Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Is Your e-Discovery Provider Asking The Right Questions?

By D. Douglas Austin
July 01, 2004

As most attorneys practicing in these days of high-tech tools and media-savvy clients know, electronic discovery can be a complex process, even for the experienced practitioner ' an undertaking fraught with variables, each of which singly, and certainly in legion, could change demands and expectations. Those changes, when they occur ' and it's invariably a matter of when, not if ' can confound parties to the e-discovery process, particularly when important information is missing.

In fact, the e-discovery process has become so complex that litigators often rely heavily on their e-discovery provider to add to hands-on legal expertise and to ensure that discovery is performed with diligence, ease and effectiveness.

One keystone in this process of building a strong and winning e-discovery process is good communication between a client and service provider, which acts as the cement that holds working relationships together. It is the first basic requirement in ensuring a partnership of discovery success.

What Providers Can Do

As is often the case, the best way to understand the importance of a component in a process, whether the process or its elements are simple or complex, is to consider the consequences of that component's absence. In the case of e-discovery, miscommunication that might occur between an e-discovery provider and client can cause problems ranging from additional expense to collect and process electronic files properly to sanctions for failing to produce all relevant materials. In a worst-case scenario, counsel and others could face criminal penalties for spoliation of evidence that a court determines was caused by avoidable delays and poor communication among parties.

With so much at stake, there's no likely way to overstress the importance of e-discovery providers seizing initiative to determine client needs by taking on the role of litigator and asking questions. Qualified e-discovery providers are the best experts to help counsel determine a winning course of action for complete and accurate electronic production that meets litigation goals. Indeed, just as a doctor knows the questions to ask a patient to make a proper diagnosis, an e-discovery provider who is doing his or her job knows which questions to ask to ensure that the discovery process involving electronic files is handled properly.

The Course of Critical Inquiry: Do It Correctly

Questions a provider might ask can vary considerably, depending on case requirements and characteristics of the electronic collection. However, there are some typical characteristics of any e-discovery situation. The following questions cover issues to address in e-discovery, and can serve as a guide to counsel in working with e-discovery service providers. In those instances when a provider doesn't ask some of these questions, counsel can pose them ' or other salient queries ' to ensure discovery of common ground, and to start off together on the path to successful litigation.

1. What criteria are being used to determine which electronic documents to collect?

Whether or not the e-discovery provider is responsible for document collection, it's important for the provider to understand the collection criteria. For instance, does the scope of production include documents stored on back-up tapes or other archival media? If so, then it will likely affect the number of files the provider must process. Also, because backups are often incremental, and so include many of the same files in each backup, deduplication of files (ie, removal of duplicate files) will likely be required to avoid producing numerous copies of the same file. It is important, too, that the e-discovery provider understand the collection criteria up front to reduce the need for costly repetition of work later.

And it's important for the e-discovery provider to understand whether there is a document-retention policy in place that includes electronic files. If properly enforced, such a policy can provide considerable guidance for satisfying production requests. Electronic files outside the retention-policy time frame, for instance, will generally no longer exist to be produced. Destruction of electronic files outside the retention policy generally does not constitute destruction of evidence in the eyes of the court.

But it's also important for the provider to understand whether any steps have been taken to alter document-retention procedures upon notification or knowledge of impending legal action to preserve potentially relevant information ' so don't destroy electronic files that may be relevant to the legal action at hand or that will soon be at hand. Keep in mind that a major issue during the Enron investigation was the shredding of hard-copy documents, which created controversy over contentions that the shredding was being performed in accordance with retention policies. Shredding hard-copy documents to comply with retention policies could lead opposing counsel to level spoliation claims. The same applies to electronic file deletion ' if it could be assumed that the producing party should have known these files were potentially relevant. Failure to take steps to preserve electronic data in the face of pending legal action can expose litigators to sanctions later on.

The e-discovery provider should also be able to identify and address issues associated with document collection, and not merely with converting documents received. e-Discovery providers should know the relevant issues involved and steps to take that will help ensure appropriate documents are included in discovery. This knowledge includes understanding data-collection criteria and how those criteria pertain to preservation and production.

