LWM Logo

Menu

Contact Us Today






Preservation of Evidence

Hurt? We can help.

  1. Experienced trial attorneys

    Learn More
  2. Exclusive focus on
    Personal Injury Cases

    Learn More
  3. Proven track record

    Learn More

Preservation of Evidence

If you are visiting this page then you have probably received a request from our firm to preserve evidence related to a claim on which we are working.  This is our initial request for the preservation of evidence related to a claim.

We request that all evidence related and even potentially-related to the claim be preserved.  This preservation request seeks to preserve the greatest possible amount of evidence related to the claim.  Please preserve all communications with our client, witnesses, and other persons and entities.  This request includes but is not limited to letters, emails, text messages, voice messages, or other forms of communication.  We request you preserve:

  1. All vehicles, vessels, bikes, and other real and personal property involved in, and related to the claim, in their unrepaired and unaltered state, so we can inspect and record their condition;
  2. All audio and video recordings related to the claim;
  3. All documents, manuals, operating procedures, accident reports, and any other compilation of information without limitation that relate to or memorialize the claim;
  4. All audio and video recordings of the incident occurring in real time;
  5. All audio and video recordings of the area where the incident occurred for the twenty-four hour period preceding and following the incident; and
  6. All other items of evidence related and potentially-related to the claim.

We request you preserve all documents, tangible things and electronically stored information related to or potentially relevant to the claim.  You shall anticipate that much of the evidence we demand preserved is stored on current and former computer systems and other media and devices (including personal digital assistants, voice messaging systems, online repositories, and cell phones). Electronically stored information (ESI) shall be afforded the broadest possible definition and includes, but is not limited to, potentially relevant information electronically, magnetically or optically stored as:

  1. Digital communications (e.g., e-mail, voice mail, instant messaging)
  2. Cell phones text messages and cell phone photographs;
  3. Word-processed documents (e.g., Word or WordPerfect documents and drafts);
  4. Spreadsheets and tables (e.g., Excel or Lotus 123worksheets);
  5. Accounting Application Data (e.g., QuickBooks, Money, Peachtree data files);
  6. Image and Facsimile Files (e.g., .PDF, .TIFF, .JPG, .GIF images);
  7. Sound Recordings (e.g.,.WAV and .MP3 files);
  8. Video and Animation (e.g., .AVI and .MOV files);
  9. Databases (e.g., Access, Oracle, SQL Server data, SAP);
  10. Contact and Relationship Management Data (e.g., Outlook, ACT);
  11. Calendar and Diary Application Data (e.g., Outlook, PST, Yahoo, blog tools);
  12. Online Access Data (e.g., Temporary Internet Files, History, Cookies);
  13. Presentations (e.g., PowerPoint, Corel Presentations)
  14. Network Access and Server Activity Logs;
  15. Project Management Application Data;
  16. Computer Aided Design/Drawing Files;
  17. Back-up and Archival Files (e.g., Zip, .GIlO);
  18. Social Networking sites (e.g., Facebook, LinkedIn, MySpace, etc.)

ESI resides not only in areas of electronic, magnetic and optical storage media reasonably accessible to you but also in areas you may deem not reasonably accessible. You shall preserve all potentially relevant evidence from all sources of ESI, even if you do not anticipate producing such ESI.  You must identify all sources of ESI you decline to produce and demonstrate to the court why such sources are not reasonably accessible. For good cause shown, the court may then order production of the ESI, even if it finds that it is not reasonably accessible. Accordingly, even ESI that you deem reasonably inaccessible must be preserved in the interim so as not to deprive our client(s) the right to secure the evidence or the court of its right to adjudicate the issue.  You must act immediately to preserve all potentially relevant ESI and evidence.

