Posts By :

CloudNine Digital

Custodian Interviews: Critical to Defensible eDiscovery in the Age of Modern Communications

By Rick Clark, VP of Strategic Partnerships and Marketing at CloudNine, and Melissa Weberman, Counsel and Head of eData at Arnold & Porter

In today’s evolving corporate data landscape, custodian interviews—early interviews of key employees who hold relevant electronically stored information (ESI) —remain a cornerstone for defensible discovery. Even with today’s advanced analytics and AI tools, a thorough custodian interview can provide a major advantage in saving costs and managing discovery risks. As the volume and variety of corporate communication methods evolve—ranging from traditional email to short-messaging apps like Slack, Microsoft Teams, WhatsApp, and Signal—attorneys should consider sharpening their custodian interview techniques to identify and preserve relevant ESI. The stakes are high: poor interview and collection strategies can result in spoliation, sanctions, and reputational damage.

Start With a Clear Purpose

Custodian interviews serve multiple critical purposes in litigation, including:

  • Identify where relevant data lives, including on personal devices or unofficial “shadow IT” apps—i.e., any tool employees use for work without the company’s formal IT approval or retention controls (e.g., personal Dropbox, WhatsApp, or a private Slack workspace). This ensures no major source of evidence is overlooked early on.
  • Help preserve data and avoid spoliation, because by learning what data exists and where, counsel can promptly preserve it (for example, by issuing legal holds or suspending auto-deletion on systems). Failure to identify a source through interviews could result in data loss. For example, if a custodian uses an ephemeral messaging app, interviewing them quickly allows you to halt any auto-delete settings before relevant messages disappear.
  • Scope and focus the discovery effort, as a well-run interview arms you with information to negotiate a reasonable scope of discovery with the opposing side. You can learn which data is truly important—and what can be safely excluded—making discovery more proportional to the needs of the case. This can reduce unnecessary review of irrelevant data, saving time and money.
  • Uncover key facts and terminology, because speaking to custodians often reveals context that is not obvious from documents alone. They can explain project code names, acronyms, or unique jargon that they use, and critical date ranges and players. Knowing these details guides you in formulating better search terms or using analytics (e.g., recognizing a code word in emails that filters irrelevant documents). In turn, this improves the efficiency of downstream review and helps you spot important evidence faster.
  • Demonstrate a defensible process, as courts expect counsel to make a good-faith, thorough effort to find relevant ESI. By conducting and documenting these interviews, you can later show the court (or opposing counsel) that you took reasonable steps to identify and preserve all relevant information. This record becomes vital if there are ever challenges to your discovery process or accusations of missing data.

Being intentional can ensure the interview is productive and minimizes missed evidence. Before the interview, review the custodian’s role, potential data sources, and communication tools. Consider preparing a case-specific checklist or interview template—do not rely on a static form—to ensure you are properly prepared for the specific nature of the case and the client’s business processes.

 

Customize Based on Your Role

Successful custodian interviews and defensible collections require strong collaboration among in-house counsel, outside counsel, and service providers. In-house counsel aligns the interview process with the company’s internal policies, reassures employees, and facilitates access to systems. Outside counsel, meanwhile, brings an external perspective that shapes strategy, ensuring that questions are thorough and appropriately scoped, and keeping the process defensible. Service providers deliver the technology for efficient and secure data collection, processing, and hosting for review. They offer tools for real-time collection, develop secure workflows for managing diverse data sources, and generate detailed documentation that may prove critical if collection practices are later challenged in litigation. When all three groups—internal legal teams, external attorneys, and technology partners—work together seamlessly, the result is a defensible, efficient, and transparent discovery process that stands up to scrutiny and reduces risk.

 

Build Trust with the Custodian

Custodians are more likely to share relevant information if they understand that interviews are standard procedure and not indicative of wrongdoing (but it is important they understand that the interviewer represents the company, not the individual custodian). Establish rapport by:

  • Clearly explaining the purpose of the interview.
  • Reassuring them that the process is routine—not an accusation.
  • Emphasizing that the custodian’s cooperation protects the company and themselves.
  • Collaborating with in-house counsel to act as a bridge and underscore legitimacy.

Gaining custodian buy-in can increase cooperation and the quality of disclosures. Further, building trust early can pay dividends later when collections need to be supplemented or deposition preparation begins.

 

Modern Communications: Ask the Right Questions

Today’s employees communicate through a mix of chat apps, collaboration tools, mobile devices, and cloud platforms. Consider asking specifically about:

  • Chat applications (e.g., SMS, Slack, Teams, or WhatsApp) and whether relevant. messages sit in private channels or DMs.
  • Collaboration hubs (e.g., Confluence, SharePoint, or Google Drive).
  • Personal devices or accounts used for work.
  • Any unsanctioned “side” apps or cloud storage.

Be prepared for reluctance or lack of awareness or recollection. Use visuals or demos to jog memories.