2. What time frames, organizations and people are to be included in production?

Regardless of whether the provider is responsible for collection, the provider's personnel must understand production scope and the filtering criteria used for processing data. Not understanding production scope could cause inadvertent production of irrelevant information, or withholding of relevant information, which could have dire consequences. Identifying the time frames involved, and individuals whose files should be included in production, will often set the extent of the collection process. For example, a requirement to include terminated employees' files in the collection process will often require collection from back-up media, because those files are generally no longer available on active media.

3. Has electronic document collection begun?

The e-discovery provider should ask about e-file collection status and requirements for documenting file chain of custody. The provider must know where the information is coming from in order to preserve and manage documentation for the chain of custody from that point. Also, taking affidavits from the source individuals who provide electronic documents can support the validity of the custody chain and help avoid spoliation claims. To help ensure a smooth process then, the e-discovery provider should have a standard policy to preserve file chain of custody, or be able to support an existing policy.

4. In which format (ie, native files, TIFF/PDF or paper) will files be used for production?

Providers should be able to provide guidance regarding benefits and issues associated with producing documents in each format. Some format guidance follows.

Native Files

Points to consider regarding native files include:

  • How should the files be Bates labeled? Applying Bates labels to a variety of e-file formats (some of which don't easily render pages of information) is difficult. An alternative numbering method (at the file level) might be necessary.
  • Native files can contain viruses, but removal of viruses can be interpreted as spoliation ' so be careful; there are no standards concerning what to do about viruses.
  • Removal or redaction of privileged information can be more difficult for native files, and changes the file properties, such as modified date, which could be interpreted as spoliation.

TIFF/PDF or Paper

Considerations for these formats are:

  • How should files that don't provide useful printouts be handled? Executable files, system files and databases are examples of these.
  • Spreadsheets are often not formatted for printing and can be time-consuming and costly to produce.
  • Excluding hidden text or metadata ' or both ' when converting to image could be considered spoliation.
  • Production to paper includes all of these issues, plus additional time and expense compared to delivering images on CD.
  • Sometimes, a combined approach that includes native- and image-file formats is appropriate. Converting files to image that are naturally formatted for printing (eg, e-mails, word-processing files) makes Bates labeling and redacting those files easier. Producing spreadsheets and databases in their native format can eliminate significant costs associated with converting those files, but maintain responsiveness to production requests.

5. What are the criteria that define a duplicate?

Interpretations of what a duplicate is can vary widely, depending on discovery requirements. Sometimes, duplicates are identified solely on the physical content of a file, but they also can be identified based on the file source (just like hard-copy documents).

Several different data elements can be used to determine which files are duplicates, including: industry standard file fingerprints (including the MD5HASH value, which is a unique number generated by an algorithm applied to file content); global unique identifier (GUID) for Microsoft Office files; or a combination of fields (eg, date received or sent ' or both ' and subject, author or other fields, if desired etc.).

Versatility is also important for supporting deduplication requirements. Not only should an e-discovery provider be able to support multiple alternatives for eliminating or otherwise excluding duplicate files, but the provider should also be able to provide an audit trail of the files that were eliminated during deduplication.

6. How should e-mails and attachments be handled for discovery purposes?

A litigation-support system is generally used to review documents for relevancy and privilege. Because e-mail systems facilitate everyday business correspondence and collaboration, many of the electronic file collections requiring review are e-mail based.

e-Mails can contain one or more attachments; indeed, several e-mails can be contained in a single e-mail, each with its own attachments. Because e-mails often refer to their attachments within the body of the e-mail, opposing counsel could raise issues if the e-mail is produced without one or more of its corresponding attachments. As a result, it may be necessary to produce the e-mail and its attachments if any one of those documents is relevant.

A provider should be able to furnish appropriate guidance on supporting e-mail relevancy review, including marking an entire e-mail as relevant when any of its components is relevant. The provider should also be able to recommend a litigation-support system for relevancy review that will be able to support this function.

