• 1. William R. Terpeningv.1.0
  • 2. •Not addressing civil subpoenas – many distinctions.•Different from subpoena to testify at trial.•Can be used for both testimony and documents.•Focus on documents: scenario corporate counsel willencounter most frequently.•Preparing a written subpoena response plan with inputfrom outside counsel and management now will minimizemistakes, expenses, and negative publicity later.
  • 3. Intro: Purpose of the Subpoena Secure documents and physical evidence.  duces tecum.  “A subpoena may order the witness to produce any books, papers, documents, data, or other objects the subpoena designates.” Fed. R. Crim. P. 17(c)(1). Not only documents.  Handwriting and voice exemplars.  Hair samples. And secure testimony.  ad testificandum. Fed. R. Crim. P. 17(a). Broader than civil equivalent.  Can be served “at any place within the United States” – less option to quash for procedural/ venue problems.  Fed. R. Crim. P. 17(e)(1).
  • 4. Some Differences from Civil Subpoenas. Fed. R. Crim. P. 17 vs. Fed. R. Civ. P. 45. Not totally unfettered, but permissibly broader. Can require production of all witnesses and non-privileged evidence, as long as not unduly burdensome. No probable cause showing necessary (compare withsearch warrants). Presumption of regularity. Once supported by court order, strong contempt aspect. Obstruction consequences vs. contempt.  Civil v. criminal contempt.
  • 5. More Differences from Civil Subpoenas Relevance usually not as strong of a basis for refusing tocomply – more leeway for investigation. Reasonableness review highly deferential to government. Fear of third party retaliation no basis for non-compliance. Original documents. Service and witness travel nationally, not just within or nearissuing district. Inability of civil courts to compel non-parties to travel to testify – 100mile rule. Travel limits for depositions. No protections for trade secrets, etc., articulated in Fed. R.Civ. P. 45.
  • 6. Your Initial Subpoena Review When you receive the subpoena, whether focused ondocuments or testimony, develop an action plan. Subpoena must include all essential complianceinformation: Information about court name and proceeding. Time and place witness is to appear or documentsshould be produced. What the recipient is supposed to do. See Fed. R. Crim. P. 17(a) and (c). If for documents, will have a detailed attachment similar to a civil set of document requests.
  • 7. Note on: Subpoena AdTestificandum Initial questions unique to those subpoenas thatseek testimony: Whose testimony is sought? Employee? Executive management? Need for separate representation? Employee with conflict Fact witness
  • 8. Obligations of Targets & Subjects “Target” = person who is linked by substantialevidence to commission of crime and who, inprosecutor’s judgment, is a possible defendant. “Subject” = person whose conduct falls withininvestigation’s scope. Vs. “witness”. To avoid unfairness and confusion stemming fromtestimony of targets and subjects who do not knowtheir status, DOJ has policies advising of FifthAmendment rights/ requesting voluntary appearance.
  • 9. Focus: DocumentsThe Subpoena Duces Tecum Initial review of subpoena to determine scope  Date range  Type of documents  Cost/feasibility of compliance  Deadline? Review for indications of allegations/potential crimes Determine whether grounds to challenge. Start considering whether compliance is better strategicoption, even where challenge grounds exist.
  • 10. Subpoena Duces Tecum Caution: penalties for improper response.  Avoid “game-playing” that is prevalent in some civil discovery. Contact experienced counsel Immediately suspend regular document destruction - even ifconsistent with document retention policies Memorialize all steps & decisions in written memorandum. Notify some employees / control group  Do not discuss the subpoena or any aspect of the investigation with all employees. Main point of presentation: you’ll be better off if you have prepared aresponse protocol before you ever receive the subpoena.
  • 11. Your Subpoena Response Plan Keep on hand in case of emergencies and refreshperiodically. Should contain: A copy of the company’s document retention policy. A contact list: key executives who need to know, go-to outsidecounsel, responsible IT person; custodian of records. Draft of memo to go to responsible employees withinstructions regarding preservation of electronic and hardcopy documents. A plan for ensuring that all versions of electronic documents,in particular, are secured. A directory of where key general categories of documents arestored and likely to be located.
