Electronic Discovery

The Watergate 18 Minute Gap in Audio Recordings Has Nothing on This Case – eDiscovery Case Law

Anybody who remembers Watergate remembers the big deal made about an 18 1/2 minute gap in audio recordings reported by President Nixon’s secretary, Rose Mary Woods.  This case involves a gap in audio recordings much longer than that.

In Novick v. AXA Network, LLC, 07-CV-7767 (AKH) (KNF) (S.D.N.Y.Oct. 22, 2014), New York Magistrate Judge Kevin Nathaniel Fox granted the plaintiff’s request for sanctions against the defendant, awarding an adverse inference jury instruction for several weeks of spoliated audio recordings and also awarding “reasonable attorney’s fees and costs” associated with the motion as well as retaking several depositions.

Case Background

In this wrongful termination case, the plaintiff contended that the defendants committed several “strikes” justifying his request for sanctions, including spoliating audio recordings because “audio recordings from the time period August 28, 2006 through November 5, 2006 (approximately one-third of the entire time period ordered) are missing,” and “Defendants admit that they were likely erased and taped over” (per defendants letter to the plaintiff on October 25, 2013).  According to the plaintiff, “these recordings are from the most important time period of all – directly before and directly after Mr. Novick’s termination.”  The plaintiff also contended that the defendant had numerous deficiencies in their email production, where the defendant again made several promises to rectify the mistakes.

The defendants contended that “no responsive emails have been withheld and there is no evidence that any emails are missing.”  They did, however, “acknowledge that there are approximately eight weeks of audio recordings, within the period of time for which production of audio recordings was eventually ordered, that cannot be located or produced,” but “[t]his is not a new issue,” and the defendants advised plaintiff of it, on October 17, 2013, when the majority of the recordings were produced to him, and “[t]he fact that these weeks of recordings are missing constitutes the only real issue in plaintiff’s sanctions motion.”  The defendant also acknowledged that they “cannot now explain the absence of these recordings”.

Judge’s Ruling

Judge Fox stated that the court “determined that ‘[t]he defendants’ duty to preserve evidence arose when the plaintiff’s counsel notified the defendants, in the October 16, 2006 letter, that the audio recordings should be preserved because they may be relevant to future litigation’” and that the defendants conceded that “‘there are approximately eight weeks of audio recordings that are missing within the period for which defendants have been ordered to produce audio recordings,’ namely the period of August 28-31, 2006, and September 8-November 5, 2006, and they ‘have not been able to determine when, why or how these audio recordings came to be missing from the group of other audio recordings that were stored on DVDs and have been produced.’”  As a result, Judge Fox ruled that “the Court finds that the defendants spoliated relevant evidence, namely, audio recordings for the period August 28-31, 2006, and September 8-November 5, 2006”.

Judge Fox also noted that “Moreover, the defendants’ misconduct respecting the audio recordings was compounded by their deliberate and unjustified failure to search for and locate e-mail messages, as directed by the September 25, 2013 order. The defendants now admit that it was not until March 2014, that they realized that the Frontbridge archive was not searched for responsive documents, but contend this delay was ‘due to human error,’ without explaining what that error was or why they waited until March 2014 to conduct the investigation concerning the production of e-mail messages.”

As a result, Judge Fox Fox granted the plaintiff’s request for sanctions against the defendant, awarding an adverse inference jury instruction for the defendant’s actions and also awarding “reasonable attorney’s fees and costs” associated with the motion as well as retaking several depositions.

So, what do you think?  Did defense counsel’s quick reaction to the disclosure save the email’s privileged status?  Please share any comments you might have or if you’d like to know more about a particular topic.

BTW, we also covered a ruling on this case last year here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Simply Deleting a File Doesn’t Mean It’s Gone – eDiscovery Best Practices

 

I seem to have picked up a bit of a bug and I’m on cold medicine, so my writing brain is a bit fuzzy.  As a result, so I’m revisiting a topic that has come up a few times over the years that we covered early on in the blog’s history.  I should be back in the saddle with new posts next week!

