Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
There are two unstoppable trends in e-discovery. First, corporate executives are becoming acutely aware that they are ultimately responsible for their organization's e-discovery results, which in some instances is a rude awakening since they can no longer claim ignorance or try to put the blame for any missteps on their law firms or litigation-support providers. Second, to lower costs and gain more control of the e-discovery process, enterprises are bringing certain steps of e-discovery in-house. As a result of these two trends, progressive corporations are starting to treat e-discovery as any other standard corporate business process: repeatable, defensible and measurable.
This new dynamic raises an obvious question: What portions of the e-discovery process are best suited to be “in-sourced,” and how do IT professionals within an enterprise work with their partners to ensure effective collaboration/communication?
Finding the Right Mix
This article discusses the best practices to achieve the right mix of in-house and outsourced expertise. We begin by listing a set of criteria that can be used to determine whether an in-house, outsourced or hybrid model is the right approach for a particular situation (i.e., is “in-sourcing” right for you?). From there, we analyze the various e-discovery phases as referenced in the Electronic Discovery Reference Model (“EDRM”) and provide guidelines on the right approaches for each phase.
While certainly not an exhaustive list, the following details a number of factors that should be analyzed to determine whether an in-house, outsourced or hybrid model is the right approach for your enterprise:
Once an accurate picture of the litigation/investigation profile can be compiled, it's important to take an inventory of existing e-discovery processes, tools and personnel who may work on a given task. In many instances, there will be very hard and fast distinctions between legal, IT, records management and the business units. In other (more progressive) situations, the company may have crafted a cross-functional e-discovery team that bridges the gap between all the interconnected groups.
General guidelines can be used to establish logical separations of duties while taking into account the two most important aspects of e-discovery: defensibility and cost. For example, certain tasks might be outsourced to external service providers (e.g., forensic collections and large scale, distributed review) and other critical tasks might be likely in-house candidates (e.g., early case assessment, file type culling, processing, analysis) in order to ensure the highest level of defensibility at the lowest cost. The process should be done collectively between both parties to facilitate a sense of shared cooperation while mitigating duplication efforts between teams.
Breaking Down e-Discovery
To avoid “boil the ocean” type paralysis, the best way to tease apart the various processes, people and tools is to focus on each step of the EDRM one step at a time. While the reality is that e-discovery isn't so neat or linear, there is value in isolating the discrete phases for initial simplification.
The first EDRM step (following upstream data/records management) is Identification, which is defined as “the process of learning the location of all data which you or your client may have a duty to preserve and potentially disclose in a pending or prospective legal proceeding.” Practically speaking, the main tasks here revolve around the identification of “key players” in the litigation. Once this task is complete, the next step is to map those custodians to electronically stored information (“ESI”) sources, data types, date ranges, etc., which helps facilitate meet and confer obligations as well as “inaccessibility” arguments (per Federal Rules of Civil Procedure (“FRCP”) 26(b)2(B)).
The next EDRM step is Preservation, which is defined as “ensuring that ESI is protected against inappropriate alteration or destruction.” The triggering event for preservation is often a trap for the unwary since it begins when litigation is “reasonably likely,” not necessarily at a later date when the litigation is actually filed. In order to defensibly manage this process, many organizations deploy systems to track receipt and acknowledgement of “hold” notices.
Preservation is followed by the Collection phase, which is defined as “gathering ESI for further use in the electronic discovery process (processing, review, etc.).” The key here is that the collection must be done in a manner that ensures admissibility, meaning that data authentication and chain of custody protocols must be adhered to if the process is to pass judicial muster. The challenge is that the collecting party may have to interface with disparate and difficult data sources, including legacy systems, proprietary applications and the like. There may even be a need to create forensic (bit-for-bit) images of individual systems.
Processing is defined as “reducing the volume of ESI and converting it, if necessary, to forms more suitable for review and analysis.” This stage is typically the most expensive in the e-discovery workflow and thus typically the first target for bringing in-house because the ROI can be so impactful. The main goal here is to reduce data volumes for downstream attorney review (see below), since attorney evaluation (for relevancy and privilege) of information is often quoted as running between $3.00 and $5.00 per document. Any steps to limit the data volume by defensibly de-duplicating data, file type culling, indexing, e-mail threading, etc., will more than offset the processing costs.