 

Coordinate With IT and Records Personnel

It is often useful to speak with IT personnel who understand the company’s systems. They can provide a high-level view of standard data sources, retention policies, and system locations. However, always verify those details with the custodian’s actual practice. For example, IT might report that “all email is on the server, none is stored locally,” but an interview reveals the employee saved archives on a local drive contrary to policy. Similarly, a policy might say employees should not use USB drives or personal devices, yet a custodian may admit they routinely did so. Use the IT interview as a starting point, then confirm details with each custodian to help avoid blind spots.

 

Leverage Real-Time Collection and Screen Sharing

Where appropriate, use technology that enables real-time review and preservation of data. Screen sharing or live data exports during the interview can:

  • Validate custodian responses in real time.
  • Capture volatile or short-lived communications before they expire.
  • Prevent spoliation by reducing the lag between identification and preservation.

Tools that allow screen sharing, cloud sync capture, or mobile device previewing are particularly effective.

 

Document the Interview Meticulously

Consider taking the following contemporaneous notes:

  • Custodian identifiers and role: Record the custodian’s full name, title/department, and location, along with a brief description of his role in the matter. This provides context for his data and helps show you identified relevant custodians in good faith.
  • Interview logistics: Note the date of the interview, method (in-person/remote), and who conducted it. Consistency here supports defensibility, showing interviews were done timely (typically soon after the legal hold) and by appropriate personnel.
  • Legal hold notice: Document that the custodian confirmed receiving the litigation hold notice and acknowledged his preservation obligations.
  • Data sources identified: List every source of potentially relevant information the custodian uses, including:
    • Devices: Work and personal devices (computers, phones, tablets, external drives).
    • Email accounts: Work email (Exchange/Office 365, etc.) and any personal or secondary accounts used for work.
    • Network locations: Shared drives, department file servers, databases, and cloud repositories (SharePoint, Google Drive, etc.).
    • Business applications: Relevant enterprise systems (CRM, HR systems, finance databases) that the custodian accesses.
  • Communications and collaboration channels: Document chat or messaging apps (Microsoft Teams, Slack, WhatsApp, SMS/iMessage, etc.), social media or direct messages if used for business, and any ephemeral messaging platforms. Note if relevant content exists and how it’s preserved. If the custodian uses apps with auto-delete or self-destruct features (e.g. Snapchat, Confide, Wickr), record this and any preservation steps taken (such as disabling auto-delete or instructing the person to save screenshots).
  • Retention policies and auto-delete settings: Capture any information about data retention or deletion that could affect the custodian’s ESI. For example, ask if the custodian’s emails auto-delete after 90 days, if chat histories are retained, or if device data is routinely wiped. Document what you learn and any preservation steps taken. If the custodian had been manually deleting relevant data, note that and instruct (and document) that such deletions cease.
  • Custodian’s actions: Document any actions the custodian has already taken regarding his data, and record if he mentions any data loss or issues.
  • Follow-up steps and outstanding items: At the end of the interview, list any follow-up actions needed and track them. This might include scheduling a forensic collection of the custodian’s device, reaching out to IT about a newly identified server, or interviewing an additional person the custodian identified. Clearly document what will be done, by whom, and when. Maintaining this as part of the interview record ensures nothing falls through the cracks and evidences a continuing, diligent effort.
  • Additional custodians or data sources named: A good interview often identifies other people or systems that might have relevant data. Document any new custodians, departments, or repositories the interviewee mentions. This guides your next steps and creates a record that you are expanding the preservation scope appropriately.

By following the above checklist, legal teams can create a defensible paper trail of their custodian interviews. In the event of a discovery dispute or motion, your team’s diligent documentation—complete with who, what, when, and how you addressed custodian data—can serve as strong evidence of your good faith and compliance with eDiscovery obligations. This not only helps in court but also keeps internal eDiscovery projects on track by tracking what has been done and what remains outstanding at each stage.

 

Best Practices Recap

  • Start early.
  • Use a standardized interview form but tailor questions case-by-case.
  • Keep the tone transparent and cooperative.
  • Involve IT and cross-check what policies say versus real-world practice.
  • Document interviews, tools used, and preservation efforts meticulously.

 

Custodian interviews are more than an information-gathering step—they are a strategic moment to protect your client and ensure discovery obligations are met. By combining interview best practices with modern collection technology, legal teams can build a defensible foundation for any case.

Discovering Mobile Device Data: What to Expect from Your eDiscovery Solution

Discovery of data from mobile devices used to be occasional. Parties in litigation often agreed up front NOT to pursue data from mobile devices because it was so difficult and burdensome to do so. Collecting from the devices was challenging and time-consuming, as was the inconvenience to custodians who balked at giving up their mobile device for even a few hours!

In at least one case, formalizing the agreement not to pursue text messages (and other data) as an ESI stipulation came back to haunt the plaintiff when they realized the importance of those text messages and filed a motion to compel – only to have the Court deny the motion because of the stipulation to which the party had agreed. Ouch!

Today, the importance of data from mobile devices has grown to the point that they are routinely a source of discoverable data in all types of cases. The vast majority of Americans – 98% – now own a cellphone of some kind and over nine-in-ten (91%) own a smartphone. Mobile devices are just as ubiquitous at work – in a recent survey, 80% of IT executives said employees cannot do their jobs effectively without a mobile device.

