PST Files in eDiscovery: What Lawyers Need to Know

PST files are the most common source of email evidence in litigation and regulatory investigations. Microsoft Outlook PST archives contain years of correspondence, attachments and metadata that are frequently responsive to discovery requests. Legal hold obligations require preservation of PST files when litigation is reasonably anticipated. Forensic tools like Sherlock PST Viewer Pro ($67) provide SHA256 hash verification and chain of custody reporting for court-admissible PST analysis.

The PST Problem in Litigation

Microsoft Outlook remains the dominant email client in corporate environments. As of 2026, over 400 million users rely on Outlook for daily communication. Every one of those users potentially has PST files containing years of email history stored on local drives, network shares and backup media.

For litigators, this creates both opportunity and obligation. PST files are the richest source of email evidence available. They contain not just message content but metadata including timestamps, routing information, read receipts and attachment histories. They also contain deleted items that the user believed were gone but remain in the PST's internal structure until the file is compacted.

The obligation is preservation. When litigation is reasonably anticipated, organizations must preserve potentially relevant PST files. Failure to do so exposes the organization to spoliation sanctions that can alter the outcome of a case.

Why PST Files Are the Primary Email Evidence Source

Persistence

PST files are self-contained archives. Unlike server-based email that depends on Exchange or Microsoft 365 retention policies, PST files persist on local storage indefinitely. An employee who left the organization five years ago may have PST files on a decommissioned laptop sitting in a storage closet. Those files contain the original emails with original metadata, unaffected by any server-side retention policy.

Volume

A typical corporate user accumulates 2-5 GB of email per year. Long-tenure employees may have PST files exceeding 20 GB. A single PST file can contain 50,000 to 200,000 messages spanning a decade of correspondence. In fraud investigations and commercial disputes, this volume of historical communication is invaluable.

Metadata Richness

PST files preserve email metadata that may not survive migration to cloud platforms or export to other formats. Transport headers showing the exact routing path. Conversation threading information. Calendar entries with attendee responses. Contact records with notes. Task assignments with completion status. This metadata provides context that bare message content cannot.

Deleted Items

When a user deletes an email in Outlook, the message moves to the Deleted Items folder. When they empty the Deleted Items folder, the message is marked as deleted in the PST file's internal structure but the data remains until the file is compacted. Forensic tools can recover these soft-deleted messages. In fraud and misconduct investigations, deleted emails are frequently the most relevant.

Legal Hold Obligations for PST Files

A legal hold (litigation hold) is the obligation to preserve potentially relevant information when litigation is reasonably anticipated. This obligation arises before a lawsuit is filed. The moment an organization has reasonable notice that litigation may occur, preservation duties attach.

What Triggers a Legal Hold

Receipt of a demand letter or threat of litigation
The most obvious trigger. Any written communication threatening legal action triggers preservation obligations.
Filing or service of a complaint
If a lawsuit has been filed, preservation is mandatory.
Government investigation or regulatory inquiry
Subpoenas, civil investigative demands or regulatory inquiries trigger preservation.
Internal investigation of wrongdoing
When the organization discovers potential fraud, misconduct or policy violations that may lead to litigation or regulatory action.
Anticipation of dispute
A contract dispute, employment termination or business transaction that the organization reasonably expects will result in litigation.

Implementing a Legal Hold on PST Files

Once a legal hold is triggered, the following steps apply specifically to PST files:

  1. Identify custodians. Determine which employees have potentially relevant email. Include former employees whose PST files may be in storage.
  2. Locate PST files. Search custodian workstations, network shares, backup tapes and cloud storage for PST and OST files. Users often store PST files in non-default locations.
  3. Disable auto-archive. Outlook's auto-archive feature moves old messages to archive PST files and can delete items from the primary mailbox. Disable this for all custodians under hold.
  4. Disable retention policies. If Exchange retention policies delete messages after a set period, suspend those policies for custodians under hold.
  5. Notify custodians. Issue written legal hold notices instructing custodians not to delete, move or modify their PST files.
  6. Collect and preserve. Create forensic copies of identified PST files with SHA256 hash verification. Store on secure, write-once media.
  7. Document everything. Maintain a record of every hold notice sent, every PST file identified, every copy created and every hash value computed.

Preservation: The Technical Process

Preservation of PST files requires more than simply copying them to a folder. The copies must be forensically sound.