Analysis often works hand-in-hand with processing and is defined as “the process of evaluating a collection of electronic discovery materials to determine relevant summary information, such as key topics of the case, important people, specific vocabulary and jargon, and important individual documents.” This type of analysis can be extremely valuable as it permits early case assessment that objectively analyzes the data to get a sense of the case (key players, data volumes, date ranges, smoking guns, etc.). This type of information helps with the development of case strategies, preparation for meet and confer conferences and planning out the longer term e-discovery processes. It can be particularly useful if the case contains bad facts that may precipitate an early settlement.
In a way, all of the proceeding steps have been performed to permit a fast and accurate attorney Review process, which is defined as a way to “sort out responsive documents to produce and privileged documents to withhold.” In the days before e-discovery, this task was a purely manual exercise with attorneys reading physical pages one after another. Now, with the advent of next generation review tools it's possible to conduct the review process in vastly more efficient stages. For example, many companies will use paralegals and contract attorneys to conduct a “first pass” review that removes irrelevant chaff from relevant “hot” documents that will be perused by attorneys intimately familiar with the case. This prioritization process is dramatically more efficient that traditional linear, brute force review processes because it saves time and money.
Production is the last significant stage in the e-discovery process, and is defined as “delivering ESI to others in appropriate forms and using appropriate delivery mechanisms.” The challenge with this stage is that specific requirements from the requesting party may be hard to accommodate if all the upstream steps haven't been conducted with a particular end in mind. For example, if the requesting party wants a native file production with metadata, then this will be extremely difficult if the producing party has turned native files into .tiff images during the processing stage. One of the more important areas to consider here is the handling of metadata since it may or may not be needed in the production. Fortunately, there are emerging XML standards that have been promulgated by the EDRM group as a way to minimize the hundreds of disparate production options.
Conclusion
The decision to bring components of the e-discovery process in-house can be complex, but this complexity shouldn't deter enterprises from undertaking this evaluation since the savings and process improvements can be dramatic. The process should be done collectively between all involved internal constituents to get maximum buy in, while mitigating duplication efforts between teams. Keep in mind that prioritization is key. Therefore, it's important to avoid attempts to fix the entire process at once. Instead, focus on the most costly and integral parts of e-discovery, such as processing, analysis and review. Finally, don't lose sight of the goal: to simultaneously reduce cost while increasing the overall defensibility of the process.
There are two unstoppable trends in e-discovery. First, corporate executives are becoming acutely aware that they are ultimately responsible for their organization's e-discovery results, which in some instances is a rude awakening since they can no longer claim ignorance or try to put the blame for any missteps on their law firms or litigation-support providers. Second, to lower costs and gain more control of the e-discovery process, enterprises are bringing certain steps of e-discovery in-house. As a result of these two trends, progressive corporations are starting to treat e-discovery as any other standard corporate business process: repeatable, defensible and measurable.
This new dynamic raises an obvious question: What portions of the e-discovery process are best suited to be “in-sourced,” and how do IT professionals within an enterprise work with their partners to ensure effective collaboration/communication?
Finding the Right Mix
This article discusses the best practices to achieve the right mix of in-house and outsourced expertise. We begin by listing a set of criteria that can be used to determine whether an in-house, outsourced or hybrid model is the right approach for a particular situation (i.e., is “in-sourcing” right for you?). From there, we analyze the various e-discovery phases as referenced in the Electronic Discovery Reference Model (“EDRM”) and provide guidelines on the right approaches for each phase.
While certainly not an exhaustive list, the following details a number of factors that should be analyzed to determine whether an in-house, outsourced or hybrid model is the right approach for your enterprise:
Once an accurate picture of the litigation/investigation profile can be compiled, it's important to take an inventory of existing e-discovery processes, tools and personnel who may work on a given task. In many instances, there will be very hard and fast distinctions between legal, IT, records management and the business units. In other (more progressive) situations, the company may have crafted a cross-functional e-discovery team that bridges the gap between all the interconnected groups.
General guidelines can be used to establish logical separations of duties while taking into account the two most important aspects of e-discovery: defensibility and cost. For example, certain tasks might be outsourced to external service providers (e.g., forensic collections and large scale, distributed review) and other critical tasks might be likely in-house candidates (e.g., early case assessment, file type culling, processing, analysis) in order to ensure the highest level of defensibility at the lowest cost. The process should be done collectively between both parties to facilitate a sense of shared cooperation while mitigating duplication efforts between teams.