  • 12. Initial Telephone Call Call prosecutor:  Discuss role of company, individuals.  Witness, subject, or target?  If for documents:  Discuss subpoena to ensure you understand requests,resolve any questions, and narrow or define scope asappropriate.  You know company and documents/subject matter better than requester, and may save both sides time and effort and create mutual goodwill/ relationship through this conversation. 
  • 13. Initial Call (Cont’d.)  If the volume of documents requested is large, use call to negotiate deadline or rolling production, which you can later memorialize in writing. Offer to keep dialogue open and avoid adversarial approach.  Ability to address production and compliance issues on phone rather than more formally will save parties’ and court’s time and resources and avert unintended obstruction problems.  Assess where documents are to be produced and whether/ when an executive will need to testify. Usually can defer until after agent review. As general counsel, offer to accept future subpoenas and requestby e-mail, informally. If you plan to retain experienced outside counsel, may wait forthem for this call if time allows.
  • 14. Motion to Quash- Rule 17(c)(2) Most Common Ground for Challenging: Unreasonable or oppressive Documents requested are privileged. Mot. quash (for unreasonable or oppressive subpoenas) nottechnically correct approach, but often handled this way. Fourth Amendment particularity requirement applies. “The right of the people to be secure in their persons, houses,papers, and effects, against unreasonable searches andseizures, shall not be violated, and no Warrants shall issue,but upon probable cause, supported by Oath or affirmation,and particularly describing the place to be searched, and thepersons or things to be seized.” 
  • 15. Motion to Quash- Rule 17(c)(2) Because of presumption of regularity, heavy burden onmovant. Explore court modification as alternative. Don’t forget negotiated narrowing and privilege decisions.
  • 16. Other common grounds for challenge. Other Limits: Abuse of subpoena process E.g., to conduct post-indictment discovery for trialwitnesses & trial prep. GJ subpoena not for obtaining civil proceedingevidence. Not to harass or intimidate. E.g., obtain a plea (but compare how USAO uses target letters). Unreasonable time span.
  • 17. Additional Challenge Grounds Statutory objections.  Prohibition on using information obtained during illegal electronic surveillance during grand jury proceeding.  Therefore, has been held that witness may object on basis that questions or requests are fruit of illegal electronic surveillance. Drug treatment records from federal facilities.  No release for subpoena without patient consent. Not to compel interviews.
  • 18. Document Search, Review & ProductionProcess Retrieve & follow the plan you already prepared. Plan & supervise & document “process” Keys: What dox are produced? What process was followed? Designate a point person to be “custodian ofrecords.” Custodian should be prepared to testify about the steps takento gather information for the subpoena
  • 19. Document Search, Review & Production Which documents are “responsive?” WHO DECIDES (versusyou or client)? Which responsive documents are privileged? WHO DECIDES(versus you or client)?  Create a decision log and a privilege log – class familiarity with these? “Bates-stamp” and keep copy of all that is produced.  Note, you generally will produce originals, unlike in civil litigation. Types of Privileges:  Attorney Client / Work Product  5th Amendment
  • 20. Privileged Documents Avoid inadvertent waivers of attorney-client privilege.  Ensure cover letter for production has a “claw-back” stipulation.  Discuss specific close situations with prosecutor & negotiate for an e-mail confirming that production of specific types of documents will not constitute waiver. Certain disclosures can be viewed as corporateadmissions that may negate need for gvt toindependently work to prove elements. Does the benefit of cooperation outweigh the risk ofdisclosure?
  • 21. Attorney-Client PrivilegeProtects confidential communications between clientseeking legal advice and his attorney.Can be waived: (i) By corporate management (ii) By disclosure outside of a privileged relationship. (a) Includes voluntary disclosure to third party. (b) Includes disclosure at the request of a government agency. (c) Includes inadvertent disclosures (where reasonable precautions to prevent were not taken).
  • 22. Work Product DoctrineProtects documents prepared for trial or “inanticipation of litigation .”Can also be waived by voluntary disclosure.How is the work product doctrine different from attorney- client privilege?
  • 23. Confidentiality In general, grand jury cloak of secrecy does not gagwitnesses and parties producing documents. Exceptions: Bank records & subpoenas to financial institutions. Telephone records. In general, of course, companies will want to remainrelatively silent for PR reasons and to avoid appearanceof interfering with process. Simple statements regarding fact of compliance willsuffice.
