Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Why Analytics Can Be Risky in the Wrong Hands

By Barry Schwartz
February 01, 2021

Recent years have seen dramatic advancements in e-discovery software, with some powerful analytics capabilities now often integrated as standard features instead of expensive add-ons. Simultaneously, e-discovery platforms have become increasingly user-friendly, with visually appealing interfaces that make it easier for users to view, manage and produce their data — or so they think.

In reality, the accessibility of analytics platforms can sometimes lead users to believe they understand the platforms better than they actually do. If a user is too emboldened, they may end up making a mistake that negatively impacts their case, such as not producing responsive documents or accidentally producing privileged information.

Having the most expensive or advanced tool in the toolbox doesn't matter if you don't know how to use it, and if you're not using those tools properly, there are risks everywhere. Here are a few examples of areas where inexperienced users tend to go wrong in their use of analytics and search tools:

|
  1. Incorrect tagging of documents. Analytics tools are only as good as the data that's fed into them, and a big mistake made by inexperienced users is to not tag documents correctly. A common example would be a responsive document that's attached to a nonresponsive email. It might seem correct to tag the email itself because of its attachment, as often was the normal practice before the use of analytics. However, because there's nothing responsive in the body of the email, tagging it will only make the analytics model less effective at best, or result in incorrect decisions by those tools at worst.
  2. Over-reliance on basic search functions. Search tools are powerful, but they're not foolproof. When running searches, inexperienced users sometimes overlook flaws in the underlying data that can affect the quality of their search results. Variations or misspellings of a name, or text that is contained in a screenshot or other image, can be easily missed.
  3. Incorrect handling of privilege review. Sometimes attorneys clearly mark documents in a data set as privileged, but when they don't, a close read of a document may be necessary to ascertain that it's privileged — for instance, a brief mention in an email chain about the topic under discussion. Users shouldn't assume that an analytics model is going to automatically catch that. Some parties still do rely on clawback agreements that allow them to assert privilege over documents after they've been produced to the other party. But, as the old saying goes, you can't un-ring a bell. In some cases, if you try to claw back a document, the other party might claim that you've waived privilege by producing it, at which point you'd have a fight on your hands — a fight that is becoming harder to win. Recently, we worked with a client that was trying to produce documents on a tight deadline. They wanted to produce and send over everything that came up from a search in order to get the job done as quickly and as cheaply as possible. We advised the client that they were risking a waiver of privilege and successfully convinced the counsel to change course, thereby protecting the client's privileged documents. In general, if you have something you don't want the other side to see, don't rely on technology or clawback agreements alone to save you after you've already sent data out the door.
  4. Incomplete production of documents. Two standard analytics tools, email threading and deduplication, are often used to reduce redundancy in a data set before review. For instance, in an email thread that contains 20 messages, only the final email in the conversation would need to be included for review, since it fully includes all previous communications. However, depending on your production protocol agreement with the opposing party, you might need to produce all 20 messages in the conversation as separate documents, to make it easier to understand the flavor of a conversation. Not doing so could violate your production protocol order, and you would run the risk of sanctions from the court and/or increased costs from having to run the production over again to correct the deficiency. Producing only the most inclusive emails is not a bad strategy, but you must make sure that all parties have agreed to do so, and that they understand how to identify, handle and produce emails that branch out into separate discussion threads, too.
|

The Math Behind the Tools

As straightforward as analytics platforms might appear on the surface, using them effectively comes down to understanding the math behind the tools. Risk and probability factor greatly into the work done by e-discovery professionals.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.