StepActionPurpose
1Hash the original PST (SHA256)Establish baseline integrity
2Copy to preservation storageCreate working copy
3Hash the copy (SHA256)Verify copy matches original
4Store on write-protected mediaPrevent modification
5Document chain of custodyProve preservation integrity
6Retain original in placeAvoid spoliation argument

Use Sherlock Hash or any SHA256 tool for hashing. For review and analysis, use Sherlock PST Viewer which operates in read-only mode to prevent modification during review.

Common Pitfalls That Lead to Sanctions

Pitfall 1: Relying on Server-Side Preservation Only

Organizations that preserve Exchange mailboxes but ignore local PST files risk losing evidence that exists only in the PST. Users archive messages to PST files specifically to remove them from the server mailbox. Those archived messages exist nowhere else.

Pitfall 2: Allowing Outlook to Modify PST Files

Opening a PST file in Outlook modifies it. Internal indices are updated. Timestamps change. If a preserved PST file is opened in Outlook for review, the hash will no longer match the original. Use a forensic PST viewer that operates in read-only mode.

Pitfall 3: Missing Departed Employee PST Files

When employees leave, IT may reimage their workstations without checking for PST files. If the departed employee is a custodian in pending or anticipated litigation, those PST files are now gone. Include PST file preservation in the offboarding checklist for any employee who may be a custodian.

Pitfall 4: Auto-Archive Destroying Evidence

Outlook's auto-archive feature runs on a schedule and moves old messages to archive.pst while optionally deleting them from the primary mailbox. If auto-archive runs after a legal hold is triggered but before the PST is preserved, evidence may be lost or fragmented across multiple files.

Pitfall 5: PST Files on Backup Tapes

Backup rotation policies may overwrite tapes containing PST files. When a legal hold is triggered, ensure backup tapes containing relevant PST files are pulled from rotation and preserved.

The Sherlock eDiscovery Workflow for PST Files

Sherlock Forensics uses the following workflow for PST-based eDiscovery engagements.

  1. Custodian identification. Work with counsel to identify all custodians with potentially relevant email. Include former employees.
  2. PST file mapping. Scan custodian workstations, network shares and backup media for PST and OST files. Document file paths, sizes and dates.
  3. Forensic collection. Create SHA256-verified copies of all identified PST files using write-blocking procedures. Detailed collection procedure here.
  4. Processing. Load collected PST files into Sherlock PST Viewer Pro for keyword search, date filtering and custodian-based review.
  5. Review. Identify responsive documents. Flag privileged communications. Apply agreed-upon search terms.
  6. Production. Export responsive messages with per-message SHA256 hashes. Generate production manifest and chain of custody report.
  7. Expert support. Provide expert witness testimony on collection methodology, tool operation and evidence integrity if challenged.

Cost Considerations for Law Firms

PST-based eDiscovery does not require expensive forensic suites. The Sherlock PST Viewer Pro at $67 USD provides all the forensic features needed for PST analysis: read-only access, SHA256 per-message hashing, batch export and chain of custody reporting.

For comparison:

ApproachCostForensic Grade
Sherlock PST Viewer Pro$67 USD one-timeYes
SysTools PST Viewer$299 USDNo
FTK full suite$3,000+ USD/yearYes
eDiscovery platform (Relativity)$18+ USD/GB/monthYes
Outsourced forensic collection$2,000-10,000+ per custodianYes

For firms handling PST review in-house, Sherlock PST Viewer Pro eliminates the need for expensive platforms or outsourced collection for straightforward PST analysis. For complex multi-custodian matters with terabytes of data, a full eDiscovery platform may be warranted, but the PST collection and verification phase can still be handled by Sherlock at minimal cost.

Regulatory Context

Canada

The Sedona Canada Principles Addressing Electronic Discovery provide the framework for electronic discovery in Canadian courts. Principle 3 establishes that parties should take reasonable and good faith steps to preserve potentially relevant electronically stored information. PST files fall squarely within the definition of ESI.

Under PIPEDA (Personal Information Protection and Electronic Documents Act), PST files containing personal information of third parties must be handled according to privacy obligations even during litigation. Redaction of non-responsive personal information may be required.

United States

FRCP Rules 26(b)(1) and 34 govern the scope and production of electronically stored information including PST files. Rule 37(e) addresses sanctions for failure to preserve ESI. The 2015 amendments to Rule 37(e) require courts to find prejudice before imposing curative measures and intent before imposing more severe sanctions.

State courts generally follow similar principles. California Code of Civil Procedure Section 2031.010 governs inspection demands for electronically stored information. New York CPLR Section 3101 requires disclosure of all evidence material and necessary. Texas Rule of Civil Procedure 196.4 addresses electronic discovery.

External Resources