  • 24. Expenses of Compliance Generally government need not reimburse for costs ofcomplying with subpoena duces tecum. However, remember that showing of financial burdencan be part of the reasonableness or burdensomenessanalysis upon a motion to quash. A court may exercise its Rule 17(c) power and modifysubpoena to make government bear costs ofcompliance. As well, some narrow statutory situations where costsborne by government. Banks.
  • 25. •As with subpoena response, plan now.•Particularly important because there is typically less lead timethan for subpoena response.•FBI and others may appear unexpectedly.•Our analysis focuses on federal procedure, not state procedure. • Substantially similar, but differences may exist.
  • 26. Search Warrant Response  Increasing reliance on search warrants as a tool in business crimes – even for documents that a subpoena could cover. Government’s key advantage: SURPRISE & CONTROL “Focus of government’s search =Not just documentsbut all “instrumentalities of crime”
  • 27. Warrant versus Consent Recent trend: agents appear without warrant and requestdocuments and consent waiver. Pros: Ability to work with agents to narrow and define scope.  Physical scope and subject matter scope. Goodwill. Agents quickly in and out. Cons: No need for government to make showings that are in place toprotect you.  E.g., probable cause showing for magistrate. Easier path to potentially incriminating documents. Don’t consent without a private meeting with client todetermine and advise about risks/ what gvt. is likely to find.
  • 28. Search Warrants Background All searches and seizures are governed by theFourth Amendment’s:1) Prohibition against unreasonable searches and seizures; and2) Requirement the warrants to conduct searches besupported by “probable cause.”
  • 29. Search Warrant Background(Cont’d) “Probable Cause” =- “A fair probability that contraband or evidence of acrime will be found in a particular place.” - A “fluid concept” that is not easily translated into“a neat set of rules,” but rather turns on the “totality ofthe circumstances.” - See Illinois v. Gates, 462 U.S. 213, 238 (1983).
  • 30. Obtaining the Search Warrant Process for Obtaining Warrant:  Rule 41 - Fed. R. Crim. P.  Federal law enforcement officer requests warrant from magistrate - usually with sworn affidavit that sets forth supporting grounds: magistrate must find probable cause.  Once the warrant is issued, the magistrate judge’s determination is reviewed only with “great deference.”  Not de novo: just whether there is substantial evidence to support decision – not “rubber stamp.”
  • 31. Search Warrants Ground Rules  Search warrant can be completely based upon hearsay evidence.  Company does not even have to be a “Target” to be searched.  Search must occur within 14 days of the warrant being issued.  Warrant shall be served In the daytime, (6AM - 10PM) unless other times are specifically requested and authorized. Rule 41(a)(2)(B).
  • 32. Franks Hearing Defendant has right to challengeveracity of sworn statement used by policeto obtain search warrant To obtain, movant must show:  False statement or omission in aff.  And offending info essential toprobable cause determination.**Knowing omission of informationless likely to defeat probable cause than knowing inclusion, because not all exculpatory information needs to be included in an affidavit.Preserve your record – lodge objections and don’t consent to the search (even partial search)!Franks v. Delaware, 438 U.S. 154 (1978).
  • 33. Search Warrants (cont’d.) Government has legal leverage during execution ofsearch. Number of agents varies (2-50) No need for company or employees to display“cowboy” mentality: Be professional & courteous
  • 34. Search Warrants (Cont’d) Best Advice:Advance planning &organized response Establish internal procedures & search responseplan
  • 35. Advance Planning: Overall Goals  Improve “crisis” management:1) Demystify “searches”2) Prepare company representatives  Protect legal interests of company and personnel  Respond appropriately & legally --Not doing whatever the government requests  Convey “good corporate” image  Be prepared to respond to press.  Not “no comment”  Emphasize a few key points only.  More on this later
  • 36. Overall Goals (Cont’d) Get the government what it is entitledto take or review as quickly as possible --- and get the agents out. Minimize disruptive impact of searchto ongoing business operations
  • 37. Action Steps During Search  Request agents’ credentials & copy of the warrant (and supporting affidavit - if unsealed)  Provide agents with company memorandum re: search  Request meeting with agents to discuss waysto minimize disruption with ongoingoperations (floor plans, organizationalcharts, etc.).
