Collection

Quality Control, Making Sure the Numbers Add Up: eDiscovery Best Practices

Having touched on this topic a few years ago, a recent client experience spurred me to revisit it.

Friday, we wrote about tracking file counts from collection to production, the concept of expanded file counts, and the categorization of files during processing.  Today, let’s walk through a scenario to show how the files collected are accounted for during the discovery process.

Tracking the Counts after Processing

We discussed the typical categories of excluded files after processing – obviously, what’s not excluded is available for searching and review.  Even if your approach includes technology assisted review (TAR) as part of your methodology, it’s still likely that you will want to do some culling out of files that are clearly non-responsive.

Documents during review may be classified in a number of ways, but the most common ways to classify documents as to whether they are responsive, non-responsive, or privileged.  Privileged documents are also often classified as responsive or non-responsive, so that only the responsive documents that are privileged need be identified on a privilege log.  Responsive documents that are not privileged are then produced to opposing counsel.

Example of File Count Tracking

So, now that we’ve discussed the various categories for tracking files from collection to production, let’s walk through a fairly simple eMail based example.  We conduct a fairly targeted collection of a PST file from each of seven custodians in a given case.  The relevant time period for the case is January 1, 2013 through December 31, 2014.  Other than date range, we plan to do no other filtering of files during processing.  Identified duplicates will not be reviewed or produced.  We’re going to provide an exception log to opposing counsel for any file that cannot be processed and a privilege log for any responsive files that are privileged.  Here’s what this collection might look like:

  • Collected Files: After expansion and processing, 7 PST files expand to 101,852 eMails and attachments.
  • Filtered Files: Filtering eMails outside of the relevant date range eliminates 23,564
  • Remaining Files after Filtering: After filtering, there are 78,288 files to be processed.
  • NIST/System Files: eMail collections typically don’t have NIST or system files, so we’ll assume zero (0) files here. Collections with loose electronic documents from hard drives typically contain some NIST and system files.
  • Exception Files: Let’s assume that a little less than 1% of the collection (912) is exception files like password protected, corrupted or empty files.
  • Duplicate Files: It’s fairly common for approximately 30% or more of the collection to include duplicates, so we’ll assume 24,215 files here.
  • Remaining Files after Processing: We have 53,161 files left after subtracting NIST/System, Exception and Duplicate files from the total files after filtering.
  • Files Culled During Searching: If we assume that we are able to cull out 67% (approximately 2/3 of the collection) as clearly non-responsive, we are able to cull out 35,618.
  • Remaining Files for Review: After culling, we have 17,543 files that will actually require review (whether manual or via a TAR approach).
  • Files Tagged as Non-Responsive: If approximately 40% of the document collection is tagged as non-responsive, that would be 7,017 files tagged as such.
  • Remaining Files Tagged as Responsive: After QC to ensure that all documents are either tagged as responsive or non-responsive, this leaves 10,526 documents as responsive.
  • Responsive Files Tagged as Privileged: If roughly 8% of the responsive documents are determined to be privileged during review, that would be 842 privileged documents.
  • Produced Files: After subtracting the privileged files, we’re left with 9,684 responsive, non-privileged files to be produced to opposing counsel.

The percentages I used for estimating the counts at each stage are just examples, so don’t get too hung up on them.  The key is to note the numbers in red above.  Excluding the interim counts in black, the counts in red represent the different categories for the file collection – each file should wind up in one of these totals.  What happens if you add the counts in red together?  You should get 101,852 – the number of collected files after expanding the PST files.  As a result, every one of the collected files is accounted for and none “slips through the cracks” during discovery.  That’s the way it should be.  If not, investigation is required to determine where files were missed.

So, what do you think?  Do you have a plan for accounting for all collected files during discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Quality Control By The Numbers: eDiscovery Best Practices

Having touched on this topic a few years ago, a recent client experience spurred me to revisit it.

A while back, we wrote about Quality Assurance (QA) and Quality Control (QC) in the eDiscovery process.  Both are important in improving the quality of work product and making the eDiscovery process more defensible overall.  With regard to QC, an overall QC mechanism is tracking of document counts through the discovery process, especially from collection to production, to identify how every collected file was handled and why each non-produced document was not produced.

Expanded File Counts

Scanned counts of files collected are not the same as expanded file counts.  There are certain container file types, like Outlook PST files and ZIP archives that exist essentially to store a collection of other files.  So, the count that is important to track is the “expanded” file count after processing, which includes all of the files contained within the container files.  So, in a simple scenario where you collect Outlook PST files from seven custodians, the actual number of documents (emails and attachments) within those PST files could be in the tens of thousands.  That’s the starting count that matters if your goal is to account for every document or file in the discovery process.