That level of importance has extended to discovery of data from mobile devices, with the potential of severe sanctions for failing to preserve that data for discovery. In this case, a party received two adverse inference instruction sanctions (as well as being ordered to pay the claimants’ costs and attorneys’ fees for the sanctions motion) for failing to preserve data from five out of thirteen custodian mobile devices; while in this case, intentional deletion of text messages resulted in terminating sanctions against the plaintiff!

Mobile Device Data and Your eDiscovery Solution

The rise of importance of mobile device data (such as text messages and other short message formats) in discovery has made it critical for your eDiscovery solution to support the collection, ingestion, processing, analysis, review and production of those messages efficiently and effectively. Here’s what to look for:

Collection, Ingestion and Processing

Today, forensic and eDiscovery professionals are using a variety of tools to collect data from mobile devices. Here are three prominent providers specializing in mobile device data discovery today:

  • Oxygen Forensics: Oxygen Forensics offers Oxygen Forensic® Detective, an all-in-one digital forensic solution capable of extracting, decoding, and analyzing data from various devices, including mobile phones, computers, and cloud services. Note: Oxygen Forensics is a partner of CloudNine.
  • Cellebrite: Cellebrite is renowned for its Universal Forensic Extraction Device (UFED), a suite of tools designed for extracting and analyzing data from mobile devices. UFED supports a wide range of devices, including smartphones, drones, SIM cards, and GPS units, facilitating comprehensive data collection for forensic investigations.
  • ModeOne: ModeOne specializes in remote, targeted mobile data collection through its patented Software-as-a-Service (SaaS) framework. This solution allows for same-day collection of relevant data from smartphones without the need for physical device access or on-site personnel.

Given the popularity of all three solutions for mobile device data collection, Your eDiscovery solution must support the ability to ingest load-ready data from each of these formats efficiently and effectively.

Analysis and Review

Processing and ingesting the data from any of the three solutions above is one thing, but how that data is managed within your eDiscovery solution is just as critical. Because many eDiscovery solutions were built to support document-oriented data like emails and office files, they tend to force text and other short message formats into that same document paradigm, with little if any regard to where conversations begin and end. Doing so makes the data less useful for analysis and review.

Text and chat messages aren’t document oriented – they’re conversation oriented. Your eDiscovery solution must support the ability to analyze and review these messages in context with the rest of the conversation to determine their relevance to the case. The “rest of the conversation” could be in other text messages, email, Slack or any other communication format. And it could include images, audio, video, emojis or even geolocation data. The ability to efficiently and comprehensively analyze conversations is a must have for your eDiscovery solution today.

Production

While you may want to analyze and review the messages in a conversation format, that doesn’t mean you necessarily want to produce them that way. Most parties in litigation are still accustomed to a document format for production, so there’s no reason to “rock the boat” on those standards (at least yet). Your eDiscovery solution should support the ability to export text and other short message data into document formats for production.

Conclusion

CloudNine Review “checks all the boxes” for collection, ingestion, processing, analysis, review and production of text and other short message formats: ingestion support of all three major mobile device discovery solutions, conversation-oriented analysis and review, and production in industry-standard formats. Mobile device data is too important to your cases today to expect anything less from your eDiscovery solution.

Are you ready to take control of eDiscovery costs? Let’s talk about how CloudNine can help you save money while optimizing efficiency: Contact Us today.

ediscovery daily logo

CloudNine and eDiscovery Today Partner to Bring Fresh Education to Legal Tech Pros

We’re excited to share some big news: CloudNine is teaming up with Doug Austin and his industry-leading blog, eDiscovery Today, to launch a new educational partnership aimed at empowering legal and eDiscovery professionals.

If you’ve been in the eDiscovery world for any length of time, chances are you’ve read Doug’s work. eDiscovery Today is the only daily blog covering the latest in electronic discovery, information governance, cybersecurity, data privacy, and AI. It’s a trusted go-to for legal tech pros looking to stay sharp—and now, it’s joining forces with CloudNine to take things to the next level.

A Partnership Rooted in Innovation and Experience

“I can’t think of a better time to partner with Doug Austin again, as CloudNine’s innovation in the eDiscovery market is at an all-time high,” said Rick Clark, CloudNine’s VP of Strategic Partnerships and Marketing. “With advancements in modern data analysis, artificial intelligence, and on-premise data processing, we’re excited about what’s ahead. Doug not only educates the industry but is also one of the most respected content creators in the space.”

Doug is equally thrilled to reunite with CloudNine—where his daily blogging career first began. “Working with the CloudNine team again feels like coming home,” he shared. “I’m excited to continue the tradition of educating the legal industry on leveraging eDiscovery technology and best practices to solve ever-evolving challenges.”

What to Expect

This partnership means you’ll start seeing even more content—blogs, webinars, thought leadership, and more—that focuses on practical, modern solutions for handling everything from legacy email archives to today’s fast-growing universe of collaboration and chat data. Whether you’re an eDiscovery pro or just getting started, there will be something for everyone.

About eDiscovery Today

eDiscovery Today, authored by Doug Austin, is the only daily blog serving the eDiscovery and legal tech community with updates on trends, best practices, and case law. Doug has over 30 years of experience in legal tech and has published new content every business day for nearly 15 years.