  • 38. Company Search Memo  Company’s memorandum re: search should state that company:1) Objects & does not consent to search;2) BUT - Is willing to cooperate;3) Is represented by counsel;4) Requests opportunity to confer withcounsel prior to search; and5) Requests all inquiries during searchbe directed to company searchcoordinators, ideally counsel only - not employees.
  • 39. Action Steps During Search Carefully review warrant for:1) accuracy of information;2) particularity of search limits; and3) nature of alleged violations Typical “Defects:”1) Name of company;2) Facility address;3) Beyond deadline.
  • 40. Action Steps During Search  Pay close attention to scope of warrant -- i.e., “places to be searched and items to be seized.”  Limit search to those areas specifically designated in warrant.  Do not consent to or allow agents to exceed limits and conduct an “expanded” search.
  • 41. Actions Steps During Search  Identify legally protected/privileged files ** If dispute arises - segregate & submit to magistrate “in camera.”  Accompany agents & carefully monitor and record all aspects of search. (i.e., conduct, statements, questions, requests, attitude).  If agents Refuse to allow company to accompany them -- seek order from magistrate.
  • 42. Search Warrant (Cont’d)  In general, a search warrant is NOT a license to conduct employee interviews  Rule 41(c) Limits a Search Warrant to:1. evidence of a crime;2. contraband, the fruits of crime, or things otherwise criminally possessed;3. property designed for use, intended for use, or used in committing a crime; or4. a person to be arrested.
  • 43. Handling EmployeesDuring Search:  Alert employees that search is occurring (by e-mail or memo);  Instruct employees to direct all questions from agents to company’s search coordinator or legal counsel;  Provide employees with an overview of their rights (gov’t usually does not);  Avoid even appearance of obstruction;  Instruct employees to refer all media questions to designated individual.
  • 44. Employee’s Rights DuringSearch: Employees are under no legal obligation to talk to theagents - their choice; Employees have a right to consult with an attorney; Company will provide counsel (if applicable)
  • 45. Employee’s Rights During Search(Cont’d) In many circumstances, employees should be senthome (after being advised of their rights) Where employees consent to be interviewed, try to bepresent during the interview and take detailed notes onboth: 1) Questions asked; and 2) Answers given.
  • 46. After the Smoke Clears:Information is powerGather all facts surrounding the allegations/investigationThe good, the bad, and the ugly
  • 47. Post-Search: Info to Obtain  Request copy of search receipt / inventory (list of items taken). See Rule 41(f)(3).  Request copies of all items seized.  If Request is refused – file motion to get it.  Obtain copy of “return” filed with court.  Warrant & copy of inventory returned to magistrate. Rule 41(f)(4).
  • 48. Post Search: Unlawful Search and Seizure If search was unlawful, option to file a motion forproperty’s return. Filed in district where property seized. Court required to receive factual evidence. See Rule 41(g). Alternately, may move to suppress. Rules 41(h) and 12.  Precludes use of documents from search at trial if granted.
  • 49. Post-Search: Debriefing Immediately and thoroughly debrief all employeeswho consented to interview (if you were notpresent) Important insight into basis for investigation &positions you to better anticipate allegations Summarize all interviews into writtenmemoranda.
  • 50. Post Search: Dealing With the Media  Only counsel should talk to media, with rare exceptions.  “No comment” usually plays as “we’re guilty!”  Since the search will attract media, prepare your brief remarks carefully.1) Preliminary nature of investigation;2) Company’s willingness to cooperate;3) Company’s own efforts to investigate and gather reliable facts; and4) Other positive/accurate aspects of company  Beyond this, the less said the better. Minimize statements that press or authorities can latercharacterize as inconsistent with facts.
  • 51. Post-Search: Call to Prosecutor Counsel Must Initiate Communicationwith Federal Prosecutor to gatheradditional information (i.e., nature ofinvestigation; targets, etc.). Goal of call is to foster similar dialogueregarding similar issues to call insubpoena response context.
  • 52. Post-Search: Internal Investigation?Most Important Task: Assess need to conduct privileged internalinvestigation: 1) Interviews 2) Document Review & Summary
  • 53. Contact me for further information& materials.Will Terpening(704) 787-3091 (mobile)
    Please download to view
  • All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
    ...