Categorization of Files During Processing

Of course, not every document gets reviewed or even included in the search process.  During processing, files are usually categorized, with some categories of files usually being set aside and excluded from review.  Here are some typical categories of excluded files in most collections:

  • Filtered Files: Some files may be collected, and then filtered during processing. A common filter for the file collection is the relevant date range of the case.  If you’re collecting custodians’ source PST files, those may include messages outside the relevant date range; if so, those messages may need to be filtered out of the review set.  Files may also be filtered based on type of file or other reasons for exclusion.
  • NIST and System Files: Many file collections also contain system files, like executable files (EXEs) or Dynamic Link Library (DLLs) that are part of the software on a computer which do not contain client data, so those are typically excluded from the review set. NIST files are included on the National Institute of Standards and Technology list of files that are known to have no evidentiary value, so any files in the collection matching those on the list are “De-NISTed”.
  • Exception Files: These are files that cannot be processed or indexed, for whatever reason. For example, they may be password-protected or corrupted.  Just because these files cannot be processed doesn’t mean they can be ignored, depending on your agreement with opposing counsel, you may need to at least provide a list of them on an exception log to prove they were addressed, if not attempt to repair them or make them accessible (BTW, it’s good to establish that agreement for disposition of exception files up front).
  • Duplicate Files: During processing, files that are exact duplicates may be put aside to avoid redundant review (and potential inconsistencies). Some exact duplicates are typically identified based on the HASH value, which is a digital fingerprint generated based on the content and format of the file – if two files have the same HASH value, they have the same exact content and format.  Emails (and their attachments) may be identified as duplicates based on key metadata fields, so an attachment cannot be “de-duped” out of the collection by a standalone copy of the same file.

All of these categories of excluded files can reduce the set of files to actually be searched and reviewed.  On Monday, we’ll illustrate an example of a file set from collection to production to illustrate how each file is accounted for during the discovery process.

So, what do you think?  Do you have a plan for accounting for all collected files during discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Judge Recommends Default Judgment Sanctions Against Defendants, Even Though Some Deleted Files Were Recoverable: eDiscovery Case Law

In Malibu Media, LLC v. Tashiro, Case No. 13-cv-00205 -WTL-MJD (S.D. Ind. May 18, 2015), Indiana Magistrate Judge Mark J. Dinsmore issued a Report and Recommendation on Plaintiff’s Motion for Sanctions, recommending that the Court grant the plaintiff’s motion against the defendants for spoliation of evidence and perjury and enter default judgment against the defendants.

Case Background

In 2013, the plaintiff retained a German company to investigate whether certain internet users were infringing plaintiff’s copyrights by uploading and/or downloading its copyrighted adult movies via a BitTorrent client and, after monitoring the BitTorrent file distribution network, the provider identified certain IP addresses that were being used to distribute Plaintiff’s copyrighted movies.  The plaintiff initially filed suit against an unidentified defendant, but amended the complaint to name the defendants after the plaintiff subpoenaed the alleged infringer’s ISP.

During discovery, one of the defendants agreed to provide her computer hard drives for forensic imaging.  The plaintiff’s expert examined each of the images of the hard drives for evidence of BitTorrent use, finding evidence on one drive that the “hard drive was repeatedly used to download BitTorrent files and also had BitTorrent software installed on the hard drive.”  He also determined that numerous files and folders associated with BitTorrent use had been deleted the night before the drive was turned over for imaging.  In addition, the expert determined that three additional drives had been connected to the defendant’s laptop computer, but had not been turned over for imaging.  As a result, the plaintiff filed a motion for sanctions alleging spoliation of evidence and perjury in the form of misrepresentations by defendants at their depositions and in their responses to various discovery requests.  The defendants argued that because the files were recoverable, spoliation had not occurred, but the contention that all the deleted files were recoverable was disputed by the plaintiff.

Judge’s Ruling

With regard to the recoverability of the files, Judge Dinsmore stated “Based on the relative credentials of the parties’ experts, the Court concludes that Patrick Paige’s testimony is more accurate and more credible. As such, the Court finds it highly likely that thousands of files were deleted and were unrecoverable. This confirms that Defendant Charles did not temporarily delete relevant evidence; instead, he permanently destroyed that evidence. As a result, Charles is liable for spoliation.”  He also noted that “even if the files that Charles deleted had been recoverable, this would not absolve Charles of liability” as the metadata associated with those recovered files would have been altered, which “would impede Plaintiff’s use of those files in proving its underlying claim of copyright infringement”.