(For more on litigation response as an element of business process, see “The Litigation Balancing Act ' Measuring Soft And Hard Costs, And Meeting Demands In the Digital Age” in the May edition of e-Discovery Law & Strategy.)

7. Should relevancy review or automated filtering of documents ' or both ' be performed before conversion of documents to image or paper?

Yes, because native-file relevancy review can often save significant time and conversion costs. Typically, a small percentage of electronic files (especially in e-mail collections) is relevant to a case ' often 20% or less. Initial review enables a litigator to eliminate costs of converting the large number of files that are not relevant. But it can be more difficult to manage review of diverse file types than to manage a converted collection of TIFF or PDF files. Also, if the electronic file collection pertains to multiple cases with different issues, then it might be advantageous to convert most or all files to support all of the cases.

On the other hand, automated filtering by using search terms to identify relevant files can present problems. Some of the problems that can occur include:

  • Search-term lists can miss abbreviations or misspellings of the terms.
  • Text searches are not always complete, because TIFFs and image-only PDFs contain no searchable text and require optical character recognition (OCR) to generate searchable text. Other file formats often contain embedded graphics (such as charts with text) that are also not fully searchable. Locating these documents to perform OCR can be difficult and consume significant blocs of time.
  • Search-term collections that are overly broad can result in retrieval of a large number of documents that require review, many of which turn out to be nonresponsive.

Consider this: When using search-term lists for automated filtering, a list negotiated with opposing counsel is the safest bet. Sometimes, a combination approach is best ' use a narrowly defined list of terms to identify initial documents for conversion, and then manually review the rest for relevancy. The e-discovery provider should be able to address the pros and cons of each approach, recommend the best approach, and support review and automated filtering prior to conversion.

Editor's note: For more questions an e-discovery service provider should ask, go to Part 2. The rest of the questions will also appear in the August print edition. Stay tuned, and check your incoming regular mail.



www.iediscovery.com.

As most attorneys practicing in these days of high-tech tools and media-savvy clients know, electronic discovery can be a complex process, even for the experienced practitioner ' an undertaking fraught with variables, each of which singly, and certainly in legion, could change demands and expectations. Those changes, when they occur ' and it's invariably a matter of when, not if ' can confound parties to the e-discovery process, particularly when important information is missing.

In fact, the e-discovery process has become so complex that litigators often rely heavily on their e-discovery provider to add to hands-on legal expertise and to ensure that discovery is performed with diligence, ease and effectiveness.

One keystone in this process of building a strong and winning e-discovery process is good communication between a client and service provider, which acts as the cement that holds working relationships together. It is the first basic requirement in ensuring a partnership of discovery success.

What Providers Can Do

As is often the case, the best way to understand the importance of a component in a process, whether the process or its elements are simple or complex, is to consider the consequences of that component's absence. In the case of e-discovery, miscommunication that might occur between an e-discovery provider and client can cause problems ranging from additional expense to collect and process electronic files properly to sanctions for failing to produce all relevant materials. In a worst-case scenario, counsel and others could face criminal penalties for spoliation of evidence that a court determines was caused by avoidable delays and poor communication among parties.

With so much at stake, there's no likely way to overstress the importance of e-discovery providers seizing initiative to determine client needs by taking on the role of litigator and asking questions. Qualified e-discovery providers are the best experts to help counsel determine a winning course of action for complete and accurate electronic production that meets litigation goals. Indeed, just as a doctor knows the questions to ask a patient to make a proper diagnosis, an e-discovery provider who is doing his or her job knows which questions to ask to ensure that the discovery process involving electronic files is handled properly.

The Course of Critical Inquiry: Do It Correctly

Questions a provider might ask can vary considerably, depending on case requirements and characteristics of the electronic collection. However, there are some typical characteristics of any e-discovery situation. The following questions cover issues to address in e-discovery, and can serve as a guide to counsel in working with e-discovery service providers. In those instances when a provider doesn't ask some of these questions, counsel can pose them ' or other salient queries ' to ensure discovery of common ground, and to start off together on the path to successful litigation.

