Imagine that your competitor or a former employee steals some propriety information of your business, such as its customer list, trade secrets, or computer code. Now imagine that in the ensuing lawsuit, your business is able to obtain an instruction from the Judge directing the Jury to make an adverse inference from the fact that the thief failed to properly maintain e-mails, didn't produce them, lost, or even destroyed them.