As for the perjury claim, while finding some of the defendants’ answers not to constitute perjury, Judge Dinsmore failed to reach that conclusion regarding at least one of the drives that the defendant failed to disclose.  He stated that “At best, her omission of the XPS 600 from her discovery responses resulted from an egregious failure to reasonably investigate whether her interrogatory answers were complete. At worst, her failure to include the XPS 600 was a knowing and intentional omission that indicates that she did in fact commit perjury.”

Finding that “a sanction short of default would not appropriately address the goals of deterrence and punishment”, Judge Dinsmore recommended that the Court grant the plaintiff’s motion against the defendants for spoliation of evidence and perjury and enter default judgment against the defendants.

So, what do you think?  Was the recommendation of severe sanctions appropriate in this case?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

You Almost Can’t Have a Divorce without Smartphone Evidence These Days: eDiscovery Trends

If you think the NSA is tough, hell hath no fury like a suspicious spouse scorned.

According to the American Academy of Matrimonial Lawyers (AAML) – not to be confused with the National Organization of Matrimonial Attorneys Nationwide (or N.O.M.A.N.) from the Coen Brothers movie Intolerable Cruelty (whose motto was “let N.O.M.A.N. put asunder”, get it?) – almost every divorce attorney works with smartphone evidence these days.

According to the AAML survey (press release here), a whopping 97% of members have seen an increase in divorce evidence being taken from smartphones and other wireless devices during the past three years. In addition, an almost universal number of 99% of respondents have cited a rising number of text messages being used in cases, while 67% have noted more evidence being gathered from apps. Not surprisingly, the top three apps for divorce evidence are also the most popular social media sites, with 41% citing Facebook, 17% choosing Twitter, and 16% identifying Instagram as sites where evidence was obtained.

“In the past, a suspicious spouse might have turned to a private investigator for this kind of detailed information, but nowadays most people willingly carry around some kind of wireless tracking device everywhere they go,” said James McLaren, president of the American Academy of Matrimonial Lawyers. “As with almost every aspect of our lives, smart phones and other wireless devices are having a big impact on the ways in which couples divorce.”

Overall, 97% of the attorneys cited an increase in the number of cases using evidence taken from smartphones and other wireless devices during the past three years, while 2% said no change and only 1% noted a decrease. The most common types of evidence gathered were cited by 46% as “texts,” while 30% said “emails,” 12% “phone numbers/call history,” 7% “Internet browsing/searches,” and “GPS” was noted by 4% of the respondents. In total, 99% cited an increase of cases using text messages during the past three years, while 1% noticed no change.

An increase in the number of cases using evidence taken from apps during the past three years was cited by 67% while 28% chose no change, and 5% noted a decrease. In addition to the top three apps listed for divorce evidence, the next selections included Find My iPhone and Snapchat at 6% each, 4% choosing Google Maps, Google+ at 3% and WhatsApp and Tinder each picked by 1% of the respondents.

So, if your divorce attorney is going to nail your spouse’s ass(ets), it will probably be with help from the ESI on his or her smartphone and social media accounts.

Once again, thanks for the tip from Sharon Nelson and her excellent Ride the Lightning blog!

So, what do you think? Do your cases include more ESI from smartphones? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

When Collecting Emails, Make Sure You Have a Complete Outlook: eDiscovery Best Practices

I’m out of the office this week, taking the kiddos on a family vacation (can you guess where?). Instead of going dark for the week (which we almost never do), I decided to use the opportunity to give you a chance to catch up on cases we’ve covered so far this year with a couple of case law pop quizzes, sandwiched around a popular post from the past that you may have missed. Today’s post takes a look back at Outlook files and the different forms they take. How many do you know?

Most discovery requests include a request for emails of parties involved in the case. Email data is often the best resource for establishing a timeline of communications in the case and Microsoft® Outlook is the most common email program used in business today. Outlook emails can be stored in several different forms, so it’s important to be able to account for each file format when collecting emails that may be responsive to the discovery request.

There are several different file types that contain Outlook emails, including:

EDB (Exchange Database): The server files for Microsoft Exchange, which is the server environment which manages Outlook emails in an organization. In the EDB file, a user account is created for each person authorized at the company to use email (usually, but not always, employees). The EDB file stores all of the information related to email messages, calendar appointments, tasks, and contacts for all authorized email users at the company. EDB files are the server-side collection of Outlook emails for an organization that uses Exchange, so they are a primary source of responsive emails for those organizations. Not all organizations that use Outlook use Exchange, but larger organizations almost always do.