Disk drives use an index or table to keep track of where each file begins and ends on the disk.  You may have heard terms such as “FAT” (file allocation table) or NTFS ({Windows} NT File System) – these filing systems enable the file to be retrieved quickly on the drive.  They’re like a “directory” of all of the active files on the disk.  When a file is “deleted” (i.e., actually deleted, not just moved to the Recycle Bin), the data for that file isn’t actually removed from the disk (in most cases).  Instead, the entry pertaining to it is removed from the filing system.  As a result, the area on the disk where the actual data is located becomes unallocated space.

Unallocated space, also known as inactive data or drive free space, is the area of the drive not allocated to active data. On a Windows machine, deleted data is not actually destroyed, but the space on the drive that can be reused to store new information. Until the unallocated space is overwritten with new data, the old data remains.  This data can be retrieved (in most cases) using forensic techniques. On MAC O/S 10.5 and higher, there is an application that overwrites sectors when a file is deleted. This process more securely destroys data, but even then it may be possible to recover data out of unallocated space.

Because the unallocated space on a hard drive or server is that portion of the storage space to which data may be saved, it is also where many applications “temporarily” store files when they are in use. For instance, temporary Internet files are created when a user visits a web page, and these pages may be “cached” or temporarily stored in the unallocated space.  Rebooting a workstation or server can also clear some data from the unallocated space on its drive.

Since computers are dynamic and any computer operation may write data to the drive, it is nearly impossible to preserve data in the unallocated space on the hard drive and that data is not accessible without special software tools. To preserve data from the unallocated space of a hard drive, the data must be forensically collected, which basically copies the entire drive’s contents, including every sector (whether those sectors contain active data or not). Even then, data in the unallocated space may not be complete. Because the unallocated space is used to store new data, writing a new file may overwrite part of a deleted file, leaving only part of that file in the unallocated space.

Nonetheless, “deleted” files have been recovered, collected and produced in numerous lawsuits, despite efforts of some producing parties to destroy that evidence.

So, what do you think?  Have you ever recovered deleted data that was relevant to litigation?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

The Importance of Metadata – eDiscovery Best Practices

This topic came up today with a client that wanted information to help justify the request for production from opposing counsel in native file format, so it’s worth revisiting here…

If an electronic document is a “house” for information, then metadata could be considered the “deed” to that house. There is far more to explaining a house than simply the number of stories and the color of trim. It is the data that isn’t apparent to the naked eye that tells the rest of the story. For a house, the deed lines out the name of the buyer, the financier, and the closing date among heaps of other information that form the basis of the property. For an electronic document, it’s not just the content or formatting that holds the key to understanding it. Metadata, which is data about the document, contains information such as the user who created it, creation date, the edit history, and file type. Metadata often tells the rest of the story about the document and, therefore, is often a key focus of eDiscovery.

There are many different types of metadata and it is important to understand each with regard to requesting that metadata in opposing counsel productions and being prepared to produce it in your own productions.  Examples include:

  • Application Metadata: This is the data created by an application, such as Microsoft® Word, that pertains to the ESI (“Electronically Stored Information”) being addressed. It is embedded in the file and moves with it when copied, though copying may alter the application metadata.
  • Document Metadata: These are properties about a document that may not be viewable within the application that created it, but can often be seen through a “Properties” view (for example, Word tracks the author name and total editing time).
  • Email Metadata: Data about the email.  Sometimes, this metadata may not be immediately apparent within the email application that created it (e.g., date and time received). The amount of email metadata available varies depending on the email system utilized.  For example, Outlook has a metadata field that links messages in a thread together which can facilitate review – not all email applications have this data.
  • Embedded Metadata: This metadata is usually hidden; however, it can be a vitally important part of the ESI. Examples of embedded metadata are edit history or notes in a presentation file. These may only be viewable in the original, native file since it is not always extracted during processing and conversion to an image format.
  • File System Metadata: Data generated by the file system, such as Windows, to track key statistics about the file (e.g., name, size, location, etc.) which is usually stored externally from the file itself.
  • User-Added Metadata: Data created by a user while working with, reviewing, or copying a file (such as notes or tracked changes).
  • Vendor-Added Metadata: Data created and maintained by an eDiscovery vendor during processing of the native document.  Don’t be alarmed, it’s impossible to work with some file types without generating some metadata; for example, you can’t review and produce individual emails within a custodian’s Outlook PST file without generating those out as separate emails (either in Outlook MSG format or converted to an image format, such as TIFF or PDF).

