Project Management

internal software infrastructure

Optimizing Your Infrastructure for LAW & Explore eDiscovery

By: Joshua Tucker

It’s safe to say Microsoft isn’t going out of business anytime soon. Last year alone they grew 18 percent, reaching 168 billion dollars*. They are continuously making updates to their software, improving their products and functionality, and purchasing emerging software. They want to empower every person and organization on the planet to achieve more*, but the power you obtain from the software is up to you. Microsoft does not know your intended purpose or use of their software; all they can do is provide the software and the barebone requirements to make it run.

CloudNine software is no different. Let’s take a deep dive into your infrastructure and how you can optimize it with the CloudNine on-premise processing platforms.

We see that several of our clients run their environments with the most minimal recommended resources. Just like Microsoft can’t know how large your SQL server needs to be, we don’t know the level of demand your client’s data is putting on your workstation. What we DO know is that the number of files per case is growing, the complexity of files is growing, and resources are sparse.

We will cover the areas where we can make vast improvements in the efficiency in the way you are using your CloudNine software.

Your Local Area Network

Let’s use the common “business triangles” as a frame of reference. Examples would be “people, technology, and process” or “team, leadership, and mission”, or, my favorite, “price, speed, and quality”. The more your balanced business triangle, the better. Too much or not enough emphasis on one side and that balance will start to wane.

The eDiscovery version of the business triangle is called the ‘Local Area Network’. The first side of this ‘Local Area Network’ is the hardware or the backbone of your infrastructure. The second side would be the software, or the muscle needed to use that backbone. The third side is your network file server or the brain’s storage area, which will hold all the knowledge that our software is going to discover for you. And finally, the three sides are then connected, like sinew, with your local network speed.

You want to find the sweet spot that balances cost, throughput demands, speed to review, and hardware budget. Let us go ahead and call this the “Goldilocks Zone”.

Real-life case study: About 8 years ago, we were working with a client that had a few virtual machines and a few physical machines. The virtual machines were 4 core and 8GB of RAM. The physical machines were 8 core and 16GB of RAM.  IT wanted to get rid of the physical machines, but there was resistance to letting them go because they were able to process so much faster than the virtual machines. We conducted some testing to find the Goldilocks Zone between the amount of data being processed, the expected speed, and the cost. We created a few virtual machines with 4, 8, and 12 cores and ran tests to determine the correct core count for our company. We determined that an 8-core box with 16GB of RAM was able to process data much faster than a 4-core box with only 8GB of RAM.

After we completed optimizing the processing machines, we ventured forth into the other areas of our infrastructure.

Next, we reached out to our SQL team to see what would happen if we added more RAM and more SQL cores. We saw the same result. As we added more resources, we found that we were able to increase the speed on LAW’s communication with SQL. Faster communication equals a faster read/write, which equated to a faster processing speed. During this testing we also found that the more SQL cores, the more we could horizontally spread out the processing tasks on our LAW machines (i.e., we could have more machines writing to the same database).

Note: Today, I have a simple equation to determine the correct size of SQL:  Take the total number of read/write instances that can be communicating or interacting with SQL. Divide that number by three. The resulting number is the SQL cores needed. For RAM, take the same number of instances and multiply it by four.

After we completed this environment review, we had larger machines, faster read/write capability, and more machines to process on each matter. The Goldilocks Zone for SQL ensures that you have the right number of SQL cores and RAM per instances that have read/write work with SQL.

(For LAW workstations is highly suggested at 8 core and 16gb of RAM. For Explore that was 8 core and 32gb of RAM.)

Note: Your LAN does not have to be local to your office, but SQL, the LAW database folder structure and the workstations all need to be in close proximity to each other. The closer the better.

Software and Upgrades

Let’s go back to our Microsoft analogy. Microsoft keeps improving their product and each version of the operating system has the potential of changing the location or how certain files work. It is imperative that the operating system that is installed on your workstations is supported by the version of the product that you are going to use. If it isn’t, the software could act in a way that is completely unexpected – or worse.

The data we process can be a threat to our organization (and this does go for everyone!) and the best way to protect yourself is to be up to date on patches and virus software. I highly suggest that you first patch in a test environment, testing each part of the tool and making sure that the patching will not interfere with your work. The more up to date you can test, the more secure your, and your client’s, data will be.