Adequate preservation requires more than simply refraining from efforts to destroy or dispose of such evidence. You must also intervene to prevent loss due to routine operations and employ proper techniques and protocols to ensure the preservation of all evidence and ESI.  Be advised that sources of ESI are altered and erased by continued use of your computers and other devices. Booting a drive, examining its contents or running any application will irretrievably alter the evidence it contains and may constitute unlawful spoliation of evidence.  Consequently, alteration and erasure may result from your failure to act diligently and responsibly to prevent loss or corruption of ESI and evidence.  Nothing in this demand for preservation shall be understood to diminish your obligation to preserve all ESI and evidence related to, or potentially related to the above-referenced claim.

You shall immediately place a litigation hold on all such ESI and evidence.  You shall further immediately identify and suspend all features of your information systems and devices that cause the loss of potentially relevant ESI and evidence. Examples of such features and operations include, but are not limited to:

  1. Purging the contents of e-mail repositories by age, capacity and other criteria;
  2. Using data or media wiping, disposal, erasure and encryption utilities, and devices;
  3. Overwriting, erasing, destroying or discarding back up media;
  4. Re-assigning, re-imaging and disposing of systems, servers, devices, and media;
  5. Running antivirus or other programs affecting wholesale metadata alteration;
  6. Releasing and urging online storage repositories;
  7. Using metadata stripper utilities;
  8. Disabling server and IM logging; and
  9. Executing drive and file defragmentation and compression programs.

You shall anticipate that your employees, officers or others may seek to hide, destroy or alter ESI and evidence and prevent and guard against such actions.  Especially where machines have been, or are used, for Internet access or personal communications, you shall anticipate that users may seek to delete or destroy information they regard as personal, confidential or embarrassing and, in so doing, may also delete or destroy potentially relevant ESI and evidence.

You shall prevent anyone with access to your data, systems and archives from seeking to modify, destroy or hide electronic evidence on network or local hard drives (such as by deleting or overwriting files, using data shredding and overwriting applications, defragmentation, re-imaging or replacing drives, encryption, compression, steganography or the like).  With respect to local hard drives, one way to protect existing data on local hard drives is by the creation and authentication of a forensically qualified image of all sectors of the drive.  Such a forensically qualified duplicate may also be called a bitstream image or clone of the drive.  Be advised that a conventional back up of a hard drive is not a forensically qualified image because it only captures active, unlocked data files and fails to preserve forensically significant data that may exist in such areas as unallocated space, slack space, and the swap file.

With respect to the hard drives and storage devices of each of the persons named below and of each person acting in the capacity or holding the job title named below, as well as each other person likely to have information pertaining to the instant action on their computer hard drive(s).  You shall immediately obtain, authenticate and preserve forensically qualified images of the hard drives in any computer system (including portable and home computers) used by that person as well as recording and preserving the system time and date of each such computer.  Once obtained, each such forensically qualified image should be labeled to identify the date of acquisition the person or entity acquiring the image and the system and medium from which it was obtained.  Each such image shall be preserved without alteration.

You shall anticipate that certain ESI and evidence, including but not limited to spreadsheets and databases, will be sought in the form or forms in which it is ordinarily maintained. Accordingly, you shall preserve ESI and evidence in such native forms, and you shall not select methods to preserve ESI and evidence that remove or degrade the ability to search your ESI by electronic means or make it difficult or burdensome to access or use the information efficiently in the litigation. You shall refrain from actions that shift ESI from reasonably accessible media and forms to less accessible media and forms if the effect of such actions is to make such ESI not reasonably accessible.

You shall further anticipate the need to disclose and produce system and application metadata and act to preserve it. System metadata is information describing the history and characteristics of other ESI.  This information is typically associated with tracking or managing an electronic file and often includes data reflecting a file’s name, size, custodian, location and dates of creation and last modification or access. Application metadata is information automatically included or embedded in electronic files but which may not be apparent to a user, including deleted content, draft language, commentary, collaboration and distribution data and dates of creation and printing.  Metadata may be overwritten or corrupted by careless handling or improper steps to preserve ESI for email, metadata includes all header routing data and Base 64 encoded attachment data, in addition to the To, From, Subject, Received Date, CC and BCC fields.