Some metadata, such as user-added tracked changes or notes, could be work product that may affect whether a document is responsive or contains privileged information, so it’s important to consider that metadata during review, especially when producing in native format.

Here’s an example of one case where the production of metadata was ordered and an answer to the question “Is it Possible for a File to be Modified Before it is Created?” (you might be surprised at the answer).

So, what do you think? Have you been involved in cases where metadata was specifically requested as part of discovery? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiff Can’t “Pick” and Choose When it Comes to Privilege of Inadvertent Disclosures – eDiscovery Case Law

In Pick v. City of Remsen, C 13-4041-MWB (N.D. Iowa Sept. 15, 2014), Iowa District Judge Mark W. Bennett upheld the magistrate judge’s order directing the destruction of an inadvertently-produced privileged document, an email from defense counsel to some of the defendants, after affirming the magistrate judge’s analysis of the five-step analysis to determine whether privilege was waived.

Case Background

In this wrongful termination case, the plaintiff served a request for production of documents that included “all relevant non-privileged emails initiated by or received by the City of Remsen in regard to the Plaintiff and/or any of the issues set forth in Plaintiff’s complaint”.  Among the documents produced was an email, dated July 14, 2012, from defense counsel to Remsen Utility Board members and others discussing an upcoming Utility Board meeting.  Defense counsel learned of the email’s inadvertent disclosure on March 25, 2014, when the plaintiff served supplemental discovery responses on defense counsel and contacted plaintiff’s counsel within 34 minutes of the discovery.

Defense counsel asked that the email be destroyed. The plaintiff’s counsel suggested the email could be redacted to protect “advice relating to procedure,” but indicated he intended to rely on the remainder of the email unless ordered otherwise by the court.  The defendants’ filed a motion requesting that the court order the email’s destruction as an inadvertently produced privileged document, which the magistrate judge granted.

Judge’s Ruling

The Magistrate Judge, Leonard Strand, had applied the five-step analysis to determine the proper range of privilege to extend.  Those five factors were, as follows:

  1. The reasonableness of the precautions taken to prevent inadvertent disclosure in view of the extent of document production: Judge Strand found that the privileged email was “inconspicuously located among various non-privileged email messages”, which, based on the fact that defendants turned over to their counsel 440 pages of documents (including 183 pages of email messages, some pages of which contained more than one email), was upheld as “completely fair and accurate”;
  2. The number of inadvertent disclosures: Since there was only one inadvertent disclosure, Judge Bennett upheld the ruling as “not clearly erroneous”;
  3. The extent of the disclosures: Though the email was sent to six people, all six were privileged recipients of the email, so Judge Bennett upheld the ruling as “not clearly erroneous”;
  4. The promptness of measures taken to rectify the disclosure: Because defense counsel contacted plaintiff’s counsel just 34 minutes after learning of the email’s inadvertent disclosure and requested its destruction, Judge Bennett upheld the ruling as “not clearly erroneous”; and
  5. Whether the overriding interest of justice would be served by relieving the party of its error: Judge Strand, finding that the plaintiff “clearly has other evidence that he intends to rely on in support of his various claims”, ruled in favor of the defendant in this factor as well, which Judge Bennett upheld.

Judge Bennett summarized as follows: “The email is classic legal advice that should be protected by the attorney-client privilege…This interest of justice would be harmed here by permitting Pick to use the email at trial…Given the important nature of the attorney-client privilege and the manner in which the email was inadvertently disclosed, Judge Strand’s conclusion that the overriding interest in justice factor weighed against waiver is not clearly erroneous. Accordingly, Pick’s objection is overruled.”

So, what do you think?  Did defense counsel’s quick reaction to the disclosure save the email’s privileged status?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

What’s in a (File) Name? More Than You Think – eDiscovery Best Practices

 

When you’ve worked in litigation support and eDiscovery as long as some of us have, you just think a little bit differently – even when it comes to naming files and folders on your computer.  In her excellent Litigation Support Guru blog, Amy Bowser-Rollins provides some best practices to think more like a litigation support person.