Exploring the Future of Legal Innovation at The Masters Conference: Thought Leadership in D.C. and Social Media in Discovery and Investigations

On Thursday, April 10, 2025, legal and technology professionals gathered at Arnold & Porter in Washington, D.C. for an inspiring day of discussion, collaboration, and community during The Masters Conference Thought Leadership event. Hosted at Arnold & Porter’s offices at 601 Massachusetts Ave NW, this full-day conference promised a deep dive into the latest challenges and advancements in eDiscovery, legal tech, investigations, and career development.

The conference featured a wide range of insightful sessions—covering topics from artificial intelligence, custodian interviews with modern data challenges, case law updates, and social media collection and analysis. For this blog, I’m focusing on the session that explored the power and process of social media collection and analysis, which stood out as particularly timely and impactful.

The session on social media was titled “Unlocking Social Media Data,” sponsored by SMI Aware, and examined the investigative value of social media evidence. Josh Janow and Paige Hansen (SMI Aware) walked through data preservation strategies across platforms like Facebook, Instagram, LinkedIn, TikTok, Venmo, Strava and over 500 other accounts.

This session actually kicked off at the beginning of the conference, when Josh invited volunteers to have their social media presence assessed live. Using SMI Aware’s platform, the team conducted real-time OSINT (Open Source Intelligence) research on those individuals, compiling reports to present at the 11 a.m. breakout session. Initially, only a few attendees stepped forward—but when the findings were revealed, those volunteers were genuinely surprised by what had been uncovered in just a couple of hours. The reticence on the face of many in the room underscored the power of this tool in the hands of e-discovery professionals.  What began as a novel and engaging activity quickly shifted in tone during the session, as attendees began to recognize social media research as a “must-have” component in litigation, compliance, and due diligence strategies.

Why Social Media Data Matters in Discovery

Since much of our life events are journaled online (as Paige put it), critical evidence is often found in unexpected places—Instagram posts, Venmo transactions, Reddit threads, and business collaboration tools like Slack and GitHub. The session opened with a challenge: What if your case hinges on something someone posted online—then deleted?

Social media can tell a story that contradicts a claim, verifies an alibi, or reveals patterns that shift the legal narrative. Whether it’s a workers’ comp investigation or a high-stakes wrongful termination suit, open-source data is no longer a “nice to have”—it’s a necessity.

When and Where to Search

The first key takeaway? Timing is everything.

Social media content can be altered or deleted. That’s why early case assessment should now include an OSINT component. From public Facebook profiles to lesser-known platforms like Discord or SoundCloud, relevant content often exists in plain sight—if you know where and how to look.

In one powerful case example shared, a claimant in a workplace injury lawsuit posted photos of themselves competing in a dance competition—at a time they were allegedly too injured to work. That evidence was found publicly, but only for a short window before it was removed.

The Legal and Ethical Imperatives

Attorneys and investigators have both a professional and ethical obligation to understand where potential evidence may exist, even if it lies outside traditional custodians and repositories.

The presentation emphasized that collecting this data isn’t about “digging for dirt”—it’s about diligence. When done properly, it involves secure data collection methods, legal defensibility, and a clear chain of custody. Not doing so could mean missing key facts, or worse—compromising the admissibility of your findings.

Challenges and Limitations

Despite its power, social media evidence isn’t without hurdles:

  • Deleted or ephemeral content (think Stories or temporary posts)
  • Private settings that restrict access
  • Platform-specific restrictions on what can be scraped or reviewed

This is where specialized tools and experienced teams like SMI Aware’s come in. Their approach combines automated tools with human analysis to ensure data is gathered ethically, interpreted contextually, and structured into actionable insights with a deliverable of a report and the structured data that can then be imported into a review platform like CloudNine Review.

Real-World Impact: Case Studies in Action

The session walked attendees through several real-world investigations, including:

  • Workers’ Compensation fraud
  • Wage and hour disputes
  • Wrongful termination claims
  • Workplace compliance investigations
  • Pre-employment screening

Each case underscored the same point: social media and OSINT data can change the course of an investigation—or the outcome of litigation.

Key Takeaways

  • Social media is critical to modern discovery. If you’re not using it, you’re behind.
  • Data disappears quickly. Timely collection is key.
  • You need technical tools and expert interpretation to turn raw data into usable evidence.
  • Ethical and professional rules require attorneys to understand how OSINT fits into their duty of competence.
  • The report generated from SMI Aware’s software and service is a ready for an expert and is the main use, but also can create the proper load files for review in an eDiscovery review platform.

This conference was yet another testament to the evolving digital landscape of discovery—where artificial intelligence, modern data collection, and advanced review technologies are increasingly aligned to meet today’s challenges.

Are you ready to take control of eDiscovery costs? Let’s talk about how CloudNine can help you save money while optimizing efficiency: Contact Us today.

data culling in eDiscovery

The CFO’s Perspective: Why Culling Data First in eDiscovery Saves Big Money

By Abhishek Jhaver, CloudNine GM and CFO

As a CFO, managing costs without sacrificing efficiency is always a priority. One of the biggest cost drivers in eDiscovery is data volume —the more data you have, the more expensive it is to process, host, and especially review. That is why culling data before review isn’t just a best practice — it’s a financial imperative.