One thing I like about the right test environment is that once your testing is done, you can make an image and deploy that image to the rest of your workstations. It is fast and efficient.

How your processing engine gets metadata to you matters. For instance, there are engines, like LAW, that will expand the files and harvest all the metadata. This type of processing is slower in getting the data in review, but much faster in the final export. There are also engines, like CloudNine Explore, that will hold off on expanding the data but harvest all the text and metadata extremely quickly. This workflow is great for ECA purposes.

How deep these tools dig into your data is also important. You never want a want privileged document produced because your processing engine did not discover it. Find out if your engine is collecting all the natives, text, and metadata that you need for these legal matters, and then come up with a workflow that will accentuate the strengths of your tool.

Having an Investment in your File Storage

The price of data storage has been coming down for years. Which is great news considering the fact that discoverable data keeps growing and will continue grow at an astounding pace. It is estimated that this past year, that each person on the planet created 1.7 megabytes of information each second. Every matter’s data size has increased and with it, the speed to review. All of this must run efficiently, all of it must be backed up, and all of it must be in your disaster recovery plans.

Network speeds matters. It ties your infrastructure together. If the processing machine can’t talk to the SQL machines quickly, or to the network storage efficiently, then it won’t perform at top speed, no matter how many cores you have. Network speed should be considered not only for the processing department, but for your whole company. We highly suggest a gigabit network, and if you are a firm or legal service provider, you might want to be looking at a 10-gigabit network.

Even with a gigabit network, your workstations, SQL server, and file server need to be local to each other. Having one data center or a or central location helps keep those resources working more effectively, getting you a higher return on investment on your machines.

Pro tip! There is a quick and easy way to test your network speed without having to contacted IT. Find a photo that is near 1mb and put it in the source location. Log into one of your workstations, open a window to that source location, and drag that image to your desktop. Then, drag it back. Both times that you move this image should be instantaneous to you. If either move takes a more than one second, then your network speed needs to be improved.

RECAP

It is our responsibility to figure out what we need to get full capacity out of outside tools. To run CloudNine’s LAW we need workstations that have at least an 8 core and 16gb RAM. For CloudNine Explore workstations, we need 8core and 32gb or RAM and SQL environment that adjusts to number of instances that are interacting with it.

Ensure that your software matches up with the recommended versions for your processing engine. If you are on or are working with an operating system that wasn’t on the list of that processing engine, we know that you could get unexpected results – or worse data. Line up the programs, test before you deploy, and stay up to date.

Know where your data is stored and the speed at which your systems talk to each other. Keep your environment in close proximity.

All in all, in order to get the top speed and performance out of CloudNine’s tools (or our third-party software your purchase), you must invest into the right resources.

Keep working towards your “Goldilocks Zone” – the sweet spot between speed, price, and quality.

If you are interested in having a CloudNine expert analyze your environment and provide recommendations for efficiencies, please contact us for a free Health Check.

 

*https://www.statista.com/statistics/267805/microsofts-global-revenue-since-2002/

* https://www.priceintelligently.com/blog/subscription-revenue-adobe-gopro-microsoft-gillette

* https://www.comparably.com/companies/microsoft/mission

* https://docs.microsoft.com/en-us/sql/sql-server/install/hardware-and-software-requirements-for-installing-sql-server-2019?view=sql-server-ver15

 

Four Inefficiency Traps to Avoid in Your Legal Document Review Process

For every time-saving, cost-cutting efficiency available in legal document review lives an equal number of challenges and pitfalls which can consume your productivity and budget. For LSPs and law firms, a thorough and effective legal review will depend on more than just data size and solution speed. Navigating successfully through the review process means knowing where you can expedite and streamline your project with efficiency and how to avoid costly mistakes.

Read on to learn about four potential inefficiency traps you can avoid in your next legal review to save time and money:

  1. Document format and storage
  2. Inefficient upload speeds
  3. Duplicate data
  4. Single-user access to documents

Trap 1: Document Format and Storage

One of the first challenges to overcome is determining the best method to consolidate and convert collected data into searchable content. From digital emails and websites to printed letters and hand-written notes, different document formats are collected and stored across several disparate systems. While you may have some stored in Outlook, others could be kept in a binder on your desk.