OST (Outlook Offline Storage Table): Outlook can be configured to keep a local copy of a user’s items on their computer in an Outlook data file that is named an offline Outlook Data File (OST). This allows the user to work offline when a connection to the Exchange computer may not be possible or wanted. The OST file is synchronized with the Exchange computer when a connection is available. If the synchronization is not current for a particular user, their OST file could contain emails that are not on the EDB server file, so OST files may also need to be searched for responsive emails.

PST (Outlook Personal Storage Table): A PST file is another Outlook data file that stores a user’s messages and other items on their computer. It’s the most common file format for home users or small organizations that don’t use Exchange, but instead use an ISP to connect to the Internet (typically through POP3 and IMAP). In addition, Exchange users may move or archive messages to a PST file (either manually or via auto-archiving) to move them out of the primary mailbox, typically to keep their mailbox size manageable. PST files often contain emails not found in either the EDB or OST files (especially when Exchange is not used), so it’s important to search them for responsive emails as well.

MSG (Outlook MSG File): MSG is a file extension for a mail message file format used by Microsoft Outlook and Exchange. Each MSG file is a self-contained unit for the message “family” (email and its attachments) and individual MSG files can be saved simply by dragging messages out of Outlook to a folder on the computer (which could then be stored on portable media, such as CDs or flash drives). As these individual emails may no longer be contained in the other Outlook file types, it’s important to determine where they are located and search them for responsiveness. MSG is also a common format for native production of individual responsive Outlook emails, though HTML is also used (as Outlook emails, by default, are already HTML formatted files).

Other Outlook file types that might contain responsive information are EML (Electronic Mail), which is the Outlook Express e-mail format and PAB (Personal Address Book), which, as the name implies, stores the user’s contact information.

Of course, Outlook emails are not just stored within EDB files on the server or these other file types on the local workstation or portable media; they can also be stored within an email archiving system or synchronized to phones and other portable devices. Regardless, it’s important to account for the different file types when collecting potentially responsive Outlook emails for discovery.

So, what do you think? Are you searching all of these file types for responsive Outlook emails? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

For a Successful Outcome to Your Discovery Project, Work Backwards: eDiscovery Best Practices

Based on a recent experience with a client, it seemed appropriate to revisit this topic. Plus, it’s always fun to play with the EDRM model. Notice anything different? 🙂

While the Electronic Discovery Reference Model from EDRM has become the standard model for the workflow of the process for handling electronically stored information (ESI) in discovery, it might be helpful to think about the EDRM model and work backwards, whether you’re the producing party or the receiving party.

Why work backwards?

You can’t have a successful outcome without envisioning the successful outcome that you want to achieve. The end of the discovery process includes the production and presentation stages, so it’s important to determine what you want to get out of those stages. Let’s look at them.

Presentation

Whether you’re a receiving party or a producing party, it’s important to think about what types of evidence you need to support your case when presenting at depositions and at trial – this is the type of information that needs to be included in your production requests at the beginning of the case as well as the type of information that you’ll need to preserve as a producing party.

Production

The format of the ESI produced is important to both sides in the case. For the receiving party, it’s important to get as much useful information included in the production as possible. This includes metadata and searchable text for the produced documents, typically with an index or load file to facilitate loading into a review application. The most useful form of production is native format files with all metadata preserved as used in the normal course of business.

For the producing party, it’s important to be efficient and minimize costs, so it’s important to agree to a production format that minimizes production costs. Converting files to an image based format (such as TIFF) adds costs, so producing in native format can be cost effective for the producing party as well. It’s also important to determine how to handle issues such as privilege logs and redaction of privileged or confidential information.

Addressing production format issues up front will maximize cost savings and enable each party to get what they want out of the production of ESI. If you don’t, you could be arguing in court like our case participants from yesterday’s post.

Processing-Review-Analysis

It also pays to make decisions early in the process that affect processing, review and analysis. How should exception files be handled? What do you do about files that are infected with malware? These are examples of issues that need to be decided up front to determine how processing will be handled.

As for review, the review tool being used may impact how quick and easy it is to get started, to load data and to use the tool, among other considerations. If it’s Friday at 5 and you have to review data over the weekend, is it easy to get started? As for analysis, surely you test search terms to determine their effectiveness before you agree on those terms with opposing counsel, right?

Preservation-Collection-Identification

Long before you have to conduct preservation and collection for a case, you need to establish procedures for implementing and monitoring litigation holds, as well as prepare a data map to identify where corporate information is stored for identification, preservation and collection purposes.

And, before a case even begins, you need an effective Information Governance program to minimize the amount of data that you might have to consider for responsiveness in the first place.

As you can see, at the beginning of a case (and even before), it’s important to think backwards within the EDRM model to ensure a successful discovery process. Decisions made at the beginning of the case affect the success of those latter stages, so working backwards can help ensure a successful outcome!