    Responding to Grand Jury: Subpoenas & Search Warrants

    by nexsen-pruet

    on

    Report

    Category:

    Business

    Download: 0

    Comment: 0

    2,222

    views

    Comments

    Description

    Download Responding to Grand Jury: Subpoenas & Search Warrants

    Transcript

    • 1. William R. Terpeningv.1.0
  • 2. •Not addressing civil subpoenas – many distinctions.•Different from subpoena to testify at trial.•Can be used for both testimony and documents.•Focus on documents: scenario corporate counsel willencounter most frequently.•Preparing a written subpoena response plan with inputfrom outside counsel and management now will minimizemistakes, expenses, and negative publicity later.
  • 3. Intro: Purpose of the Subpoena Secure documents and physical evidence.  duces tecum.  “A subpoena may order the witness to produce any books, papers, documents, data, or other objects the subpoena designates.” Fed. R. Crim. P. 17(c)(1). Not only documents.  Handwriting and voice exemplars.  Hair samples. And secure testimony.  ad testificandum. Fed. R. Crim. P. 17(a). Broader than civil equivalent.  Can be served “at any place within the United States” – less option to quash for procedural/ venue problems.  Fed. R. Crim. P. 17(e)(1).
  • 4. Some Differences from Civil Subpoenas. Fed. R. Crim. P. 17 vs. Fed. R. Civ. P. 45. Not totally unfettered, but permissibly broader. Can require production of all witnesses and non-privileged evidence, as long as not unduly burdensome. No probable cause showing necessary (compare withsearch warrants). Presumption of regularity. Once supported by court order, strong contempt aspect. Obstruction consequences vs. contempt.  Civil v. criminal contempt.
  • 5. More Differences from Civil Subpoenas Relevance usually not as strong of a basis for refusing tocomply – more leeway for investigation. Reasonableness review highly deferential to government. Fear of third party retaliation no basis for non-compliance. Original documents. Service and witness travel nationally, not just within or nearissuing district. Inability of civil courts to compel non-parties to travel to testify – 100mile rule. Travel limits for depositions. No protections for trade secrets, etc., articulated in Fed. R.Civ. P. 45.
  • 6. Your Initial Subpoena Review When you receive the subpoena, whether focused ondocuments or testimony, develop an action plan. Subpoena must include all essential complianceinformation: Information about court name and proceeding. Time and place witness is to appear or documentsshould be produced. What the recipient is supposed to do. See Fed. R. Crim. P. 17(a) and (c). If for documents, will have a detailed attachment similar to a civil set of document requests.
  • 7. Note on: Subpoena AdTestificandum Initial questions unique to those subpoenas thatseek testimony: Whose testimony is sought? Employee? Executive management? Need for separate representation? Employee with conflict Fact witness
  • 8. Obligations of Targets & Subjects “Target” = person who is linked by substantialevidence to commission of crime and who, inprosecutor’s judgment, is a possible defendant. “Subject” = person whose conduct falls withininvestigation’s scope. Vs. “witness”. To avoid unfairness and confusion stemming fromtestimony of targets and subjects who do not knowtheir status, DOJ has policies advising of FifthAmendment rights/ requesting voluntary appearance.
  • 9. Focus: DocumentsThe Subpoena Duces Tecum Initial review of subpoena to determine scope  Date range  Type of documents  Cost/feasibility of compliance  Deadline? Review for indications of allegations/potential crimes Determine whether grounds to challenge. Start considering whether compliance is better strategicoption, even where challenge grounds exist.
  • 10. Subpoena Duces Tecum Caution: penalties for improper response.  Avoid “game-playing” that is prevalent in some civil discovery. Contact experienced counsel Immediately suspend regular document destruction - even ifconsistent with document retention policies Memorialize all steps & decisions in written memorandum. Notify some employees / control group  Do not discuss the subpoena or any aspect of the investigation with all employees. Main point of presentation: you’ll be better off if you have prepared aresponse protocol before you ever receive the subpoena.
  • 11. Your Subpoena Response Plan Keep on hand in case of emergencies and refreshperiodically. Should contain: A copy of the company’s document retention policy. A contact list: key executives who need to know, go-to outsidecounsel, responsible IT person; custodian of records. Draft of memo to go to responsible employees withinstructions regarding preservation of electronic and hardcopy documents. A plan for ensuring that all versions of electronic documents,in particular, are secured. A directory of where key general categories of documents arestored and likely to be located.