The High Cost of Excess Data

The traditional approach often involves collecting terabytes of data, much of which is irrelevant or redundant. Legal teams then spend significant resources on processing, hosting, and reviewing data that isn’t needed.

Industry studies show that document review can account for up to 70% of total eDiscovery costs. If we can significantly reduce the volume of data before review, we can directly impact the bottom line. The key is leveraging technology to remove unnecessary data early in the process before it becomes a cost burden. This culling process is typically called Early Data Assessment or Early Case Assessment.

CloudNine LAW: The Smarter Way to Cull Data Early

CloudNine LAW is a powerful solution designed to dramatically reduce data volume before review. By using its robust deduplication, filtering, and processing capabilities of over 5,000 file types, organizations can cut down on avoidable data, saving time and money in the process. Here’s how LAW helps make the corporate legal finance teams happy:

  • Deduplication: A significant percentage of collected data consists of duplicate files. LAW automatically identifies and removes redundant documents, ensuring legal teams aren’t reviewing the same information multiple times.
  • Filtering by Date, Custodian, and Keywords: LAW allows legal teams to filter data based on date ranges, specific custodians, and relevant keywords—removing unnecessary files before they ever reach review.
  • DeNISTing: System files and other non-relevant data clog up eDiscovery workflows. LAW uses DeNISTing to eliminate these non-user-generated files, reducing overall data volume.
  • Efficient Processing for Faster Turnaround: LAW processes large data sets efficiently, enabling legal teams to move to review with only the most relevant data.

 

The Financial Impact of Early Culling

By culling data early with CloudNine LAW, organizations can realize substantial cost savings. Fewer documents to review mean lower processing, hosting, and attorney review costs—potentially cutting review-related expenses by 30-50%. Additionally, streamlined processes allow legal teams to work faster while reducing billable hours and improving case timelines.

For CFOs, the equation is simple:

More data = higher costs.

Relevant data = Significant savings in cost, time, and resources.

 

A CFO’s Call to Action

If your legal team is not leveraging early-stage culling through tools like CloudNine LAW, you are likely overspending. Investing in proactive data reduction is one of the smartest financial decisions you can make in eDiscovery—because in the end, the best way to cut eDiscovery costs is to cut the irrelevant data first.

Are you ready to take control of eDiscovery costs? Let’s talk about how CloudNine LAW can help you save money while optimizing efficiency: Contact Us today.

How eDiscovery Technology and Workflows Speed Public Records Requests Response

This is the second blog post in a series on streamlining public records request response.

By Rick Clark

In the two separate worlds of legal processes and Freedom of Information Act (FOIA)/public records requests, eDiscovery technology and standard workflows have emerged as powerful ways to streamline operations and ensure compliance. Particularly, the handling of FOIA requests and public records requests showcases the potential similarities between these processes and eDiscovery workflows.

One key similarity lies in the meticulous management of data, starting from governance levels and progressing through collection, processing, review, and export stages. Both FOIA requests and eDiscovery workflows require focused information retrieval, often involving large volumes of data. While FOIA requests aim to access government records, eDiscovery deals with electronic information for legal proceedings, both necessitating efficient data organization and retrieval mechanisms.

Legal and regulatory compliance is another shared aspect. FOIA and public records requests are legally mandated, mirroring the legal frameworks that govern eDiscovery processes. Ensuring easy data organization and adherence to legal and regulatory frameworks is critical in both contexts. Search and review processes are central to both FOIA requests and eDiscovery workflows. Leveraging search tools and methodologies, both processes sift through vast amounts of data to identify relevant information. eDiscovery software platforms excel in simplifying this process, allowing for quick identification, tagging, and export of pertinent data, enhancing efficiency in handling requests.

Redaction of sensitive information is also common to both FOIA and eDiscovery. Tools and techniques are employed to protect sensitive details, including personal identifiable information (PII) before disclosure. Modern data challenges, including the use of multiple communication platforms like Microsoft Teams and Slack, further highlight the need for adaptable and comprehensive data management solutions.

Efficient workflow management is crucial for both FOIA requests and eDiscovery. Complex workflows require seamless coordination among stakeholders to meet legal deadlines and ensure accurate responses. Transparency and collaboration among legal teams, IT professionals, and subject matter experts are vital for success.

While differences exist between FOIA requests and eDiscovery, advancements in eDiscovery software have made it adaptable to public requests. Providers offering secure cloud solutions, easy data uploads, case setup with team access, hybrid workflows, advanced search capabilities, and collaboration tools are aligning their offerings with the needs of modern data and document management systems. As organizations navigate the complexities of data requests and investigations, choosing the right technology partner is essential to ensuring efficient, compliant, and transparent processes.

In our next blog out next week, you will learn more about resourcing teams to fulfill public records requests when resources are lean.

To find out more about how CloudNine can help you to streamline public records request response with our cloud-based eDiscovery solution and set a time to meet with us.

Read our first blog post in this series, “Growing Challenges with Public Records Requests”.

