Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
No one welcomes the prospect of an internal investigation. Even a relatively narrow and focused investigation can feel like a distraction from day-to-day business. Broader investigations can become complicated exercises requiring investigators (and sometimes outside counsel) to work with multiple departments and stakeholders, struggle to manage disparate workflows, and sift through mountains of data to arrive at the truth.
While complaints to HR alleging discrimination or harassment based on race or gender are among the most common triggers of an internal investigation, other triggers run the gamut. They include whistle-blower complaints alleging compliance violations or corporate fraud, the loss or theft of physical assets, leaked or stolen data containing sensitive or personal information, and leaked or stolen intellectual property.
The stakes in these matters can turn out to be very high. A purely reactive approach to investigations can not only cause delays in determining the truth, but also increase the likelihood of runaway costs and damage to the company's reputation. On the other hand, companies can often respond effectively if they proactively plan for investigations and leverage technology that can comb through large amounts of data quickly at low cost. These organizations have a much better chance of avoiding prosecution, large fines, substantial damages, erosion of employee morale, and negative publicity.
In most traditional litigation, attorneys can proceed from a known set of facts and have a clear roadmap to follow. Compared to litigation, internal investigations can be quite open-ended and unpredictable — you may not even have a date range in which alleged wrongdoing may have occurred, for example, and in some cases you may not know ahead of time who is likely to be involved or which custodians to focus on. Investigations are also highly context-specific, requiring very different approaches depending on the nature and seriousness of the complaint or allegation. Several different departments may need to be involved in addition to legal — HR, IT, finance, and compliance are common examples — each with their own workflows and applications. Also, while investigations often end without becoming the subject of litigation, investigators must always be prepared for that possibility. That means carefully documenting their activities and the chain of custody so the evidence they gather will be admissible in court.
Apart from the legal and logistical challenges, investigations often present significant, daunting technical challenges. The identification, preservation and collection of information relevant to an investigation may have to be completed under severe time pressure, particularly if the behavior in question is ongoing or poses an imminent threat to the organization's reputation or well-being. Data types and sources may be quite diverse, ranging from email, text messages, and instant messages to telephone records, voicemails, backup files and even video surveillance footage. Different technology platforms, applications and device types may all come into play.
Consider this real-world scenario that recently played out at a medical device company, which we'll call MDC. It came to MDC's attention that they had suffered a data breach that targeted personally identifiable information (PII) — including Social Security numbers (SSNs) — from MDC customer records. MDC began the investigation knowing which SSNs had been stolen, and they knew that each of those SSNs was associated with the purchase of a particular medical device, but the SSNs were not associated with other customer PII in the company's databases. This meant that MDC was initially unable to notify the affected customers as required by law — a big problem — because they didn't know the names of those customers.
To find those customers, MDC would have to pore through thousands of invoices to identify relevant device model numbers, and then match the PII from the invoices to the SSNs of the affected customers.
To further complicate matters, MDC's sales and operations extend across the globe. Not only were the invoices in multiple languages, but the device model numbers were as well, which meant that model numbers in some languages had different characters than their counterparts in English. There were hundreds of thousands of SSNs that had to be identified with other customer information. All told, the investigation of this data breach encompassed more than 500GB of data in multiple languages (including Japanese), and 44 custodians inside and outside the US.
Imagine trying to tackle this challenge with manual searching, spreadsheets, and office productivity software, not to mention human reviewers and possibly translators. How long would it take, and at what cost? Given the potential for human error, how certain could you be that every detail in your investigation was accurate?
While the above scenario is unique in some respects, it should serve as a warning for all companies that lack standard processes and appropriate technologies to respond effectively when potential wrongdoing from within or outside the organization is identified. It is particularly sobering in light of the fact that many enterprises — especially medium-size organizations — still lack clear plans and policies around internal investigations, rely on investigative workflows siloed by department, and use a patchwork of office applications and manual processes to carry out the investigative work.
While many of these same companies may deploy sophisticated e-discovery tools to address the challenges of high data volumes and data complexity in litigation, investigations are more likely to be ad hoc affairs that are organized only after a specific complaint or incident arises, and carried out with little standardization of processes and inadequate tools.
If that describes your organization's approach to internal investigations, it's probably time to consider some significant changes. Here are some suggestions:
Remember the medical device company (MDC) that was trying to match invoices to SSNs? In the course of using AI to complete this massive task, they discovered a second data breach they had been completely unaware of. This highlights the very real proactive potential of the advanced technologies that many companies may be already using for e-discovery. These tools can help companies develop more mature information governance and record management systems, perform regular privacy and other compliance audits, and even identify potential security vulnerabilities.
MDC has certainly taken notice. They are developing a formal, technology-enabled program for investigations. They plan to revisit their information architecture in light of recent experience, establish standard workflows across departments, and create a complete set of policies and procedures for investigative activities, including preemptive investigations where no problems are currently evident. It certainly beats waiting for the next trigger to come along.
*****
David Carns is the Chief Revenue Officer of Casepoint. He joined Casepoint as a Director of Client Services in 2010, rose the ranks to Chief Strategy Officer until his most recent promotion in 2019. In addition to being a recovering attorney, David possesses a lifelong passion for technology and its advancements. His career has always found him at the intersection of technology and the legal field given his intimate knowledge of both. Connect with David on LinkedIn @dcarns.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.
This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.
Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.