  • 12. Initial Telephone Call Call prosecutor:  Discuss role of company, individuals.  Witness, subject, or target?  If for documents:  Discuss subpoena to ensure you understand requests,resolve any questions, and narrow or define scope asappropriate.  You know company and documents/subject matter better than requester, and may save both sides time and effort and create mutual goodwill/ relationship through this conversation. 
  • 13. Initial Call (Cont’d.)  If the volume of documents requested is large, use call to negotiate deadline or rolling production, which you can later memorialize in writing. Offer to keep dialogue open and avoid adversarial approach.  Ability to address production and compliance issues on phone rather than more formally will save parties’ and court’s time and resources and avert unintended obstruction problems.  Assess where documents are to be produced and whether/ when an executive will need to testify. Usually can defer until after agent review. As general counsel, offer to accept future subpoenas and requestby e-mail, informally. If you plan to retain experienced outside counsel, may wait forthem for this call if time allows.
  • 14. Motion to Quash- Rule 17(c)(2) Most Common Ground for Challenging: Unreasonable or oppressive Documents requested are privileged. Mot. quash (for unreasonable or oppressive subpoenas) nottechnically correct approach, but often handled this way. Fourth Amendment particularity requirement applies. “The right of the people to be secure in their persons, houses,papers, and effects, against unreasonable searches andseizures, shall not be violated, and no Warrants shall issue,but upon probable cause, supported by Oath or affirmation,and particularly describing the place to be searched, and thepersons or things to be seized.” 
  • 15. Motion to Quash- Rule 17(c)(2) Because of presumption of regularity, heavy burden onmovant. Explore court modification as alternative. Don’t forget negotiated narrowing and privilege decisions.
  • 16. Other common grounds for challenge. Other Limits: Abuse of subpoena process E.g., to conduct post-indictment discovery for trialwitnesses & trial prep. GJ subpoena not for obtaining civil proceedingevidence. Not to harass or intimidate. E.g., obtain a plea (but compare how USAO uses target letters). Unreasonable time span.
  • 17. Additional Challenge Grounds Statutory objections.  Prohibition on using information obtained during illegal electronic surveillance during grand jury proceeding.  Therefore, has been held that witness may object on basis that questions or requests are fruit of illegal electronic surveillance. Drug treatment records from federal facilities.  No release for subpoena without patient consent. Not to compel interviews.
  • 18. Document Search, Review & ProductionProcess Retrieve & follow the plan you already prepared. Plan & supervise & document “process” Keys: What dox are produced? What process was followed? Designate a point person to be “custodian ofrecords.” Custodian should be prepared to testify about the steps takento gather information for the subpoena
  • 19. Document Search, Review & Production Which documents are “responsive?” WHO DECIDES (versusyou or client)? Which responsive documents are privileged? WHO DECIDES(versus you or client)?  Create a decision log and a privilege log – class familiarity with these? “Bates-stamp” and keep copy of all that is produced.  Note, you generally will produce originals, unlike in civil litigation. Types of Privileges:  Attorney Client / Work Product  5th Amendment
  • 20. Privileged Documents Avoid inadvertent waivers of attorney-client privilege.  Ensure cover letter for production has a “claw-back” stipulation.  Discuss specific close situations with prosecutor & negotiate for an e-mail confirming that production of specific types of documents will not constitute waiver. Certain disclosures can be viewed as corporateadmissions that may negate need for gvt toindependently work to prove elements. Does the benefit of cooperation outweigh the risk ofdisclosure?
  • 21. Attorney-Client PrivilegeProtects confidential communications between clientseeking legal advice and his attorney.Can be waived: (i) By corporate management (ii) By disclosure outside of a privileged relationship. (a) Includes voluntary disclosure to third party. (b) Includes disclosure at the request of a government agency. (c) Includes inadvertent disclosures (where reasonable precautions to prevent were not taken).
  • 22. Work Product DoctrineProtects documents prepared for trial or “inanticipation of litigation .”Can also be waived by voluntary disclosure.How is the work product doctrine different from attorney- client privilege?