So, what do you think? What do you do at the beginning of a case to ensure success at the end?   Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Simply Deleting an Email Doesn’t Mean It’s Gone, Even When It’s Hillary Clinton’s Emails: eDiscovery Trends

Early in the life of this blog, we published a blog post called eDiscovery 101: Simply Deleting a File Doesn’t Mean It’s Gone to try to help our readers understand how disk drives keep track of files and how “deleted” files often can still be recovered. Something tells me that basic forensic concept will become a big issue in the coming weeks and months regarding Hillary Clinton’s deleted emails.

As reported by Politico in Hillary’s emails: Deleted but not gone (by Joseph Marks and Rachael Bade), Clinton’s attorney David Kendall on Friday wrote Benghazi Committee Chairman Rep. Trey Gowdy (R-S.C.), declining the committee’s request for the personal server that she used for emails while she was Secretary of State (which we discussed previously here) to be turned over to an independent third party. The committee said it wants a third party to verify that all Benghazi-related emails were in fact turned over to the panel – especially after Clinton acknowledged deleting anything determined to be “personal” messages. Kendall called the request pointless, saying Clinton’s IT staff had confirmed to him the messages are gone for good (Gowdy, in a statement, said that Clinton “unilaterally decided to wipe her server clean and permanently delete all emails from her personal server”).

But, are the emails really gone? According to my colleague, Michael Heslop, Vice President of Computer Forensics at CloudNine, that depends on what they mean by “wiped”. “If they forensically wiped the server, then it’s likely not recoverable from there”, said Heslop. “But, the data might still be available via other sources, such as backups or an offline storage table (OST) file on the computer that was used for email.”

As an example, the Politico article references the case of former Internal Revenue Service official Lois Lerner, who came under scrutiny over charges that the IRS targeted tea party groups for heightened scrutiny, after the IRS said that a 2011 hard-drive crash rendered her emails irretrievable. The agency trashed the hard drive and said it had over-written back-up tapes, yet other recovered back-up tapes appears to have yielded the missing emails.

Not surprisingly, the conservative group Freedom Watch has filed a racketeering lawsuit against Clinton that accuses her of failing to produce documents under the Freedom of Information Act (FOIA). So, expect efforts to scrutinize the deletion of Clinton’s emails to intensify. And, that’s no April Fools joke.

So, what do you think? Have you ever had to recover deleted emails? Were you successful in doing so? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Alon Israely, Esq., CISSP of BIA: eDiscovery Trends

This is the third of the 2015 LegalTech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY this year and generally asked each of them the following questions:

  1. What are your general observations about LTNY this year and how it fits into emerging trends? Do you think American Lawyer Media (ALM) should consider moving LTNY to a different time of year to minimize travel disruptions due to weather?
  2. After our discussion last year regarding the new amendments to discovery provisions of the Federal Rules of Civil Procedure, additional changes were made to Rule 37(e). Do you see those changes as being positive and do you see the new amendments passing through Congress this year?
  3. Last year, most thought leaders agreed that, despite numerous resources in the industry, most attorneys still don’t know a lot about eDiscovery. Do you think anything has been done in the past year to improve the situation?
  4. What are you working on that you’d like our readers to know about?

Today’s thought leader is Alon Israely. Alon is the Manager of Strategic Partnerships at Business Intelligence Associates, Inc. (BIA) and currently leads the Strategic Partner Program at BIA. Alon has over eighteen years of experience in a variety of advanced computing-related technologies and has consulted with law firms and corporations on a variety of technology issues, including expert witness services related to computer forensics, digital evidence management and data security. Alon is an attorney and a Certified Information Systems Security Professional (CISSP).

What are your general observations about LTNY this year and how it fits into emerging trends? Do you think American Lawyer Media (ALM) should consider moving LTNY to a different time of year to minimize travel disruptions due to weather?

I didn’t get to spend as much time on the floor and in the sessions as I would like because, for me, LTNY has become mostly meetings. On the one hand, that doesn’t help me answer your question as completely as I could but, on the other hand, it’s good for ALM because it shows that there’s business being conducted. A big difference between this year and last year (which may be reflective of our activity at BIA, but others have said it as well), is that there has been more substantive discussions and deal-making than in the past. And, I think that’s what you ultimately want from an industry conference.

Also, and I’m not sure if this is because of attrition or consolidation within the industry, but there seems to be more differentiation among the exhibitors at this year’s show. It used to be that I would walk around LegalTech with outside investors who are often people not from the industry and they would comment that “it seems like everybody does the same thing”. Now, I think you’re starting to see real differentiation, not just the perception of differentiation, with exhibitors truly offering solutions in niche and specialized areas.