A legal document review system digitizes and stores every document in one place, allowing you to search and review all documents at the same time. This enables you to apply a search strategy to locate relevant documents quickly and efficiently. It also provides you with the flexibility to view data in different, organized layouts to easily see document attributes such as:

  1. Source
  2. Type
  3. Origin date
  4. Author
  5. Recipients

With all case documents organized and stored on a single platform, LSPs and legal departments can locate and produce responsive content, ranging from scanned documents to email to spreadsheets and more.

Trap 2: Inefficient Upload Speeds

Initiating your review project will be determined by the speed of your initial data import. This phase can make or break the rest of your project timeline making it essential to start off strong.

Scheduling and staying within the time budgeted for your project will equally affect the efficiency of your whole team. The faster your team can scan and import documents, the faster you can start your document review.

While we can’t control your connection speed, we can manage the resources and technology on our platform to ensure the application performance is optimized for maximum efficiency.

Time equals money; having an eDiscovery tool capable of moving as quickly as you do allows you to work on the next step of your case faster.

Trap 3: Duplicate Data

Nearly 30% of email data is duplicated which directly impacts hosting costs if not removed prior to promotion for review.  Duplicate data occurs when the same file originates from multiple sources and in different formats.

For example, if you have two people engaged in an email exchange and both become custodians in a legal case, both sets of emails are collected for discovery. Now you have the same exchange from both people and you have to determine which set of emails you’re going to use. The complexity of duplicate data increases when the matter is shared across email distribution groups.

By cutting out duplicative documents, you save storage space and reduce the chance that two copies of the same document will be reviewed differently.

To prevent duplicate data from costing time and money, you need an eDiscovery tool to:

  • Centralize your data in one place
  • Eliminate duplicative data
  • Track how data is being reviewed in real-time
  • Prevent conflicting tags by different reviewers

Trap 4: Single User Access to Documents

Remote document review should be an easy and convenient option for you and your staff. However, documents still need to be digitized and uploaded to a shared system. This can be problematic for a number of reasons:

  • You don’t have anyone in the office to upload documents.
  • You don’t have the infrastructure in place to share working documents across multiple users at the same time.
  • You don’t have the ability to review, redact, and produce documents electronically without affecting the originals.

This forces the organization to spend time and money building new infrastructure. Or, they could use a private cloud-hosted system like CloudNine Review.

 

How CloudNine Review Helps You Avoid Inefficiency Traps

CloudNine Review is a safe, robust, and cost-effective solution that simplifies the eDiscovery review process and keeps you more productive.

We offer a single spot repository for all your discovery documents. Whether they are electronic or paper documents, you can load them into CloudNine Review to make them searchable. This allows you to access all the data at the same time giving you a consistent search strategy.

By utilizing a search strategy, you create an efficient way to review your data without wasting time by:

  • Showing search-term history
  • Filtering out previously reviewed documents
  • Setting up preview sets

With incredibly fast upload speeds on our end, installation is simple and straightforward. If there’s a slow connection speed on your end, we can help you identify the source of the problem while offering alternative solutions to upload heavy data loads.

To prevent duplicate data from slowing down your legal document review process, our processing engine detects duplicates and suppresses them before the data gets advanced for review.  Plus, all documents are hashed during the import process, so you can set up automation to identify and review specific documents from the searchable and reviewable records.

Hosted on a private cloud, CloudNine Review is a web-accessible, legal document review platform providing secure access to every approved member of your team. Every document is locked down so nothing can be deleted, altered, or sent to anyone without access. Even metadata like the author and timestamps are protected.

To protect sensitive or confidential data from being exposed, CloudNine Review will redact images of documents. Redacted files are copied and saved as a single-layer file so the redaction bars can’t be removed by outside parties.

 

CloudNine Review is designed to help your eDiscovery services be more efficient and productive.

To avoid the pitfalls of inefficiency traps, click banner below to request a free demo and see how CloudNine Review can help you today.

Chain, Chain, Chain – Chain of Custody: eDiscovery Throwback Thursdays

Here’s our latest blog post in our Throwback Thursdays series where we are revisiting some of the eDiscovery best practice posts we have covered over the years and discuss whether any of those recommended best practices have changed since we originally covered them.