About the Authors

Rick Clark is VP, Strategic Partnerships at CloudNine and has 20+ years of experience in forensics and eDiscovery. Focused on innovation and education, he co-founded ESI Analyst, now CloudNine Analyst, as well as Wave Software and the Master’s Conference.

eDiscovery Leader CloudNine Boosts Search Capability to its SaaS Review Platform

HOUSTON – March 19, 2024 – Houston, Texas: CloudNine, the eDiscovery technology and services leader, announced the launch of Smart Filters for CloudNine Review, allowing customers to target specific data sets quickly and review records in real time.

CloudNine Review is an easy-to-use SaaS review platform with self-service data loading, document production capability and automated processing of 4500+ file types and was named High Performer and Easiest Set up by G2. With Optical Character Recognition (OCR), near-duplicate detection, email threading, and language detection, Smart Filters now allows customers to narrow their review to focus quickly on key documents and review relevant records in real time and provides immediate insights and search results with record counts instantly displayed.

“Time matters when it comes to preparing for an investigation, litigation, or public records request. CloudNine is excited to advance our review platform’s search capabilities to make it even easier to pinpoint the data you need and review it with speed and confidence,” said Brian Kelley, VP, Product at CloudNine.

In addition to Smart Filters, other recent updates to CloudNine Review include billable data tracking, empowering users to better forecast their budget and identify what is billable to customers by project. Search enhancements, including the ability to import up to 1000 searches at one time and automatic records tagging were also added to CloudNine Review. Smart Filters supports full text searching, document identifiers, date, metadata, tags, and user work product and is available now to all CloudNine Review customers. Learn more about Smart Filters.

About CloudNine:

CloudNine is an on-premise and SaaS software company. We offer the flagship CloudNine Review and CloudNine Analyst SaaS-based eDiscovery platforms with self-service processing, analysis, review, and production for both traditional and modern data. CloudNine is the eDiscovery pioneer behind CloudNine LAW, CloudNine Concordance and the industry standard .DAT file type. We empower legal, information technology, and business professionals with eDiscovery automation software and professional services that simplify litigation, investigations, and audits for law firms and corporations, and have been highlighted by industry experts in reports, reviews, and surveys including G2, Gartner, 451 Research, GigaOm, TechMag, Corporate Counsel Magazine, the New York Journal, and Texas Lawyer.

Press contact:
Catherine Ostheimer
Costheimer@cloudnine.com

How to Win in the Short Message eDiscovery Game: Review Near-Native; Produce as Documents

Since the inception of legal processes in ancient societies, documents have been pivotal in evidence and discovery. In recent years, with the rise of email and electronically stored information (ESI), technology companies have standardized review and production processes around these data, converting them into the standard source of discovery: documents. This process has been functional and the data quite usable, until the advent of short messaging in business and personal communications.

Starting with the end in mind, the format we seek to produce for the requesting party is still a document. This format makes the most sense, as it can display short messages as a fluid document showing the conversation, with redactions of confidential messages, alongside all other relevant data. However, the processing and review process for short messages often follows the same document conversion and review process, even though it is the least efficient way to review this data.

But why is the processing and review process subject to the same document conversion and review process when it is the least efficient way to review these data?

Issues with document review of short messages are:

  • Context of cross-channel conversations – Many people will start conversations in one channel like email, switch to a corporate chat application like Slack or MS Teams and may end in a 30-minute phone conversation. When the data is in a linear document review workflow it is extremely difficult to stitch those conversations together.
  • High costs in document review – Whether the message is converted to individual documents or conversations are converted to 24-hour conversations or any variation, reviewing document by document and redacting within those documents is tedious and costly as the time to do so is significant.
  • Data volumes impact hosting costs – The conversion of short message metadata into documents creates a high data footprint that is expensive with “cost per gigabyte” hosting models. This is good for service and software providers, but not for the end client.

Given the growing volumes and diverse types of data dominating investigations and discovery processes, it is crucial to explore more efficient strategies for analysis and review. These strategies should provide better contextual understanding while mitigating costs. It is evident that short message communications differ significantly from emails and e-files, requiring a different approach in the processing and review phases of the EDRM.

The most efficient and effective approach to short message discovery is to render conversations in a “near-native” view for analysis and review where the conversation looks like a document, but the underlying data is the metadata and all media as a part of the conversations.

Example of a Near-Native conversation segment

Example of a Near-Native conversation segment

Benefits of a near-native review of short messages are:

  • Easy import of data to a review platform: Rather than processing and loading documents, short message collections can be directly imported into the review platform.
  • Tag items at the message level: This allows for more granular tagging and categorization of messages.
  • Produce only relevant messages: By reviewing messages at the message level, only relevant messages need to be produced, reducing unnecessary data production.
  • Automatic redactions: The review platform can automatically redact confidential or privileged messages, reducing the manual effort required.
  • Display all media inline: Videos, GIFs, and audio files can be displayed in line with messages, providing a more comprehensive view of the communication.
  • Export options: The review platform should offer export options that accommodate all document and load file types, ensuring compatibility with various systems and processes.

Here’s what this can look like with the right technology solution:

Visual of conversation using CloudNine

Visual of conversation using CloudNine

If you want to learn more about handling short message data efficiently and effectively in eDiscovery, set up time to learn more about CloudNine Analyst here.