In her post Litigation Support Naming Conventions, Amy shares her database mindset with these concepts:

  1. Using Underscores Instead of Spaces: Amy illustrates how you can use underscores instead of spaces in your file and folder names (e.g., Custodian_Name_Shared_Drive Custodian_Name.zip).  So, why would that be important?  Simply, empty space typically signifies the “end” of a character string.  When an application sees a space, it sees the “end” and stops processing. When the full string is not processed, it won’t be properly represented on your computer screen, won’t copy into emails automatically as hyperlinks, etc.  Some people prefer dashes instead of underscores as underscores can be difficult to detect when the name is underlined.
  2. Zero Filled Numbers: Is it apparent why this one is important?  It’s for sorting purposes.  In names, numbers sort left to right instead of numerically, so AnnualReport10 comes before AnnualReport8 and AnnualReport9 (because the first digit of ‘10’ – ‘1’ – comes before ‘8’ and ‘9’).  To get them to sort properly, include leading zeroes (e.g., AnnualReport08, AnnualReport09 and AnnualReport10).
  3. Dates in Year-Month-Day Format: This is another naming convention that is recommended for sorting purposes, again because numbers in names sort left to right instead of numerically (e.g., 11-11-2014-IncomingData would sort before 03-09-2012-IncomingData).  Naming the files in Year-Month-Day format (e.g., 2012-03-09-IncomingData or 20120309-IncomingData) ensures that they are properly date sorted.  Personally, I prefer dates with dashes for readability.

Using Amy’s tips can help you think more like the geeks that some of us are!  Thanks, Amy!

So, what do you think?  Do you have any file and folder naming preferences?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Want an Automated, Easy and Inexpensive Way to Process Your Data? Read On – eDiscovery Trends

A couple of months ago, we had a laugh at Ralph Losey’s post that took a humorous look at the scenario where it’s Friday at 5 and you need data processed to be reviewed over the weekend.  It was a funny take on a real problem that most of us have experienced from time to time.  But, there may be a solution to this problem that’s automated, easy and inexpensive.

Anytime we talk about something that relates to our company, CloudNine Discovery, we always add the “shameless plug warning” to let people know that the topic relates to our software or a service we offer.  If you’re a regular reader of our blog, you know it doesn’t happen that often.  But, we have just made a major announcement that we believe will interest many of you.

Today, we are officially announcing the release of OnDemand Discovery®, our new application that enables you to upload your native data and have it processed and loaded directly into OnDemand®, our cloud-based online review tool.

It’s a 100% automated upload process that includes native file extraction from container files (such as Outlook PSTs and ZIP Files), metadata & text extraction and indexing, OCR of image files, duplicate identification and HTML creation, streamlining the process to get started reviewing documents for discovery.  The process automatically notifies you when we’ve received your data and then again when we’ve loaded and indexed it and when all processing (including advanced analytics for early data assessment) is complete.  So, you never have to wonder about the status of your processing job.

It’s ideal for situations where you receive data late on a Friday afternoon and have to get it ready to review over the weekend and also ideal for preparing small batches of files for review without having to run them through cumbersome processing software built for multiple gigabytes, not a small batch of files.  OnDemand Discovery is designed to handle two megabytes, two gigabytes or two hundred gigabytes or more!

There are three easy steps to give it a try:

  1. Sign up for a free account here.  You will receive an email with your credentials (including temporary password), to get started.
  2. When you first log in, you’ll see a button to “Upload Data”.  That will take you to a form to download the OnDemand Discovery client (which is a Windows based client application that resides on your desktop) for uploading data for processing.  Download and install the client to upload data.
  3. Once the client is downloaded and installed, launch the client, log in with your newly created credentials and simply follow the wizard prompts to upload the desired data set and put it into the project of your choice (which you can create if it doesn’t already exist).  It’s that easy!

For more information, feel free to check out our press release on our news page here.  You can also contact me at daustin@cloudnincloudnine.comm for more information as well.

And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Judgment of $34 Million against Insurer Dodging Malpractice Claim is a “Dish” Served Cold – eDiscovery Case Law

 

In my hometown of Houston, attempting to deny coverage to a client successfully sued for discovery-related negligence cost OneBeacon Insurance Company a $34 million judgment by a federal jury.

As reported by Robert Hilson in ACEDS (Insurer dodging malpractice claim must pay $34 million for attorney’s discovery blunder, subscription required), OneBeacon Insurance Company attempted to rescind a policy from T. Wade Welch & Associates (TWW), the Houston-based law firm that was sued by former client Dish Network in 2007 after one of its attorneys provided incomplete discovery responses to Dish’s adversary. That failure resulted in so-called “death penalty” sanctions against Dish in a contractual interference case brought by Russian Media Group (RMG), which accepted a $12 million settlement.