As for whether ALM should consider moving the show, absolutely! It seems as though the last few years that has been one of the conversation topics among many vendors as they’re setting up before LegalTech as they ask “why is this happening again” with the snow and what-not. We’ve certainly had some logistics problems the past couple of years.

I do think there is something nice about having the show early in the year with people having just returned from the holidays, getting back into business near the beginning of Q1. It is a good time as we’re not yet too distracted with other business, but I think that it would probably be smart for ALM to explore moving LTNY to maybe the beginning of spring. Even a one-month move to the beginning of March could help. I would definitely keep the show in New York and not move the location; although, I would think that they could consider different venues besides the Hilton without affecting attendance. While some exhibitors might say keep it at this time of year to coordinate with their release schedules, I would say that’s a legacy software answer. Being in the SaaS world, we have updates every few weeks, or sooner, so I think with the new Silicon Valley approach to building software, it shouldn’t be as big a deal to match a self- created release schedule. Marketing creates that schedule more than anything else.

After our discussion last year regarding the new amendments to discovery provisions of the Federal Rules of Civil Procedure, additional changes were made to Rule 37(e). Do you see those changes as being positive and do you see the new amendments passing through Congress this year?

I think that they’re going to pass Congress. I’ve been focusing on the changes related to preservation as it seems that most noteworthy cases, especially those involving Judge (Shira) Scheindlin, involve a preservation mistake somewhere. For us at BIA, we feel the Rules changes are quite a validation of what we’re doing with respect to requiring counsel to meet early to discuss discovery issues, and to force the issue of preservation to the forefront. Up until these changes, only savvy and progressive counsel were focused on how legal hold and preservation was being handled and making sure, for example, that there wasn’t some question eight months down the road about some particular batch of emails. The fact that it is now codified and that’s part of the pre-trial “checklist” is very important in creating efficiencies in discovery in general and it’s great for BIA, frankly, because we build preservation software. It validates needing an automated system in your organization which will help you comply.

Last year, most thought leaders agreed that, despite numerous resources in the industry, most attorneys still don’t know a lot about eDiscovery. Do you think anything has been done in the past year to improve the situation?

I hate to sound pessimistic, and obviously I’m generalizing from my experience, but it feels like attorneys are less interested in learning about eDiscovery and more interested in being able to rely on some sort of solution, whether that solution is software or a service provider, to solve their problems. It’s a little bit of a new “stick your head in the sand” attitude. Before, they ignored it; now, they just want to “find the right wrench”. It’s not always just one wrench and it’s not that easy. It is important to be able to say “we use this software and that software and this vendor and here’s our process” and rely on that, but the second step is to understand why you are relying on that software and that vendor. I think some lawyers will just say “great, I’ll buy this software or hire this vendor and I’m done” and check that check box that they now have complied with eDiscovery but it’s important to do both – to purchase the right software or hire the right vendor AND to understand why that was done.

Certainly, vendors may be part of the problem – depending upon how they educate. At BIA, we promote TotalDiscovery as a way of not having to worry about your preservation issues, not having data “fall through the cracks” and that you’ll have defensible processes. We do that but, at the same time, we also try to educate our clients too. We don’t just say “use the software and you’re good to go”, we try to make sure that they understand why the software benefits them. That’s a better way to sell and attorneys feel better about their decision to purchase software when they fully understand why it benefits them.

What are you working on that you’d like our readers to know about?

As I already mentioned, BIA has TotalDiscovery, our SaaS-based preservation software and we are about to release what we call “real-time processing”, which effectively allows for you to go from defensible data collections to searching that collected data in minutes. So, you can perform a remote collection and, within a few minutes of performing that collection, already start to perform eDiscovery caliber searches on that data. We call it the “time machine”. In the past, you would send someone out to collect data, they would bring it back and put it into processing software, then they would take the processed data and they’d search it and provide the results to the attorneys and it would be a three or four week process.

Instead, our remote collection tool lets you collect “on the fly” from anywhere in the world without the logistics of IT, third-party experts and specialized equipment and this will add the next step to that, which is, after collecting the data in a forensically sound manner, almost immediately TotalDiscovery will allow you to start searching it. This is not a local tool – we’re not dropping agents onto someone’s machine to index the entire laptop, we’re collecting the data and, using the power of the cloud and new technology to validate and index that data at super high speeds so that users (corporate legal departments and law firms) can quickly perform searches, view the documents and the hit highlights, as well as tag and export documents and data as needed. It changes the way that the corporate user handles ECA (early case assessment). They get defensible collection and true eDiscovery processing in one automated workflow. We announced that new release here at LegalTech, we’ll be releasing it in the next few weeks and we’re very excited about it.