1. What criteria are being used to determine which electronic documents to collect?

Whether or not the e-discovery provider is responsible for document collection, it's important for the provider to understand the collection criteria. For instance, does the scope of production include documents stored on back-up tapes or other archival media? If so, then it will likely affect the number of files the provider must process. Also, because backups are often incremental, and so include many of the same files in each backup, deduplication of files (ie, removal of duplicate files) will likely be required to avoid producing numerous copies of the same file. It is important, too, that the e-discovery provider understand the collection criteria up front to reduce the need for costly repetition of work later.

And it's important for the e-discovery provider to understand whether there is a document-retention policy in place that includes electronic files. If properly enforced, such a policy can provide considerable guidance for satisfying production requests. Electronic files outside the retention-policy time frame, for instance, will generally no longer exist to be produced. Destruction of electronic files outside the retention policy generally does not constitute destruction of evidence in the eyes of the court.

But it's also important for the provider to understand whether any steps have been taken to alter document-retention procedures upon notification or knowledge of impending legal action to preserve potentially relevant information ' so don't destroy electronic files that may be relevant to the legal action at hand or that will soon be at hand. Keep in mind that a major issue during the Enron investigation was the shredding of hard-copy documents, which created controversy over contentions that the shredding was being performed in accordance with retention policies. Shredding hard-copy documents to comply with retention policies could lead opposing counsel to level spoliation claims. The same applies to electronic file deletion ' if it could be assumed that the producing party should have known these files were potentially relevant. Failure to take steps to preserve electronic data in the face of pending legal action can expose litigators to sanctions later on.

The e-discovery provider should also be able to identify and address issues associated with document collection, and not merely with converting documents received. e-Discovery providers should know the relevant issues involved and steps to take that will help ensure appropriate documents are included in discovery. This knowledge includes understanding data-collection criteria and how those criteria pertain to preservation and production.

2. What time frames, organizations and people are to be included in production?

Regardless of whether the provider is responsible for collection, the provider's personnel must understand production scope and the filtering criteria used for processing data. Not understanding production scope could cause inadvertent production of irrelevant information, or withholding of relevant information, which could have dire consequences. Identifying the time frames involved, and individuals whose files should be included in production, will often set the extent of the collection process. For example, a requirement to include terminated employees' files in the collection process will often require collection from back-up media, because those files are generally no longer available on active media.

3. Has electronic document collection begun?

The e-discovery provider should ask about e-file collection status and requirements for documenting file chain of custody. The provider must know where the information is coming from in order to preserve and manage documentation for the chain of custody from that point. Also, taking affidavits from the source individuals who provide electronic documents can support the validity of the custody chain and help avoid spoliation claims. To help ensure a smooth process then, the e-discovery provider should have a standard policy to preserve file chain of custody, or be able to support an existing policy.

4. In which format (ie, native files, TIFF/PDF or paper) will files be used for production?

Providers should be able to provide guidance regarding benefits and issues associated with producing documents in each format. Some format guidance follows.

Native Files

Points to consider regarding native files include:

  • How should the files be Bates labeled? Applying Bates labels to a variety of e-file formats (some of which don't easily render pages of information) is difficult. An alternative numbering method (at the file level) might be necessary.
  • Native files can contain viruses, but removal of viruses can be interpreted as spoliation ' so be careful; there are no standards concerning what to do about viruses.
  • Removal or redaction of privileged information can be more difficult for native files, and changes the file properties, such as modified date, which could be interpreted as spoliation.