After Dish won an arbitration award against TWW for that amount last year, OneBeacon sued TWW in federal court seeking a declaration the law firm voided coverage on its policy by failing to disclose the Dish sanctions prior to entering into that policy. OneBeacon alleged that TWW should have known that those penalties in the Dish case would give rise to a malpractice claim, which would trigger a so-called “prior knowledge exclusion” in the insurance policy that rescinds coverage, the insurer claimed. It also accused the firm of making misrepresentations on its policy application.

However, a jury in the US District Court for the Southern District of Texas begged to differ, finding that:

  • OneBeacon failed to move for a swift settlement with Dish when its liability had become clear; and
  • OneBeacon’s failure to settle the Dish claim amounted to gross negligence.

The jury assessed damages as follows:

  • TWW’s lost profits sustained in the past: $3 million;
  • TWW’s lost profits that, in reasonable probability, it will sustain in the future: $5 million;
  • Sum assessed in exemplary damages for OneBeacon’s gross negligence: $5 million;
  • Sum assessed in exemplary damages because OneBeacon’s conduct was committed knowingly: $7.5 million.

TOTAL: $20.5 million.  Plus, although the OneBeacon policy had a $5 million limit, the “Stowers Doctrine,” which holds that an insurer undertaking the defense of an insured has the obligation to make a good faith attempt to settle the insured’s claim within those policy limits, additionally put the company on the hook for the entire $12.6 million arbitration settlement.  Ouch!

This was after US district Judge Gray Miller, in June, denied summary judgment to OneBeacon, finding that it was not clear from the evidentiary record whether TWW attorneys should have reasonably foreseen the malpractice claim that eventually arose from the Dish sanctions.

For more information on the case, including the jury’s verdict, click here (subscription required).

So, what do you think?  Should OneBeacon have been “on the hook” for the settlement amount or should the “prior knowledge exclusion” have excluded them?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Dealing with the Departed – eDiscovery Best Practices

 

Having addressed this recently with a client, I thought this was a good topic to revisit here on the blog…

When litigation hits, key activities to get a jump on the case include creating a list of key employees most likely to have documents relevant to the litigation and interviewing those key employees, as well as key department representatives, such as IT for information about retention and destruction policies.  These steps are especially important as they may shed light on custodians you might not think about – the departed.

When key employees depart an organization, it’s important for that organization to have a policy in place to preserve their data for a period of time to ensure that any data in their possession that might be critical to company operations is still available if needed.  Preserving that data may occur in a number of ways, including:

  • Saving the employee’s hard drive, either by keeping the drive itself or by backing it up to some other media before wiping it for re-use;
  • Keeping any data in their network store (i.e., folder on the network dedicated to the employee’s files) by backing up that folder or even (in some cases) simply leaving it there for access if needed;
  • Storage and/or archival of eMail from the eMail system;
  • Retention of any portable media in the employee’s possession (including DVDs, portable hard drives, smart phones, etc.).

As part of the early fact finding, it’s essential to determine the organization’s retention policy (and practices, especially if there’s no formal policy) for retaining data (such as the examples listed above) of departed employees.  You need to find out if the organization keeps that data, where they keep it, in what format, and for how long.

When interviewing key employees, one of the typical questions to ask is “Do you know of any other employees that may have responsive data to this litigation?”  The first several interviews with employees often identify other employees that need to be interviewed, so the interview list will often grow to locate potentially responsive electronically stored information (ESI).  It’s important to broaden that question to include employees that are no longer with the organization to identify any that also may have had responsive data and try to gather as much information about each departed employee as possible, including the department in which they worked, who their immediate supervisor was and how long they worked at the company.  Often, this information may need to be gathered from Human Resources.

Once you’ve determined which departed employees might have had responsive data and whether the organization may still be retaining any of that data, you can work with IT or whoever has possession of that data to preserve and collect it for litigation purposes.  Just because they’re departed doesn’t mean they’re not important.

So, what do you think?  Does your approach for identifying and collecting from custodians include departed custodians?  Please share any comments you might have or if you’d like to know more about a particular topic.