Thanks, Alon, for participating in the interview!

And to the readers, as always, please share any comments you might have or if you’d like to know more about a particular topic!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Brad Jenkins of CloudNine: eDiscovery Trends

This is the first of the 2015 LegalTech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY this year and generally asked each of them the following questions:

  1. What are your general observations about LTNY this year and how it fits into emerging trends? Do you think American Lawyer Media (ALM) should consider moving LTNY to a different time of year to minimize travel disruptions due to weather?
  2. After our discussion last year regarding the new amendments to discovery provisions of the Federal Rules of Civil Procedure, additional changes were made to Rule 37(e). Do you see those changes as being positive and do you see the new amendments passing through Congress this year?
  3. Last year, most thought leaders agreed that, despite numerous resources in the industry, most attorneys still don’t know a lot about eDiscovery. Do you think anything has been done in the past year to improve the situation?
  4. What are you working on that you’d like our readers to know about?

Today’s thought leader is Brad Jenkins of CloudNine™. Brad has over 20 years of experience as an entrepreneur, as well as 15 years leading customer focused companies in the litigation support arena. Brad has authored several articles on document management and litigation support issues, and has appeared as a speaker before national audiences on document management practices and solutions. He’s also my boss! 🙂

What are your general observations about LTNY this year and how it fits into emerging trends? Do you think American Lawyer Media (ALM) should consider moving LTNY to a different time of year to minimize travel disruptions due to weather?

LTNY seemed reasonably well attended this year and I think it was a good show. I have noticed a drop in the number of listed exhibitors though, from 225 a couple of years ago to 199 this year. Not sure if that’s a reflection of consolidation in the industry or providers simply choosing to market to prospects in other ways. I guess we’ll see. Nonetheless, I thought there were several good sessions, especially the three judges’ sessions that addressed key cases, the rules changes and general problems with discovery. I liked the fact that those were free and available to all attendees, not just paid ones. Not surprisingly, those sessions were very well attended.

Overall, I thought the primary focus of this show’s curriculum in three areas: information governance (which had its own educational track at the show), cybersecurity and data privacy. With the amazing pace at which Big Data is growing, I expect information governance to be a major topic for some time to come, especially with regard to the use of technology to manage growing data volumes. And, as we discussed in this blog a couple of weeks ago, data breaches continue to be on the rise and we’ve already had a major one involving over 80 million records this year. That’s also going to continue to be a major focus.

One issue at the show that I think affected several attendees was the sudden lack of meeting space. The Hilton got rid of its lobby lounge, replacing it with a smaller executive lounge limited to hotel guests. And, ALM booked up the Bridges Bar for private events throughout the show. Meetings and discussions are a big part of LTNY and I hope ALM will take that into account next year and at least make the Bridges Bar available for meetings.

As for whether ALM should consider moving LTNY to a different time of year, there are pros and cons to that. As a person who missed the show entirely last year due to weather and travel issues and was delayed a few hours this year, it would be nice to minimize the chance of weather delays. On the other hand, I suspect that part of the reason that the show is in the winter is that it’s less costly to host then. Certainly, vendors would need an advanced heads up of at least a year if ALM were to decide to move the show to a different time of year. I don’t expect that to happen, despite the recent travel issues for remote attendees.

After our discussion last year regarding the new amendments to discovery provisions of the Federal Rules of Civil Procedure, additional changes were made to Rule 37(e). Do you see those changes as being positive and do you see the new amendments passing through Congress this year?

I’m not an attorney and am no expert on the rules, but, based on everything that I’ve heard, it sounds as though they should pass. I know that large organizations are counting on Rule 37(e) to reduce their preservation burden. I think whether it will or not will depend on judges’ interpretation of Rule 37(e)(2) (which enables more severe sanctions “only upon finding that the party acted with the intent to deprive another party of the information’s use”). That section may result in lesser sanctions in at least some cases, but we’ll see. At eDiscovery Daily, we’ve covered over 60 cases per year each of the past three years, so at some point in a year or two, it will be interesting to look back at trends and what they show.

Last year, most thought leaders agreed that, despite numerous resources in the industry, most attorneys still don’t know a lot about eDiscovery. Do you think anything has been done in the past year to improve the situation?

I think it’s still a battle. We continue to work with a lot of firms whose attorneys lack basic eDiscovery fundamentals and we continue to provide education through this blog and consulting to attorneys to assist them with technical language in requests for production to ensure that they receive the most useful form of production to them, native files with included metadata. I think it’s imperative for providers like us to continue to do what we can to simplify the discovery process for our clients – through education and through streamlining of processes and process improvement. That’s what our corporate mission is and it continues to be a major focus for CloudNine.