This post was originally published on June 24, 2013 – over six years ago.  Back then, we referenced both baseball player Ryan Braun and legendary singer Aretha Franklin in a single post(!).  Braun ultimately did receive a suspension from Major League Baseball for his involvement with a clinic associated with performance enhancing drugs, but has resumed a successful playing career.  And, of course, the Queen of Soul is no longer with us, sadly.

As for chain of custody tracking, it’s as important as ever.  But technology has helped us out here with some mechanisms to automate the delivery of files.  The use of File Transfer Protocol (FTP) for transfer of files has become commonplace for even fairly large document sets and the use of secured FTP protocols (such as SFTP and FTPS) have become commonplace.  At CloudNine, most of the data we receive from clients today for loading into our CloudNine Review platform is received via secured FTP – either directly or through our Discovery Client that automates the loading of data into the platform.

However, our Client Services team still receives some data from clients via media transportation, especially when it’s a lot of data (we’re often talking terabytes, not gigabytes) and needs to get to us quickly and securely.  In those instances, we still follow the same chain of custody procedures described below to document that transfer.  When it comes to those types of transfers, ensuring proper chain of custody tracking is also an important part of handling that ESI through the eDiscovery process in order to be able to fight challenges of the ESI by opposing parties.  An insufficient chain of custody is a chain, chain, chain of fools.

Information to Track for Chain of Custody

ESI can be provided by a variety of sources and in a variety of media, so you need a standardized way of recording chain of custody for the ESI that you collect within your organization or from your clients.  At CloudNine, we use a standard form for capturing chain of custody information.  Because we never know when a client will call and ask us to pick up data, our client services personnel typically have a supply of blank forms either in their briefcase or in their car (maybe even both).

Our chain of custody tracking form includes the following:

  • Date and Time: The date and time that the media containing ESI was provided to us.
  • Pick Up or Delivery Location: Information about the location where the ESI was provided to us, including the company name, address, physical location within the facility (e.g., a specific employee’s office) and any additional information important to note where the data was received.
  • Delivering Party: Name of the company and the name of representative of the company providing the media, with a place for that representative to sign for tracking purposes.
  • Delivery Detail (Description of Items): A detailed description of the item(s) being received. Portable hard drives are one typical example of the media used to provide ESI to us, so we like to describe the brand and type of hard drive (e.g., Western Digital My Passport drive) and the serial number, if available.  Record whatever information is necessary to uniquely identify the item(s).
  • Receiving Party: Name of the company and the name of representative of the company receiving the media, with a place for that representative to sign for tracking purposes. In our form, that’s usually somebody from CloudNine Discovery, but can be a third party if they are receiving the data from the original source – then, another chain of custody form gets completed for them to deliver it to us.
  • Comments: Any general comments about the transfer of media not already addressed above.

I’ve been involved in several cases where the opposing party, to try to discredit damaging data against them, has attacked the chain of custody of that data to raise the possibility that the data was spoliated during the process and mitigate its effect on the case.  In these types of cases, you should be prepared to have an expert ready to testify about the chain of custody process to counteract those attacks.  Otherwise, you might be singing one of Aretha Franklin’s most famous songs (but not as well as she did).

So, what do you think?  How does your organization track chain of custody of its data during discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Understanding Blockchain and its Impact on Legal Technology, Part Six

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Will Lawyers Ever Embrace Technology?, which we covered as part of a webcast on November 28 of last year.  Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into six parts, so we’ll cover each part separately.  Part one was last Monday, part two was last Wednesday, part three was last Friday, part four was this Monday and part five was this Wednesday, here’s the sixth and final part.

Conclusions

So, where do we go from here from a legal technology standpoint?  Let’s take a look at some current developments.

Current Developments

Much of the momentum that I saw gathering at ILTACON17 led to the establishment of the Global Legal Blockchain Consortium. Members of the consortium include the law firms Baker Hostetler and Orrick, as well as IBM Watson Legal. Their goal is to explore how blockchain technology can solve real-world legal problems as well as drive the adoption and standardization of blockchain in the legal industry.