Image © Warner Bros.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Most Big Companies Have a Big Data Program, But They’re Not Crazy about the Term “Big Data” – eDiscovery Trends

Yesterday, we discussed some amazing facts about just how “BIG” that Big Data has gotten to be.  Today, let’s look at what BIG companies are doing about BIG data.

NewVantage Partners has just released a new survey (their third annual survey) of Fortune 1000 senior business and technology executives regarding their companies’ investments in Big Data entitled Big Data Executive Survey 2014: An Update on the Progress of Big Data in the Large Corporate World.  Survey respondents are Fortune 1000 senior business and technology executives who have a vested interest in the success of an organization’s data and analytics, and Big Data, initiatives.  This year, 59 companies participated, with 125 individual executive respondents.  78% of the participating organizations were in the financial services sector, including companies such as American Express, Fidelity Investments, General Electric, Johnson & Johnson, Lincoln Financial and Wells Fargo.  Here’s a link to the Executive Summary for the report.

As noted in their press release, here are some key findings from the survey:

  • Big Data is Becoming Mainstream: Executives report that their corporate investments in Big Data are projected to grow from 35% to 75% by 2017 for investments greater than $10MM, and by a remarkable 6% to 28% for investments greater than $50MM67% of executives now report that they have Big Data initiatives running in production within the corporation.
  • Enthusiasm for Big Data Initiatives is Widespread: 82% of executives say that Big Data is “important or mission critical” to their organizations and 74% believe that its value “warrants serious attention.”
  • Business-IT Partnership is Key to Big Data Adoption: 88% of executives cited the importance of a strong business-IT partnership, with 77% citing business leadership and sponsorship, and partnership and organizational alignment as being the most critical factors in ensuring successful adoption of Big Data initiatives within the corporation.
  • The Chief Data Officer is an Emerging Role: 43% of executives report that their organization has established a Chief Data Officer (CDO) function, up from only 19% in 2012.

While big companies are embracing programs to manage Big Data, they’re not too keen on the term “Big Data”.  Fewer than 1 in 5 respondents (17%) feel that the name is “apt and descriptive,” and the rest dislike it (30%) or view it as overstated (53%).  As discussed in the Executive Summary, that finding raises the question whether everyone means the same thing when they’re talking about Big Data.  Regardless, it’s clear that large organizations are becoming seriously invested in programs to manage Big Data, regardless what they want to call it.

So, what do you think? Does your organization have a plan for managing Big Data?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Just How “BIG” is Big Data Getting? Check Out These Facts – eDiscovery Trends

 

If you work with information as an attorney, paralegal, litigation support professional or information technology (IT) professional, you have probably heard the term “big data” at an ever increasing rate.  But, just how BIG is big data getting?  Check out these facts.

An article by Bernard Marr on SmartData Collective (Big Data: 25 Amazing Need-to-Know Facts) provides some startling facts that you might be surprised to know.  Here are a few examples (with sources linked):

  • Every 2 days we create as much information as we did from the beginning of time until 2003;
  • Over 90% of all the data in the world was created in the past 2 years;
  • It is expected that by 2020 the amount of digital information in existence will have grown from 3.2 zettabytes today to 40 zettabytes (FYI, a zettabyte is one billion terabytes!);
  • The total amount of data being captured and stored by industry doubles every 1.2 years;
  • If you burned all of the data created in just one day onto DVDs, you could stack them on top of each other and reach the moon – twice;
  • 570 new websites spring into existence every minute of every day;
  • 1.9 million IT jobs will be created in the US by 2015 to carry out big data projects. Each of those will be supported by 3 new jobs created outside of IT – meaning a total of 6 million new jobs thanks to big data;
  • The big data industry is expected to grow from US$10.2 billion in 2013 to about US$54.3 billion by 2017.

With this level of data growth in the world, it’s no wonder that information governance and eDiscovery continues to be more challenging!

Check out Bernard’s article here for the entire list of 25 facts (it even includes a slide deck!).  And, thanks to Rob Robinson’s excellent ComplexDiscovery site for the heads up!

Tomorrow, we will take a look at what big companies think about (and what they’re doing about) big data.  Speaking of something BIG, check this out.

So, what do you think? Does your organization have a plan for managing big data?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.