Breaking Down e-Discovery
To avoid “boil the ocean” type paralysis, the best way to tease apart the various processes, people and tools is to focus on each step of the EDRM one step at a time. While the reality is that e-discovery isn't so neat or linear, there is value in isolating the discrete phases for initial simplification.
The first EDRM step (following upstream data/records management) is Identification, which is defined as “the process of learning the location of all data which you or your client may have a duty to preserve and potentially disclose in a pending or prospective legal proceeding.” Practically speaking, the main tasks here revolve around the identification of “key players” in the litigation. Once this task is complete, the next step is to map those custodians to electronically stored information (“ESI”) sources, data types, date ranges, etc., which helps facilitate meet and confer obligations as well as “inaccessibility” arguments (per Federal Rules of Civil Procedure (“FRCP”) 26(b)2(B)).
The next EDRM step is Preservation, which is defined as “ensuring that ESI is protected against inappropriate alteration or destruction.” The triggering event for preservation is often a trap for the unwary since it begins when litigation is “reasonably likely,” not necessarily at a later date when the litigation is actually filed. In order to defensibly manage this process, many organizations deploy systems to track receipt and acknowledgement of “hold” notices.
Preservation is followed by the Collection phase, which is defined as “gathering ESI for further use in the electronic discovery process (processing, review, etc.).” The key here is that the collection must be done in a manner that ensures admissibility, meaning that data authentication and chain of custody protocols must be adhered to if the process is to pass judicial muster. The challenge is that the collecting party may have to interface with disparate and difficult data sources, including legacy systems, proprietary applications and the like. There may even be a need to create forensic (bit-for-bit) images of individual systems.
Processing is defined as “reducing the volume of ESI and converting it, if necessary, to forms more suitable for review and analysis.” This stage is typically the most expensive in the e-discovery workflow and thus typically the first target for bringing in-house because the ROI can be so impactful. The main goal here is to reduce data volumes for downstream attorney review (see below), since attorney evaluation (for relevancy and privilege) of information is often quoted as running between $3.00 and $5.00 per document. Any steps to limit the data volume by defensibly de-duplicating data, file type culling, indexing, e-mail threading, etc., will more than offset the processing costs.
Analysis often works hand-in-hand with processing and is defined as “the process of evaluating a collection of electronic discovery materials to determine relevant summary information, such as key topics of the case, important people, specific vocabulary and jargon, and important individual documents.” This type of analysis can be extremely valuable as it permits early case assessment that objectively analyzes the data to get a sense of the case (key players, data volumes, date ranges, smoking guns, etc.). This type of information helps with the development of case strategies, preparation for meet and confer conferences and planning out the longer term e-discovery processes. It can be particularly useful if the case contains bad facts that may precipitate an early settlement.
In a way, all of the proceeding steps have been performed to permit a fast and accurate attorney Review process, which is defined as a way to “sort out responsive documents to produce and privileged documents to withhold.” In the days before e-discovery, this task was a purely manual exercise with attorneys reading physical pages one after another. Now, with the advent of next generation review tools it's possible to conduct the review process in vastly more efficient stages. For example, many companies will use paralegals and contract attorneys to conduct a “first pass” review that removes irrelevant chaff from relevant “hot” documents that will be perused by attorneys intimately familiar with the case. This prioritization process is dramatically more efficient that traditional linear, brute force review processes because it saves time and money.
Production is the last significant stage in the e-discovery process, and is defined as “delivering ESI to others in appropriate forms and using appropriate delivery mechanisms.” The challenge with this stage is that specific requirements from the requesting party may be hard to accommodate if all the upstream steps haven't been conducted with a particular end in mind. For example, if the requesting party wants a native file production with metadata, then this will be extremely difficult if the producing party has turned native files into .tiff images during the processing stage. One of the more important areas to consider here is the handling of metadata since it may or may not be needed in the production. Fortunately, there are emerging XML standards that have been promulgated by the EDRM group as a way to minimize the hundreds of disparate production options.
Conclusion
The decision to bring components of the e-discovery process in-house can be complex, but this complexity shouldn't deter enterprises from undertaking this evaluation since the savings and process improvements can be dramatic. The process should be done collectively between all involved internal constituents to get maximum buy in, while mitigating duplication efforts between teams. Keep in mind that prioritization is key. Therefore, it's important to avoid attempts to fix the entire process at once. Instead, focus on the most costly and integral parts of e-discovery, such as processing, analysis and review. Finally, don't lose sight of the goal: to simultaneously reduce cost while increasing the overall defensibility of the process.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.