The consortium is not the only such effort. The Enterprise Ethereum Alliance (EEA), a cross-industry collaborative blockchain consortium aiming to leverage open-source Ethereum technology for enterprise solutions, has a” Legal Industry Working Group”. Members of that group include CooleyDebevoise & Plimpton, GoodwinHogan LovellsHolland & KnightJones DayLatham & WatkinsMorrison & FoersterPerkins CoieShearman & SterlingCardozo Law School, Duke Center on Law & Technology, and the Department of Legal Studies and Business Ethics at the University of Pennsylvania’s Wharton School.

The consortium held a kick-off event called the MIT Legal Forum on AI + Blockchain in the fall of 2017. Although that effort appears to have slowed in 2018, ongoing efforts can be monitored on the EEA site. For a more in-depth report on the subject, see  Bob Ambrogi’s “Law Sites” blog post

Final Thoughts

It’s clear that blockchain has become a breakthrough topic and I expect to see much more development for legal applications in the near future. One of the challenges is how middle market clients which do not have the extensive systems that a large company might have can effectively leverage this technology and Grant Thornton is one of the players focused on this market.

Proponents will have to continue their efforts to lower uncertainty about blockchain systems stability and increase its profile as a serious business tool.  I expect to see both of those occur as the year continues.

So, what do you think?  Do you better understand blockchain now and how it can impact the legal profession?  We hope so!  And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Understanding Blockchain and its Impact on Legal Technology, Part Four

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Will Lawyers Ever Embrace Technology?, which we covered as part of a webcast on November 28 of last year.  Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into six parts, so we’ll cover each part separately.  Part one was last Monday, part two was last Wednesday and part three was last Friday, here’s the fourth part.

General Use Cases for Blockchain

Several actual examples may show the actual utility of blockchain.

Searching

In 2001, Microsoft researchers, Banko and Brill, released a paper Scaling to Very Very Large Corpora for Natural Language Disambiguation,  which described how most work in the area of natural language processing was on small data sets of less than a million words. Error rates for algorithms such as Naive Bayes and Perceptrons were 25%, while newer memory-based algorithms achieved 19% error rates.

But as they added MORE data — not just a bit more, but orders of magnitude more — and kept the algorithms the same, then the error rates kept going down. A dataset which was three orders of magnitude larger had an error rate of less than 5%.  Even more surprising, the best-performing algorithms were the simplest and always outperformed more state-of-the-art systems.

Then, in 2007, Google researchers, Halevy, Norvig and Pereira, published a paper called The Unreasonable Effectiveness of Data  showing how data could be “unreasonably effective” across many AI domains. Hence, the rise of deep learning systems and the reemergence of backprop neural networks from the ’80s which are equally effective in massive datasets with more recent technologies.

So decentralized and shared control typically leads to better performing  models.  And since the decentralized nature of blockchains encourages data sharing, it works better whether the network is local or worldwide.

Security

Blockchain eliminates the risks that come with centralized data because it stores data across the network. Thus, it doesn’t have centralized points of vulnerability that computer hackers traditionally exploit. No more “username/password” systems, but rather encryption technology and constantly updating audit trails

A blockchain, as the name implies, is a chain of digital “blocks” that contain records of transactions. The records on a blockchain are secured through cryptography and network participants have their own private keys that are assigned to the transactions they make and act as a personal digital signature.

However, despite inherent properties that provide security, known vulnerabilities in your infrastructure can be manipulated by hackers. Any system supporting blockchain should have these capabilities at a minimum:

  • Be able to prevent anyone, up to and including administrators, from accessing sensitive information
  • Ability to deny illicit attempts to change data or applications within the network.
  • Use highest-grade security standards to protect encryption keys

We’ll publish Part 5 – General Use Cases for Blockchain – on Wednesday.

So, what do you think?  Do you understand blockchain and how it can impact the legal profession?  If not, keep reading!  And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Understanding Blockchain and its Impact on Legal Technology, Part Three

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Will Lawyers Ever Embrace Technology?, which we covered as part of a webcast on November 28 of last year.  Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into six parts, so we’ll cover each part separately.  Part one was Monday and part two was Wednesday, here’s the third part.

Advantages and Challenges of Blockchain

So, why is blockchain becoming more popular and what advantages are associated with it?  And, if it’s so great, why aren’t more people using it?