Learnings from ALM/Law.com Legalweek 2024: Six Key Takeaways

This was not the same old Legalweek, or “LegalTech New York,” as the conference was referred to in years past.

With over 6,000 registered attendees and 37% being first timers, the high level of excitement generated by participants about being in person with peers was palpable in the sessions and events held. There was also a greater embracing of new ways of getting legal done, with can’t-be-ignored tech like GenAI, data management and handling the ever-growing modern data in discovery cracking open the remaining closed doors to innovation for law firms, government and corporate teams alike. The once taboo topic of sexual harassment in our industry also came roaring to the surface.

We narrowed down our many Legalweek 2024 learnings to six key takeaways.

1. Drive change (and get what you want) with a “how can I help” attitude

Actor Bryan Cranston, famous for his role in the AMC series Breaking Bad and previously played a lawyer on Matlock and the Andy Griffith Show, spoke on breaking boundaries. In addition to talking about the importance of perseverance to be successful in any endeavor, he also advised to approach something you want with the perspective of how you can help. To get what you want from an audition, a job interview or, in the case of many legal industry changemakers, implementing change. “…present yourself as a gift…and put into energy solving someone’s problem,” he said.

2. Take advantage of how technology is levelling the playing field

Technology has broken barriers and created greater access to opportunities in other fields for years: education, healthcare, etc. At this year’s State of the Industry report overview delivered by ALM’s Heather Nevitt and Patrick Fuller, this concept was brought up on how tech is helping mid-sized law firms compete with bigger firms. “Size used to matter”, said Nevitt, but now, with technology including AI, “…it will no longer be that the big that eat the small, but the fast that eat the slow.”

This notion of technology helping individuals and organizations get ahead played out in other sessions, including one on the Future State of the industry. Marcy Cohen, Chief Legal Officer of ING Americas, said that she would consider using a mid-sized firm. “A nimbler (tech forward) firm can jump in that does not have an army of associates, as long as they have subject matter expertise,” she explained.

When it comes to advancing careers, technology also plays a part. In the same session, panelists discussed how technology allows teams to bring work in-house and for senior lawyers to focus on impactful work instead of reviewing NDAs. On the topic of women and law, the concept of using technology plus having data on results being a career accelerator was discussed. Rachel Zahorsky, VP of Client Engagement at Harbor Global, explained that her ability to show numbers behind a tech implementation and having someone advocate for her helped her to get her current job. “Two men who were mentors and who knew what I could do said my name in the room when I wasn’t there.” She encouraged especially the men in the room to do the same: “When we’re not there, say our names. And we will support you. And we will rise together.”

3. Have a plan for dealing with modern data in discovery

In a thought leadership session hosted by CloudNine and our managed review partner, Integreon, the growing challenge of dealing with “modern data” like texts, chat and social media data was covered by a panel of eDiscovery experts, including Manfred Gabriel, Partner and Senior Counsel of eDiscovery at Holland & Knight, Kevin Bannon, Head of CMS Evidence, and Matt Rasmussen, Founder and CEO, ModeOne. Clare Chalkley, VP of legal services at Integreon disclosed the stats from the 2024 State of the Industry report by eDiscovery Today/Doug Austin. Survey respondents stated that over 40%, most or all their cases involve discovery of data from mobile devices, with 38% of these cases involving collaboration data from apps like Slack, Teams, WhatsApp, etc.

Gabriel highlighted the importance of questioning custodians on all communications channels they use, since we all are using alternatives to email with greater frequency, with texting leading the list.

Other tips shared included:

  • Even if someone says they deleted messages, they can be found. You just need to ask them to name all they communicated with and rebuild conversations from their devices
  • If an organization is using Google docs, it will have a downstream impact on how you preserve and review data
  • You need a solid ECA process in place to minimize the teams of data
  • Determine your ESI protocol upfront regarding attachments, whether they are included in emails, or texts or chat app/social media data (there are several cases which tie to this learning, such as Noom v. Nichols in which the opposing party said they would not produce linked documents. The court endorsed this stance.)

Rick Clark, VP of Strategic Partnerships at CloudNine concluded the session by saying that there is now technology allowing you to deal with modern data content efficiently and treat it like data, not documents. If you are interested in learning more about our solution for handling modern data, CloudNine Analyst, which won for Best Emerging Technology in the Legalweek Leaders in Tech Law award program last week, book time with us for a brief demo.

4. Think business first when it comes to AI adoption

The many sessions on AI hit on the topics of accuracy, ability to explain outcomes, data security and change management. Another important subject was identifying business use cases. In a session on the practical implications of generative AI for law firms, panelists from Sheppard Mullin, DLA Piper and O’Melveny & Myers discussed the importance of finding business use cases that will be easy to implement and yield measurable time and cost savings results, such as any work involving summarization, translation, analysis, drafting or custom “ChatGPTs”.

In the Future State of the Industry discussion, Liz Lugones, COO of Uplevel Ops talked about how some corporate lawyers and General Counsels simply get a request from above to use AI. Her question when asked to help is “for what?” She goes back to the human factor and asks what they want AI to enable for their team, and what they want to enable to support their business, and then start from those use cases to identify how to apply AI.

