Litigation Holds and Document Preservation
A litigation hold is a formal directive requiring an organization or individual to suspend routine document destruction and preserve all materials potentially relevant to anticipated or active legal proceedings. This page covers the legal basis for preservation obligations, the mechanics of implementing a hold, the scenarios that trigger the duty, and the boundaries that distinguish compliant from deficient preservation practices. Failures in this area carry significant procedural consequences, including spoliation sanctions that can alter the outcome of litigation.
Definition and Scope
The duty to preserve arises when a party reasonably anticipates litigation — not only after a complaint is filed. Under Federal Rule of Civil Procedure 37(e), courts may impose sanctions when electronically stored information (ESI) that should have been preserved is lost because a party failed to take reasonable steps to protect it. The rule distinguishes between negligent loss, which may warrant curative measures, and intentional spoliation, which can justify an adverse inference instruction or case-terminating sanctions.
The scope of a litigation hold extends beyond paper documents. It encompasses ESI in all formats — email, instant messages, database records, voicemail, metadata, and cloud-stored files. The Sedona Conference, a nonprofit law and policy research organization, has published widely cited guidelines on preservation scope, including its Commentary on Legal Holds (2022 edition), which addresses proportionality in determining the breadth of a hold.
Preservation obligations apply symmetrically to plaintiffs and defendants, and extend to non-party custodians over whom a party exercises legal control. Federal courts have reinforced that the preservation duty reaches third-party vendors and subsidiaries when the party controls their records. The discovery process in US litigation broadly defines the universe of discoverable material, and a litigation hold must map to that universe.
How It Works
A litigation hold operates through a structured sequence of steps:
- Trigger identification: Counsel or compliance personnel identify an event — a demand letter, regulatory inquiry, notice of charge, or internal threat assessment — that makes litigation reasonably foreseeable.
- Custodian mapping: A records inventory is conducted to identify individuals and systems likely to hold relevant information.
- Hold notice issuance: A written notice is sent to identified custodians instructing them to preserve all relevant materials and suspend any automatic deletion routines, including email auto-purge policies.
- IT suspension of routine destruction: Information technology personnel disable scheduled deletion scripts and backup-overwrite cycles for relevant data classes.
- Collection and sequestration: Relevant materials are copied or transferred to a protected repository to prevent accidental alteration or deletion.
- Acknowledgment and tracking: Custodians confirm receipt of the hold notice; legal or compliance teams log acknowledgments and track compliance.
- Periodic refresh: As litigation develops or new custodians are identified, the hold notice is reissued to updated recipient lists.
- Release: When litigation concludes and all appeal deadlines have passed, counsel formally lifts the hold and normal retention schedules resume.
Electronic discovery (eDiscovery) procedures depend directly on the integrity of this preservation chain. Courts evaluating sanction motions under Rule 37(e) examine whether the party's preservation steps were reasonable given the known scope of litigation at the time the duty arose.
Common Scenarios
Litigation holds arise across a wide range of legal contexts, each with distinct triggering events and custodian profiles.
Commercial contract disputes: A hold is triggered when one party sends a breach notice or files a complaint. Relevant custodians typically include project managers, finance personnel, and contract administrators holding emails, change orders, and financial records.
Employment litigation: Charges filed with the Equal Employment Opportunity Commission (EEOC) constitute a recognized trigger. The EEOC's charge process creates a well-documented moment at which preservation becomes obligatory, covering HR files, performance reviews, communications between supervisors and the complainant, and payroll records.
Regulatory investigations: An agency subpoena or civil investigative demand from the Department of Justice, the Securities and Exchange Commission (SEC), or the Federal Trade Commission (FTC) triggers preservation obligations coextensive with the demand's scope. Unlike private litigation, the relevant custodian pool may be enterprise-wide.
Product liability and mass tort: In multidistrict litigation (MDL) proceedings, preservation orders are frequently entered by the transferee judge, creating court-imposed holds that supplement or override internal hold procedures.
Intellectual property disputes: Patent and trade secret cases often require preservation of source code repositories, version control logs, and engineering communications, data classes with high volatility given normal development workflows.
Decision Boundaries
The legal line separating adequate from inadequate preservation turns on two core questions: whether the hold was timely and whether it was reasonably comprehensive.
Timeliness is assessed against the moment litigation became reasonably foreseeable, not the date of service of process. Courts applying Federal Rules of Civil Procedure precedent, including Zubulake v. UBS Warburg (S.D.N.Y. 2003), have held that internal awareness of a credible legal threat is sufficient to start the preservation clock regardless of formal filing.
Comprehensiveness involves a proportionality analysis. A hold need not be infinitely broad, but it must cover all document categories a reasonable litigant would recognize as potentially relevant. The contrast between a narrow hold (limited to named custodians' email) and a broad hold (encompassing all custodians, shared drives, backup tapes, and third-party platforms) reflects a risk management tradeoff with direct sanction exposure implications.
Sanctions exposure escalates with culpability. Under Rule 37(e)(1), negligent or grossly negligent loss permits curative jury instructions. Under Rule 37(e)(2), intentional destruction permits an adverse inference instruction — effectively telling the jury the destroyed evidence was unfavorable — or, in extreme cases, default judgment or dismissal. Sanctions in US litigation, including case-terminating measures, have been imposed in cases where organizations allowed auto-deletion to continue after receiving a preservation demand.
The hold duration question is also a decision boundary: holds must remain active through the conclusion of all appeals, not merely through trial, because post-verdict proceedings may require access to original document populations.
References
- Federal Rule of Civil Procedure 37 — Cornell Legal Information Institute
- The Sedona Conference — Commentary on Legal Holds (2022)
- Equal Employment Opportunity Commission — Charge Process
- U.S. Securities and Exchange Commission — Civil Investigative Process
- Federal Rules of Civil Procedure — Official Text, U.S. Courts
- Sedona Conference Cooperation Proclamation