  • 23. Confidentiality In general, grand jury cloak of secrecy does not gagwitnesses and parties producing documents. Exceptions: Bank records & subpoenas to financial institutions. Telephone records. In general, of course, companies will want to remainrelatively silent for PR reasons and to avoid appearanceof interfering with process. Simple statements regarding fact of compliance willsuffice.
  • 24. Expenses of Compliance Generally government need not reimburse for costs ofcomplying with subpoena duces tecum. However, remember that showing of financial burdencan be part of the reasonableness or burdensomenessanalysis upon a motion to quash. A court may exercise its Rule 17(c) power and modifysubpoena to make government bear costs ofcompliance. As well, some narrow statutory situations where costsborne by government. Banks.
  • 25. •As with subpoena response, plan now.•Particularly important because there is typically less lead timethan for subpoena response.•FBI and others may appear unexpectedly.•Our analysis focuses on federal procedure, not state procedure. • Substantially similar, but differences may exist.
  • 26. Search Warrant Response  Increasing reliance on search warrants as a tool in business crimes – even for documents that a subpoena could cover. Government’s key advantage: SURPRISE & CONTROL “Focus of government’s search =Not just documentsbut all “instrumentalities of crime”
  • 27. Warrant versus Consent Recent trend: agents appear without warrant and requestdocuments and consent waiver. Pros: Ability to work with agents to narrow and define scope.  Physical scope and subject matter scope. Goodwill. Agents quickly in and out. Cons: No need for government to make showings that are in place toprotect you.  E.g., probable cause showing for magistrate. Easier path to potentially incriminating documents. Don’t consent without a private meeting with client todetermine and advise about risks/ what gvt. is likely to find.
  • 28. Search Warrants Background All searches and seizures are governed by theFourth Amendment’s:1) Prohibition against unreasonable searches and seizures; and2) Requirement the warrants to conduct searches besupported by “probable cause.”
  • 29. Search Warrant Background(Cont’d) “Probable Cause” =- “A fair probability that contraband or evidence of acrime will be found in a particular place.” - A “fluid concept” that is not easily translated into“a neat set of rules,” but rather turns on the “totality ofthe circumstances.” - See Illinois v. Gates, 462 U.S. 213, 238 (1983).
  • 30. Obtaining the Search Warrant Process for Obtaining Warrant:  Rule 41 - Fed. R. Crim. P.  Federal law enforcement officer requests warrant from magistrate - usually with sworn affidavit that sets forth supporting grounds: magistrate must find probable cause.  Once the warrant is issued, the magistrate judge’s determination is reviewed only with “great deference.”  Not de novo: just whether there is substantial evidence to support decision – not “rubber stamp.”
  • 31. Search Warrants Ground Rules  Search warrant can be completely based upon hearsay evidence.  Company does not even have to be a “Target” to be searched.  Search must occur within 14 days of the warrant being issued.  Warrant shall be served In the daytime, (6AM - 10PM) unless other times are specifically requested and authorized. Rule 41(a)(2)(B).
  • 32. Franks Hearing Defendant has right to challengeveracity of sworn statement used by policeto obtain search warrant To obtain, movant must show:  False statement or omission in aff.  And offending info essential toprobable cause determination.**Knowing omission of informationless likely to defeat probable cause than knowing inclusion, because not all exculpatory information needs to be included in an affidavit.Preserve your record – lodge objections and don’t consent to the search (even partial search)!Franks v. Delaware, 438 U.S. 154 (1978).
  • 33. Search Warrants (cont’d.) Government has legal leverage during execution ofsearch. Number of agents varies (2-50) No need for company or employees to display“cowboy” mentality: Be professional & courteous
  • 34. Search Warrants (Cont’d) Best Advice:Advance planning &organized response Establish internal procedures & search responseplan
  • 35. Advance Planning: Overall Goals  Improve “crisis” management:1) Demystify “searches”2) Prepare company representatives  Protect legal interests of company and personnel  Respond appropriately & legally --Not doing whatever the government requests  Convey “good corporate” image  Be prepared to respond to press.  Not “no comment”  Emphasize a few key points only.  More on this later
  • 36. Overall Goals (Cont’d) Get the government what it is entitledto take or review as quickly as possible --- and get the agents out. Minimize disruptive impact of searchto ongoing business operations