With respect to servers like those used to manage email (e.g., Microsoft Exchange, Lotus Domino) or network storage (often called a user’s “network share”), the complete contents of each user’s network share and e-mail account shall be preserved.  There are several ways to preserve the contents of a server depending on, for example, its RAID configuration and whether it can be downloaded or must be online constantly.  If you question whether the preservation method you pursue is one that we will accept as sufficient, please call us.

You shall also determine if any home or portable systems may contain potentially relevant data.  To the extent that officers, board members or employees have sent or received potentially relevant e-mails or created or reviewed potentially relevant documents away from the

office, you must preserve the contents of systems, devices and media used for these purposes (including not only potentially relevant data from portable and home computers, but also from portable thumb drives, CD-R disks and the user’s PDA, smartphone, voice mailbox or other forms of ESI storage.), Similarly, if employees, officers or board members used online or browser-based email accounts or services (such as AOL, Gmail, and Ymail) to send or receive potentially relevant messages and attachments, the contents of these account mailboxes (including Sent, Deleted and Archived Message folders) shall be preserved.

You shall preserve documents and other tangible items that may be required to access, interpret or search potentially relevant ESI, including logs, control sheets, specifications, indices, naming protocols, file lists, network diagrams, flow charts, instruction sheets, data entry forms, abbreviation keys, user ID and password rosters or the like.  You must preserve any passwords, keys or other authenticators required to access encrypted files or run applications, along with the installation disks, user manuals and license keys for applications required to access the ESI.  You must preserve any cabling, drivers and hardware, other than a standard 3.5″ floppy disk drive or standard CD or DVD optical disk drive if needed to access or interpret media on which ESI is stored.  This includes tape drives, bar code readers, Zip drives and other legacy or proprietary devices.

Hard copies do not properly preserve ESI, electronic search-ability, and metadata.  Hard copies are not an adequate substitute for, or cumulative of, electronically stored versions.  If information exists in both electronic and paper forms, you shall preserve both forms.  Your preservation obligation extends beyond ESI and evidence in your care, possession or custody and includes ESI and evidence in the custody of others that is subject to your direction or control, or with whom you are associated with on the above-referenced claim.  Accordingly, you shall notify all current or former agent(s), attorney(s), employee(s), custodian(s), investigator(s), insured(s), adjuster(s), and contractor(s) in possession of potentially relevant ESI and evidence to preserve such ESI and evidence in full compliance with this request.  You shall make all necessary efforts to ensure such compliance.

You shall take forensically sound steps to preserve all ESI and evidence from service and properly sequester and protect it.  Failure to do so poses a significant threat of spoliation.  “Forensically sound” means duplication, for purposes of preservation, of all ESI, evidence, and data stored on the evidence media while employing a proper chain of custody and using tools and methods that make no changes to the evidence and support authentication of the duplicate as a true and complete bit-for-bit image of the original. A forensically sound preservation method guards against changes to metadata evidence and preserves all parts of the electronic evidence, including in the so-called ”unallocated clusters,” holding deleted files.  If you have any questions about your obligation or ability to preserve any evidence then please contact us immediately to discuss the issue.

Man standing outsideMan standing outsideMan standing outside

John K. Lawlor

John K. Lawlor, a South Florida personal injury attorney who focuses his practice on complex personal injury, wrongful death, and professional malpractice, founded the law firm of Lawlor, White & Murphey in 1996. Since 1995, Mr. Lawlor’s trial advocacy and litigation skills, as well as his wide-ranging legal expertise, have provided plaintiffs and their families with a distinct advantage when seeking financial compensation and justice for injuries caused by the negligence of others.

M. Benjamin Murphey

A partner at Lawlor, White & Murphey and a distinguished personal injury lawyer, Ben Murphey tries complex disputes that include civil appeals, maritime and admiralty claims, wrongful death, and labor disputes. Mr. Murphey has been recognized for his excellence in the area of personal injury litigation by being rewarded with a 10/10 Avvo Rating and named a Super Lawyers “Rising Star” for 2010-2013 and Super Lawyers 2014-2018.

