the applicable statutes of limitation laws. Statute of limitations laws proscribe the period of time during which an organization can either sue or be sued for a particular matter or how long a government agency can conduct an investigation or audit of the company.
With an informed retention policy in place, businesses should then create preservation notices to track and manage potentially responsive business records or other data.
Accordingly, statutes of limitation periods must also be considered in determining how long records should be retained. While statutes of limitations are not required retention periods per se, they are a critical external factor that must be considered in forming effective data governance policies and procedures.
With an informed retention policy in place, businesses should then create litigation hold notices to track and manage potentially responsive business records or other data. This can be proactively achieved by conducting automated disk imaging; targeting data collection by forensically preserving data from a central office; collecting data from other business offices through secure remote data collection tools; or even performing discrete data collection methods throughout an investigation.
With such thorough preservation and collection methods in place, the liability of obstruction of justice claims or related sanctions is even further mitigated.
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted June 21, 2017
Strategic Ways to Reduce the Cost of eDiscovery
Posted June 15, 2017
Shanghai OSAC Quarterly Meeting
Posted June 15, 2017
5 Ways to Reduce eDiscovery Costs Before and During Litigation
Posted June 07, 2017
Defensible Deletion Strategy: Getting Rid of Your Unnecessary Data
Posted May 31, 2017
How Does the EU-US Privacy Shield Affect Cross-Border Discovery?
Posted May 24, 2017
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
Posted May 17, 2017
How to Comply with 21 CFR and HIPAA Data Retention Requirements
Posted May 11, 2017
4 Key Advantages of Conducting Remote Depositions
Posted May 03, 2017
eDiscovery in International Dispute Resolution: What Experts Want You to Know
Posted April 27, 2017
China Expands Data Transfer Requirements for its Cybersecurity Law