Advantages of Blockchain

Blockchain has several structural advantages:

  • Establishes a definitive record for a given transaction
  • An organization can embed the verification for the transaction within the transactional record itself,
  • It is readily accessible
  • It is easily verifiable
  • It is immutable
  • It is transparent
  • Offers assurance across all transactions subject to the blockchain.
  • Allows full testing of the population in its entirety
  • Allows reliable spot-checks at any time
  • No need for third party audit to sample a portion of transactions and extrapolate from the sample based upon statistical probabilities because blockchain exposes the full population of transactions

Challenges to Blockchain Adoption

At the same time, Blockchain faces several distinct challenges to widespread adoption, including:

  • Business leaders want practical solutions and blockchain is still considered by many to be an esoteric solution
  • Are their blockchain standards to which businesses can refer?
  • Are distributed ledgers actually slower than centralized ones?
  • Are distributed ledgers easily available to all users?
  • How secure are distributed ledgers?
  • Can privacy be assured in a blockchain scheme?
  • How does security differ in public vs private blockchains?

We’ll publish Part 4 – General Use Cases for Blockchain – next Monday.

So, what do you think?  Do you understand blockchain and how it can impact the legal profession?  If not, keep reading!  And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Understanding Blockchain and its Impact on Legal Technology

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Will Lawyers Ever Embrace Technology?, which we covered as part of a webcast on November 28 of last year.  Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into six parts, so we’ll cover each part separately.  Here’s the first part.

Introduction

I first started paying attention to blockchain at ILTACON17 when I noticed how often it was cited in security sessions.  Like many people, I had associated blockchain only with bitcoin, and thus tended to dismiss it as a one trick pony.

Even thought Don & Alex Tapscott described it in their 2016 book, Blockchain Revolution , as “ … the next generation Internet.”, I also had trouble seeing it as a solution for day to day business problems.  It didn’t seem to me be the practical sort of tool with solid standards that business people would deploy and I was concerned about the security of recording transactions in public ledgers while at the same time being able to protect privacy.

The ILTA session helped me overcome some of those concerns as I learned how blockchain tools were dealing with these issues.  And I’ve continued to monitor the growth of the tool since then. This paper is an attempt to give an overview of where blockchain is at the onset of 2019.

In this paper, we will look at several topics related to blockchain and legal technology:

  1. Understanding Blockchain and Bitcoin
  2. Advantages and Challenges of Blockchain
  3. General Use Cases for Blockchain
  4. Blockchain in Legal Technology and eDiscovery
  5. Conclusions

We’ll publish Part 2 – Understanding Blockchain and Bitcoin – on Wednesday.

So, what do you think?  Do you understand blockchain and how it can impact the legal profession?  If not, keep reading!  And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Tomorrow’s Webcast Will Help You Get a “Clue” Regarding Your eDiscovery Process: eDiscovery Webcasts

Why am I promoting our monthly webcast today instead of the actual day of the webcast (like I usually do)?  You’ll see tomorrow when we publish our ninth(!) annual Halloween list of eDiscovery “frights”.  Do you scare easily?  Then, don’t read tomorrow’s post!  :o)

As evidenced by some high-profile recent eDiscovery disasters, managing eDiscovery projects is more complex than ever. Not only have the volume and variability of ESI data sources increased dramatically, but there are often more stakeholders in eDiscovery projects today than characters on the board game Clue©. Successful eDiscovery today means not only meeting your obligations, but also making sure that each stakeholder in the process succeeds as well.  Tomorrow’s webcast can enable you to get a “clue” regarding your eDiscovery process – with a special guest!

Tomorrow at noon CST (1:00pm EST, 10:00am PST), CloudNine will conduct the webcast Get a “Clue” Regarding Your eDiscovery Process. In this one-hour webcast that’s CLE-approved in selected states, we will discuss the various participants in the eDiscovery process, what motivates each of them, and best practices on how to avoid becoming the next high-profile eDiscovery disaster. Topics include:

  • The Process: Managing the Project from Initiation to Close
  • The Phases: Managing the Flow of ESI Before and During the Process
  • The Players: Goals and Objectives of Each eDiscovery Stakeholder
  • Whodunnit?: Lessons Learned from a Large Financial Institution’s Mistakes
  • Whodunnit?: Lessons Learned from a Government Entity’s Mistakes
  • Whodunnit?: Lessons Learned from a Medical Center’s Mistakes
  • Recommendations for Avoiding Your Own Mistakes
  • Resources for More Information

I’ll be presenting the webcast, along with Tom O’Connor as always.  But, this time, we will have a special guest — Mike Quartararo!  Mike is the founder and managing director of eDPM Advisory Services, a consulting firm providing e-discovery, project management and legal technology professional services to law firms, corporate legal departments and service provider organizations. He is also the author of the 2016 book Project Management in Electronic Discovery, which merges project management principles and best practices in electronic discovery.