5. Lead the charge against cyber data threats

Today, legal has the opportunity to take command of an organization’s efforts to combat cyber threats, rather than be the one called in after an incident to help deal with the aftermath. In a session called “Improving Your Security Posture and Reducing Cyber Risk”, the idea of attorneys working closely with a Chief Information Officer in protecting an organization against cyber theft was discussed. Dondi West, Assistant General Counsel at GSK, said he likes to be brought in at the start of a date security improvement program and wants to be collaborative with IT. Often it’s legal that is aware of security frameworks that are “whale tested,” and have a good sense of what works and what does not.

Having counsel involved early also makes sense when legal charges brought against companies who have a breach are considered, In the case of cyber incidents with Uber and Solar Winds, criminal charges were brought against the company and individual corporate leaders. It makes sense to have the team whose primary responsibility is to protect the company against reputational harm be working collaboratively with IT and information security leadership from the start.

Additional pointers shared by West and other panelists like Emily Garnett, Brownstein Hyatt Farber Schreck and Deb Bitzan, Senior Product Manager, Aware, include:

  • Look at established security frameworks like SOC II to see what baseline actions are needed to protect against cyber theft
  • Make sure your cyber insurance includes business interruption loss coverage
  • The weakest link in an organization is those of computers. Put social engineering/phishing training in place for all employees; aim to get the collective “click” rate on planted phishing emails below 5%
  • Make sure your third-party tech providers have the basics in place: for example, end point security and multifactor authentication
  • When it comes to incident response planning, timing and context matter. Bring in an outside consultant to help you create a plan for all scenarios and actions, including what happens if your organization is attacked on a weekend or holiday

6. Stand united against sexual harassment

The wave of sexual harassment reports from conference attendees this year was shocking and disheartening. Sexual harassment is a problem that permeates every industry but for the most part, has not been discussed widely in legal technology public forums like LinkedIn and podcasts. The floodgates have opened, the stories are out and the unison of voices stating outrage and demanding action is deafening. We agree with Kassi Burns, who concluded her podcast created post conference with these words: “I hope this painful moment leads to progress.”

Now is the time to stand together to identify and put into action policies to prevent sexual harassment from occurring not only in conferences, but in workplaces too. At CloudNine, we are proud of our heritage and culture of professionalism and approaching others and each other with respect. Even so, we’re working this week on updating our policies to ensure we continue to hire the right people and provide guardrails for CloudNine employees attending social events and for their day-to-day interactions.

We also support the #Splash pledge started by Marla Crawford at Cimplifi this week, and will, as an organization and as individual members of the LegalTech community, work together to help all of LegalTech #BeBetter together.”

About the author:

Catherine Ostheimer is VP, Marketing at CloudNine and has been working in the legal technology industry for 9+ years.

 

eDiscovery leader CloudNine Named Best Emerging Technology in the Legalweek Leaders in Tech Law Awards 2024 Program

January 31, 2024 – HOUSTON—Law.com and Legaltech News announced eDiscovery technology leader CloudNine the winner of the Best Emerging Technology (Non-AI) award in their Legalweek Leaders for Tech Law Awards 2024 program for building a platform for managing modern data like text messages, chat, and social media messages.

The use of newer forms of communications in the workplace creates growing digital evidence challenges for legal teams and the growth: in 2023, every minute, there were ~11,834 Microsoft Teams chats, 34,247 Slack messages, and 18.8 million text messages sent, according to eDiscovery Today.

CloudNine was recognized by Law.com and Legaltech News for designing a solution that helps solve this eDiscovery digital evidence challenge.

CloudNine created CloudNine Analyst, the only solution that can render modern data in its native format with timelines, speeding the eDiscovery process and saving time and money. The solution can manage data from every logged activity on a device, web application or computer, ingesting all types of data and displaying it as one would see it on a mobile device.

Said Georges Sabongui, Chief Executive Officer of CloudNine, “We are honored to be recognized by Law.com and Legaltech News for helping our customers to gather newer data types in a single platform and create a holistic view of the evidence efficiently. CloudNine Analyst is just one example of how we are staying one step ahead of the needs of eDiscovery professionals in a fast-moving world of communications data.”

To learn more about how your investigations and case teams can get a better handle on modern data, contact CloudNine today.

About CloudNine:

CloudNine is an on-premise and SaaS software company. We offer the flagship CloudNine Review and CloudNine Analyst SaaS-based eDiscovery platforms with self-service processing, analysis, review, and production for both traditional and modern data. CloudNine is the eDiscovery pioneer behind CloudNine LAW, CloudNine Concordance and the industry standard .DAT file type. We empower legal, information technology, and business professionals with eDiscovery automation software and professional services that simplify litigation, investigations, and audits for law firms and corporations, and have been highlighted by industry experts in reports, reviews, and surveys including G2, Gartner, 451 Research, GigaOm, TechMag, Corporate Counsel Magazine, the New York Journal, and Texas Lawyer.

Press contact:
Catherine Ostheimer
Costheimer@cloudnine.com