  • 37. Action Steps During Search  Request agents’ credentials & copy of the warrant (and supporting affidavit - if unsealed)  Provide agents with company memorandum re: search  Request meeting with agents to discuss waysto minimize disruption with ongoingoperations (floor plans, organizationalcharts, etc.).
  • 38. Company Search Memo  Company’s memorandum re: search should state that company:1) Objects & does not consent to search;2) BUT - Is willing to cooperate;3) Is represented by counsel;4) Requests opportunity to confer withcounsel prior to search; and5) Requests all inquiries during searchbe directed to company searchcoordinators, ideally counsel only - not employees.
  • 39. Action Steps During Search Carefully review warrant for:1) accuracy of information;2) particularity of search limits; and3) nature of alleged violations Typical “Defects:”1) Name of company;2) Facility address;3) Beyond deadline.
  • 40. Action Steps During Search  Pay close attention to scope of warrant -- i.e., “places to be searched and items to be seized.”  Limit search to those areas specifically designated in warrant.  Do not consent to or allow agents to exceed limits and conduct an “expanded” search.
  • 41. Actions Steps During Search  Identify legally protected/privileged files ** If dispute arises - segregate & submit to magistrate “in camera.”  Accompany agents & carefully monitor and record all aspects of search. (i.e., conduct, statements, questions, requests, attitude).  If agents Refuse to allow company to accompany them -- seek order from magistrate.
  • 42. Search Warrant (Cont’d)  In general, a search warrant is NOT a license to conduct employee interviews  Rule 41(c) Limits a Search Warrant to:1. evidence of a crime;2. contraband, the fruits of crime, or things otherwise criminally possessed;3. property designed for use, intended for use, or used in committing a crime; or4. a person to be arrested.
  • 43. Handling EmployeesDuring Search:  Alert employees that search is occurring (by e-mail or memo);  Instruct employees to direct all questions from agents to company’s search coordinator or legal counsel;  Provide employees with an overview of their rights (gov’t usually does not);  Avoid even appearance of obstruction;  Instruct employees to refer all media questions to designated individual.
  • 44. Employee’s Rights DuringSearch: Employees are under no legal obligation to talk to theagents - their choice; Employees have a right to consult with an attorney; Company will provide counsel (if applicable)
  • 45. Employee’s Rights During Search(Cont’d) In many circumstances, employees should be senthome (after being advised of their rights) Where employees consent to be interviewed, try to bepresent during the interview and take detailed notes onboth: 1) Questions asked; and 2) Answers given.
  • 46. After the Smoke Clears:Information is powerGather all facts surrounding the allegations/investigationThe good, the bad, and the ugly
  • 47. Post-Search: Info to Obtain  Request copy of search receipt / inventory (list of items taken). See Rule 41(f)(3).  Request copies of all items seized.  If Request is refused – file motion to get it.  Obtain copy of “return” filed with court.  Warrant & copy of inventory returned to magistrate. Rule 41(f)(4).
  • 48. Post Search: Unlawful Search and Seizure If search was unlawful, option to file a motion forproperty’s return. Filed in district where property seized. Court required to receive factual evidence. See Rule 41(g). Alternately, may move to suppress. Rules 41(h) and 12.  Precludes use of documents from search at trial if granted.
  • 49. Post-Search: Debriefing Immediately and thoroughly debrief all employeeswho consented to interview (if you were notpresent) Important insight into basis for investigation &positions you to better anticipate allegations Summarize all interviews into writtenmemoranda.
  • 50. Post Search: Dealing With the Media  Only counsel should talk to media, with rare exceptions.  “No comment” usually plays as “we’re guilty!”  Since the search will attract media, prepare your brief remarks carefully.1) Preliminary nature of investigation;2) Company’s willingness to cooperate;3) Company’s own efforts to investigate and gather reliable facts; and4) Other positive/accurate aspects of company  Beyond this, the less said the better. Minimize statements that press or authorities can latercharacterize as inconsistent with facts.
  • 51. Post-Search: Call to Prosecutor Counsel Must Initiate Communicationwith Federal Prosecutor to gatheradditional information (i.e., nature ofinvestigation; targets, etc.). Goal of call is to foster similar dialogueregarding similar issues to call insubpoena response context.
  • 52. Post-Search: Internal Investigation?Most Important Task: Assess need to conduct privileged internalinvestigation: 1) Interviews 2) Document Review & Summary
  • 53. Contact me for further information& materials.Will Terpening(704) 787-3091 (mobile)
  • Fly UP