Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Why Analytics Can Be Risky in the Wrong Hands

By Barry Schwartz
February 01, 2021

Recent years have seen dramatic advancements in e-discovery software, with some powerful analytics capabilities now often integrated as standard features instead of expensive add-ons. Simultaneously, e-discovery platforms have become increasingly user-friendly, with visually appealing interfaces that make it easier for users to view, manage and produce their data — or so they think.

In reality, the accessibility of analytics platforms can sometimes lead users to believe they understand the platforms better than they actually do. If a user is too emboldened, they may end up making a mistake that negatively impacts their case, such as not producing responsive documents or accidentally producing privileged information.

Having the most expensive or advanced tool in the toolbox doesn't matter if you don't know how to use it, and if you're not using those tools properly, there are risks everywhere. Here are a few examples of areas where inexperienced users tend to go wrong in their use of analytics and search tools:

|
  1. Incorrect tagging of documents. Analytics tools are only as good as the data that's fed into them, and a big mistake made by inexperienced users is to not tag documents correctly. A common example would be a responsive document that's attached to a nonresponsive email. It might seem correct to tag the email itself because of its attachment, as often was the normal practice before the use of analytics. However, because there's nothing responsive in the body of the email, tagging it will only make the analytics model less effective at best, or result in incorrect decisions by those tools at worst.
  2. Over-reliance on basic search functions. Search tools are powerful, but they're not foolproof. When running searches, inexperienced users sometimes overlook flaws in the underlying data that can affect the quality of their search results. Variations or misspellings of a name, or text that is contained in a screenshot or other image, can be easily missed.
  3. Incorrect handling of privilege review. Sometimes attorneys clearly mark documents in a data set as privileged, but when they don't, a close read of a document may be necessary to ascertain that it's privileged — for instance, a brief mention in an email chain about the topic under discussion. Users shouldn't assume that an analytics model is going to automatically catch that. Some parties still do rely on clawback agreements that allow them to assert privilege over documents after they've been produced to the other party. But, as the old saying goes, you can't un-ring a bell. In some cases, if you try to claw back a document, the other party might claim that you've waived privilege by producing it, at which point you'd have a fight on your hands — a fight that is becoming harder to win. Recently, we worked with a client that was trying to produce documents on a tight deadline. They wanted to produce and send over everything that came up from a search in order to get the job done as quickly and as cheaply as possible. We advised the client that they were risking a waiver of privilege and successfully convinced the counsel to change course, thereby protecting the client's privileged documents. In general, if you have something you don't want the other side to see, don't rely on technology or clawback agreements alone to save you after you've already sent data out the door.
  4. Incomplete production of documents. Two standard analytics tools, email threading and deduplication, are often used to reduce redundancy in a data set before review. For instance, in an email thread that contains 20 messages, only the final email in the conversation would need to be included for review, since it fully includes all previous communications. However, depending on your production protocol agreement with the opposing party, you might need to produce all 20 messages in the conversation as separate documents, to make it easier to understand the flavor of a conversation. Not doing so could violate your production protocol order, and you would run the risk of sanctions from the court and/or increased costs from having to run the production over again to correct the deficiency. Producing only the most inclusive emails is not a bad strategy, but you must make sure that all parties have agreed to do so, and that they understand how to identify, handle and produce emails that branch out into separate discussion threads, too.
|

The Math Behind the Tools

As straightforward as analytics platforms might appear on the surface, using them effectively comes down to understanding the math behind the tools. Risk and probability factor greatly into the work done by e-discovery professionals.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access Lawsuit Image

Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Fresh Filings Image

Notable recent court filings in entertainment law.