To register for the webcast, click here.  Even if you can’t make it, go ahead and register to get a link to the slides and to the recording of the webcast (if you want to check it out later).  Three guys with beards on the Wolfman’s favorite day, what could be better!

So, what do you think?  Do you have a “clue” about how to avoid your own eDiscovery disaster?  If not, please join us!  And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Clue Board Game Image Copyright © Hasbro

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Project Management from Both Sides: eDiscovery Best Practices, Part Three

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Preparing for Litigation Before it Happens, which we covered as a webcast on September 26.  Now, Tom has written another terrific overview regarding pre-litigation considerations titled eDiscovery Project Management from Both Sides that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into four parts, so we’ll cover each part separately.  Part one was covered on Monday and part two was covered on Wednesday.  Here’s the third part.

The Lawyer’s Perspective to Project Management

What do lawyers think about this PM discussion? Do they think about it all? First let’s consider what they want from their ED project. Well that’s easy. They want to win their case.

And they want to adequately anticipate and minimize costs while they are winning. As Mike puts it “Clients expect not just cost predictability, but also cost containment.”

Mark Cohen, well known legal commentator and founder of legal delivery consultancy, Legal Mosaic, has been talking about this process for a number of years. In his article 7 Things Lawyers Should Know About Project Management, he defined Project Management as “the application of knowledge, skills and techniques to execute projects effectively and efficiently. It is considered a strategic competency for organizations, enabling them to tie project results to business goals — and thus, better compete in their markets. In its simplest form, Project Management defines the desired result, methodically structures the work into manageable pieces, and provides a framework of business and technology processes to achieve the result efficiently and economically.”

Mark also clearly differentiated PM from delivering a matter for a set price, which he felt was not only has a narrower definition than PM but also is a strategy not well suited to the many changes which often occur in an ESI project. These “unexpected turns”, as Mark calls them, a matter can take are better handled by a change order written into the PM Statement of Work/Engagement Letter.

Marks final thoughts were a nod to the global isolation of the US legal market in working with non-lawyers. He said: “Lawyers should familiarize themselves with project management skills because, without them, they may ultimately find non-lawyers taking charge of integrating and delivery their services, thereby reducing lawyers to a more marginal role in the overall process.”

Another consultant who has advocated PM for many years is Dennis Kennedy, a well-known legal tech commentator who recently retired as VP & Senior Counsel of Digital Payment and Labs at Master Card and is now an adjunct professor of law at Michigan State U School of Law. I clearly remember a 2010 podcast Dennis did with Tom Mighell on the Legal Talk Network called Lawyers as Project Managers, and remember thinking at the time that he was well ahead of the curve on the subject.

More recently, he was a member of a panel discussing PM published by Law Technology Today called Defining Legal Project Management.  In that discussion, Dennis, much like Mike Quartararo, felt that legal PM is based on general PM principles.

But Dennis went one step further saying:

“Lawyers tend to think that everything they do is unique and special. Other than existing in the legal context, I don’t see legal project management as being anything different than general project management.”

He did feel that trained PM managers were a plus because:

“most lawyers don’t learn project management techniques, the results can be hit or miss. You have to know your strengths and weaknesses. I’d want to hire a project manager. You might want to take on that role yourself. You need to take a hard and realistic look at yourself.”

Either way, he did feel that PM is:

“not a fad at all. I see it as a very important trend to watch. Certain clients will start to insist on lawyers using project management and other standard business workflow and process tools.”