What are you working on that you’d like our readers to know about?

Well, speaking of has “anything been done in the past year to improve the situation”, in November, we released CloudNine’s new easy-to-use Discovery Client application to automate the processing and uploading of raw native data into our CloudNine platform. Many of our clients have struggled with having data dumped on their desk at 4:00 on a Friday afternoon and having to fill out forms, swap emails and play phone tag with vendors to get the data up quickly so that they can review it over the weekend. With CloudNine’s Discovery Client, they can get data processed and loaded themselves without having to contact a vendor, whether it is load ready or not.

The application will extract data from archives such as ZIP and PST files, extract metadata, extract and index text (and OCR documents without text) render native files to HTML and identify duplicates based on MD5HASH value. The application will also generate key data assessment analytics such as domain categorization to enable attorneys to develop an understanding of their data more quickly. And, we are just about to release a new version of the Discovery Client that will enable clients to simply process the data and retrieve the processed data to load into their own preferred platform (if it’s not CloudNine), so we can support you even if you use a different review platform.

Our do-It-yourself features such as loading your own data, adding your own users and fields, accessing audit logs and setting user rights gives our clients unique control of their review process and makes it easier for them to understand eDiscovery and feel in control of the process. Simplifying discovery and taking the worry out of it (as much as possible) is what CloudNine is all about.

Thanks, Brad, for participating in the interview!

And to the readers, as always, please share any comments you might have or if you’d like to know more about a particular topic!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

The First 7 to 10 Days May Make or Break Your Case: eDiscovery Best Practices

Having worked with a client recently that was looking for some guidance at the outset of their case, it seemed appropriate to revisit this topic here.

When a case is filed, several activities must be completed within a short period of time (often as soon as the first seven to ten days after filing) to enable you to assess the scope of the case, where the key electronically stored information (ESI) is located and whether to proceed with the case or attempt to settle with opposing counsel. Here are several of the key early activities that can assist in deciding whether to litigate or settle the case.

Activities:

  • Create List of Key Employees Most Likely to have Documents Relevant to the Litigation: To estimate the scope of the case, it’s important to begin to prepare the list of key employees that may have potentially responsive data. Information such as name, title, eMail address, phone number, office location and where information for each is stored on the network is important to be able to proceed quickly when issuing hold notices and collecting their data. Some of these employees may no longer be with your organization, so you may have to determine whether their data is still available and where.
  • Issue Litigation Hold Notice and Track Results: The duty to preserve begins when you anticipate litigation; however, if litigation could not be anticipated prior to the filing of the case, it is certainly clear once the case if filed that the duty to preserve has begun. Hold notices must be issued ASAP to all parties that may have potentially responsive data. Once the hold is issued, you need to track and follow up to ensure compliance. Here are a couple of posts from 2012 regarding issuing hold notices and tracking responses.
  • Interview Key Employees: As quickly as possible, interview key employees to identify potential locations of responsive data in their possession as well as other individuals they can identify that may also have responsive data so that those individuals can receive the hold notice and be interviewed.
  • Interview Key Department Representatives: Certain departments, such as IT, Records or Human Resources, may have specific data responsive to the case. They may also have certain processes in place for regular destruction of “expired” data, so it’s important to interview them to identify potentially responsive sources of data and stop routine destruction of data subject to litigation hold.
  • Inventory Sources and Volume of Potentially Relevant Documents: Potentially responsive data can be located in a variety of sources, including: shared servers, eMail servers, employee workstations, employee home computers, employee mobile devices, portable storage media (including CDs, DVDs and portable hard drives), active paper files, archived paper files and third-party sources (consultants and contractors, including cloud storage providers). Hopefully, the organization already has created a data map before litigation to identify the location of sources of information to facilitate that process. It’s important to get a high level sense of the total population to begin to estimate the effort required for discovery.
  • Plan Data Collection Methodology: Determining how each source of data is to be collected also affects the cost of the litigation. Are you using internal resources, outside counsel or a litigation support vendor? Will the data be collected via an automated collection system or manually? Will employees “self-collect” any of their own data? If so, important data may be missed. Answers to these questions will impact the scope and cost of not only the collection effort, but the entire discovery effort.

These activities can result in creating a data map of potentially responsive information and a “probable cost of discovery” spreadsheet (based on initial estimated scope compared to past cases at the same stage) that will help in determining whether to proceed to litigate the case or attempt to settle with the other side.

So, what do you think? How quickly do you decide whether to litigate or settle? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.