TIFF/PDF or Paper

Considerations for these formats are:

  • How should files that don't provide useful printouts be handled? Executable files, system files and databases are examples of these.
  • Spreadsheets are often not formatted for printing and can be time-consuming and costly to produce.
  • Excluding hidden text or metadata ' or both ' when converting to image could be considered spoliation.
  • Production to paper includes all of these issues, plus additional time and expense compared to delivering images on CD.
  • Sometimes, a combined approach that includes native- and image-file formats is appropriate. Converting files to image that are naturally formatted for printing (eg, e-mails, word-processing files) makes Bates labeling and redacting those files easier. Producing spreadsheets and databases in their native format can eliminate significant costs associated with converting those files, but maintain responsiveness to production requests.

5. What are the criteria that define a duplicate?

Interpretations of what a duplicate is can vary widely, depending on discovery requirements. Sometimes, duplicates are identified solely on the physical content of a file, but they also can be identified based on the file source (just like hard-copy documents).

Several different data elements can be used to determine which files are duplicates, including: industry standard file fingerprints (including the MD5HASH value, which is a unique number generated by an algorithm applied to file content); global unique identifier (GUID) for Microsoft Office files; or a combination of fields (eg, date received or sent ' or both ' and subject, author or other fields, if desired etc.).

Versatility is also important for supporting deduplication requirements. Not only should an e-discovery provider be able to support multiple alternatives for eliminating or otherwise excluding duplicate files, but the provider should also be able to provide an audit trail of the files that were eliminated during deduplication.

6. How should e-mails and attachments be handled for discovery purposes?

A litigation-support system is generally used to review documents for relevancy and privilege. Because e-mail systems facilitate everyday business correspondence and collaboration, many of the electronic file collections requiring review are e-mail based.

e-Mails can contain one or more attachments; indeed, several e-mails can be contained in a single e-mail, each with its own attachments. Because e-mails often refer to their attachments within the body of the e-mail, opposing counsel could raise issues if the e-mail is produced without one or more of its corresponding attachments. As a result, it may be necessary to produce the e-mail and its attachments if any one of those documents is relevant.

A provider should be able to furnish appropriate guidance on supporting e-mail relevancy review, including marking an entire e-mail as relevant when any of its components is relevant. The provider should also be able to recommend a litigation-support system for relevancy review that will be able to support this function.

(For more on litigation response as an element of business process, see “The Litigation Balancing Act ' Measuring Soft And Hard Costs, And Meeting Demands In the Digital Age” in the May edition of e-Discovery Law & Strategy.)

7. Should relevancy review or automated filtering of documents ' or both ' be performed before conversion of documents to image or paper?

Yes, because native-file relevancy review can often save significant time and conversion costs. Typically, a small percentage of electronic files (especially in e-mail collections) is relevant to a case ' often 20% or less. Initial review enables a litigator to eliminate costs of converting the large number of files that are not relevant. But it can be more difficult to manage review of diverse file types than to manage a converted collection of TIFF or PDF files. Also, if the electronic file collection pertains to multiple cases with different issues, then it might be advantageous to convert most or all files to support all of the cases.

On the other hand, automated filtering by using search terms to identify relevant files can present problems. Some of the problems that can occur include:

  • Search-term lists can miss abbreviations or misspellings of the terms.
  • Text searches are not always complete, because TIFFs and image-only PDFs contain no searchable text and require optical character recognition (OCR) to generate searchable text. Other file formats often contain embedded graphics (such as charts with text) that are also not fully searchable. Locating these documents to perform OCR can be difficult and consume significant blocs of time.
  • Search-term collections that are overly broad can result in retrieval of a large number of documents that require review, many of which turn out to be nonresponsive.

Consider this: When using search-term lists for automated filtering, a list negotiated with opposing counsel is the safest bet. Sometimes, a combination approach is best ' use a narrowly defined list of terms to identify initial documents for conversion, and then manually review the rest for relevancy. The e-discovery provider should be able to address the pros and cons of each approach, recommend the best approach, and support review and automated filtering prior to conversion.

Editor's note: For more questions an e-discovery service provider should ask, go to Part 2. The rest of the questions will also appear in the August print edition. Stay tuned, and check your incoming regular mail.



www.iediscovery.com.

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Role and Responsibilities of Practice Group Leaders Image

Ideally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?