He and his fellow panelists pointed to some excellent PM resources for lawyers including the Corporate Legal Operations Consortium, the ABA’s Law Practice Division Legal Project Management Interest Group, the Association of Corporate Counsel Legal Operations, Legal Marketing Association’s P3 Practice Innovation Conference, the True Value Partnering Institute, and the Law Vision Group LPM Roundtable.

We’ll publish Part 4 – Conclusion – next Monday.

So, what do you think?  How does your organization apply project management to your eDiscovery projects?  As always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Project Management from Both Sides: eDiscovery Best Practices, Part Two

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Preparing for Litigation Before it Happens, which we covered as a webcast on September 26.  Now, Tom has written another terrific overview regarding pre-litigation considerations titled eDiscovery Project Management from Both Sides that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into four parts, so we’ll cover each part separately.  Part one was covered on Monday.  Here’s the second part.

The Project Manager’s Perspective to Project Management

How do project managers define their role? Well Mike sets it out on his company website when he says:

Project management is the structured application of skill, knowledge, tools and techniques to organize activities and bring about a desired outcome that meets a project or business need. While this may seem abstract, it is really quite simple: In the business world, even in a professional service field like the legal industry, there are business needs or goals that an organization may have interest in achieving. Organizations engage the person with the right skills, knowledge and talent to achieve these objectives and manage the necessary work. That person is a project manager. Project managers use their industry experience, education and training to complete tasks and the overall project work. They understand the resources, tools and workflows necessary. They are able to interact with people and organizations to perform the actual work. But project management is not a single “thing” or practice. It is not a specific tool that one simply picks up and transposes over the work in a particular industry. Rather, it is an operational theory and series of practices; a way of thinking; a methodical, disciplined approach to outcome-oriented work. There are principles, defined practices, tools and techniques involved, but more than any one thing, project management is an organizational tool. It is a framework that facilitates efficiency, quality, cost, and risk containment. Project management in the context of legal support also involves leadership of people…

He then goes on to offer some useful definitions, including:

  • Project: A temporary, non-routine endeavor limited by scope, time, and cost that creates a unique product, service, or result.
  • Project management: The structured application of skill, knowledge, tools, and techniques to organize project activities designed to efficiently bring about a desired outcome.
  • Project manager: The person possessing the applicable skill, knowledge, and talent, who is assigned by an organization and responsible for actively managing the project.
  • Process: The discreet steps, actions, or operations one takes to achieve project objectives, the tools used, and an understanding of what each part of a project will look.

But perhaps most important is that Mike feels quite strongly that “eDiscovery PM comes only after you have a firm grounding in general project management principles. Those principles are ideally suited to a project which has repetitive and dependent tasks, a variety of people and organizations involved and the need to better manage scope, timing, and costs.” ( https://www.relativity.com/blog/the-anatomy-of-project-management/ , August 29, 2016).

Which of these principles can we use in eDiscovery?  I’d suggest the following points made by Mike as being the most critical:

  1. Cost: The ability to estimate, budget, and manage the costs of the project.
  2. Scope: What Mike calls “What does done look like?”
  3. Time: The Project Management Lifecycle to avoid missed deadlines and fragmented schedules which lead to added cost
  4. Tools & Techniques: What tools are required, including written protocols or best practices?
  5. Output: requirements during and at the conclusion of an ESI project

I should note that Mike goes into even more detail when discussing the Project Management Lifecycle. He breaks the lifecycle down into five Project Management Process Groups. He describes this as a framework which he describes in this graphic:

Mike also goes on to say that the lifecycle does not end here. Within each process group there are areas of responsibility that a project manager must focus on throughout a project.

Known as the Knowledge Areas, these are the core process elements in each of the five process groups:

  • Integration management
  • Human resource management
  • Scope management
  • Communication management
  • Time management
  • Risk management
  • Cost management
  • Procurement management
  • Quality management
  • Stakeholder management

All of these provide a framework for the project manager to estimate, budget, and manage a project. And these traditional project management methodologies work equally well in the e-discovery context. As Mike said in the blog post quoted above, “Doing things like planning, communicating, setting clear expectations, figuring out what ‘done’ looks like, [are] just a sensible means of approaching litigation and e-discovery in particular,”

We’ll publish Part 3 – The Lawyer’s Perspective to Project Management – on Friday.

So, what do you think?  How does your organization apply project management to your eDiscovery projects?  As always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.