Anthony B. White

Since 1994, seasoned litigation and trial lawyer Anthony B. White has helped thousands of accident victims seek damages due to injuries sustained as a result of another party’s negligence. Included in America’s Registry of Outstanding Professionals and selected to the 2012, 2014-2016 editions of Florida Super Lawyers, Mr. White specializes in car accidents, insurance disputes, wrongful death, product liability, and medical malpractice cases.

01

Vivian B.

John Lawlor and this practice provide their clients with the upmost professionalism and expertise. I highly recommend them!

Lisa

John proved himself to be an attorney I could completely trust. His knowledge, experience and professionalism, mixed with his kindness and genuine concern for me and my family, were greatly appreciated.

Iskra D.

I cannot say enough about Anthony – he treated me like a friend instead of just another client. He was always available to answer any concerns, and provide guidance about my case.

Anonymous

I summarize my experience with Anthony with the words honesty, professionalism, efficiency and care. Thank you so much.

Jaime H.

This is a fantastic team of lawyers! Everyone who worked there treated me like I was their most important case, even though it wasn't a major car accident case. I would highly recommend them.

Anonymous

Ben worked on my case tirelessly and always kept me informed. Throughout a very lengthy and complex case he was very compassionate, empathetic and distributed a wealth of knowledge.

1 / 6

Firm Award
Firm Award
Firm Award
Firm Award
Firm Award
Lawyers outside

$1.7million

Settlement/

Motor Vehicle Accident

$2.0million

Settlement/

Medical Malpractice

$3.0million

Recovery/

Slip & Fall Injury

$1.2million

Verdict/

Medical Malpractice

Areas We Serve

  • Aventura
  • Bal Harbour
  • Bay Harbor Island
  • Biscayne Park
  • Coral Gables
  • Cutler Bay
  • Doral
  • El Portal
  • Florida City
  • Hialeah City
  • Hialeah Gardens
  • Homestead
  • Indian Creek
  • Key Biscayne
  • Medley
  • Miami City
  • Miami Beach
  • Miami Gardens
  • Miami Lakes
  • Miami Shores
  • Miami Springs
  • North Bay Village
  • North Miami
  • North Miami Beach
  • Opa-locka
  • Palmetto Bay
  • Pinecrest
  • South Miami
  • Sunny Isles Beach
  • Surfside
  • Virginia Gardens
  • West Miami
  • Atlantis City
  • Briny Breezes
  • Golf
  • Highland Beach
  • Lake Park
  • Mangonia Park
  • Palm Beach
  • Riviera Beach
  • Wellington
  • Belle Glade
  • Cloud Lake
  • Greenacres
  • Hypoluxo
  • Lake Worth
  • North Palm Beach
  • Palm Beach Gardens
  • Royal Palm Beach South Bay
  • West Palm Beach
  • Boca Raton
  • Delray Beach
  • Gulf Stream
  • Juno Beach
  • Lantana
  • Ocean Ridge
  • Palm Beach Shores
  • South Palm Beach
  • Boynton Beach
  • Glen Ridge
  • Haverhill
  • Jupiter Town
  • Manalapan
  • Pahokee
  • Palm Springs
  • Tequestaf
  • Punta Gorda
  • Naples
  • Marco Island
  • Everglades
  • Bonita Springs
  • Cape Coral
  • Estero
  • East Dunbar
  • Fort Myers
  • Fort Myers Beach
  • Sanibel
  • Jensen Beach
  • Jupiter
  • Stuart
  • Sewall’s Point
  • Ocean Breeze Park
  • Key West
  • Islamorada
  • Key Colony Beach
  • Layton
  • Marathon
  • Long Boat Key
  • North Point
  • Sarasota
  • Venice
Outline of Florida