Use the scalpel first: EDA makes e-discovery a successful operation
EDA can help legal departments carve away unneeded data, allowing them to focus on strictly whats most relevant to their cases.
November 17, 2011 at 01:56 AM
13 minute read
The original version of this story was published on Law.com
This article is part two of a series. To read part one, click here.
Would you like your appendix removed by a surgeon wielding a bone cutter instead of a scalpel? We wouldn't. And yet when legal professionals go through the EDRM process in e-discovery, they often hack away with the wrong tools because they don't know what operation they're performing, what procedures to follow or how to carry them out.
When surgeons embark on a procedure, they first identify what they're dealing with—its size and scope, and what the best and most minimally invasive way to operate will be. Similarly, in e-discovery, an early identification and understanding of the relevant custodians and the data entailed in the matter at hand is critically important for inside and outside counsel alike.
During litigation, owners and keepers of the electronic data relevant to the case, such as corporate employees, are called “custodians” because they have primary access to—or control over—that electronically stored information (ESI). Custodians generally are the primary source of ESI relevant to the matter. They typically store their information in many different formats, such as emails within a centralized server, documents stored on the local desktop or laptop, home folders located on a distributed corporate storage system, or even data stored in the “cloud” where it exists offsite on a remote server. Their ESI may be stored in centralized document management systems, or it may be scattered across many computers, programs and media such as thumb drives, CDs, smartphones and tablet computers.
The e-discovery team must ask the following questions:
- “Where is the data we need? “
- “How can we separate it from what we don't want?”
- “How can we find and preserve it easily without inconveniencing a lot of people?”
A well-executed early data assessment (EDA) process can help answer these questions. EDA and its technology tools help legal professionals to summarize the number of custodians and their disparate sources of ESI that must be identified early on, which leads to more accurate budgeting and strategy planning. If EDA is not conducted well and critical data is overlooked, underestimated or, worse, deliberately concealed or deleted, that breakdown in processes can lead to court sanctions, news headlines or worse.
EDA tools can be used to look at various drives and folders to determine where custodian ESI is located. In some cases, the custodian can be relied upon to tell legal and IT where the data is. Other times, custodians do not know what data they have, or have no idea that their data is relevant to a case. In those instances, relying solely on the custodian to tell legal and IT where the data is won't work so well.
Although there are myriad ways to get at custodians of interest and data of theirs that you may care about, a useful two-step strategy to consider using is:
- Step 1 – Identify and understand the systems implicated by the legal matter at hand where those systems are ones the custodians' control or use. These may be fairly obvious systems, such as the email system, workstations and servers and the document management system, but they also could be something more obscure.
- Step 2 – Survey the custodians and managers of the data contained in the systems identified in Step 1. The goal of surveying and “identifying” ESI likely to be relevant to a particular legal matter requires a balancing of legal defensibility with IT and other costs and custodian burden (e.g., system downtime, time away from regular job duties, etc.). While you want to use defensible methods, you also want to avoid imposing unneeded burden or causing unnecessary intrusion.
Surgical techniques
A combination of new, more- affordable EDA technologies and coordinated e-discovery plans can give parties to legal and regulatory matters a more accurate assessment of the ESI. This assessment can then be used to more precisely calculate the range of costs in a predictable manner for searching, reviewing and producing a set of relevant documents.
Touching custodians a minimum amount of times can be an effective strategy, for example: by encouraging them to answer questions even as they acknowledge a legal hold or answer merit-related interview questions.
Focused, surgical ESI identification processes can make the assessment more accurate, but they require slightly more custodian involvementalbeit with small, quick touches. This is far better than the costly and time-consuming traditional method of collecting and processing indiscriminately, then searching using keywords and file filters to shrink the haystack, and then reviewing in a relatively serial way. With a surgical approach, time is better spent on determining the merits of the matter rather than on tedious IT or ministerial tasks.
An alternative approach to touching the custodians is to use the readily available ESI, including metadata and derivate data (i.e., the data about that ESI), to gain a basic understanding of the lay-of-the-land, and to focus on those areas that seem most likely to be important. In virtually all civil e-discovery scenarios, neither the parties nor the courts expect perfection. They need a reasonable, logical and defensible approach—not a flawless one.
EDA need not start in a vacuum. Often a party or its counsel already has data from an earlier matter than can be reused for the new one. Sometimes a client has a structured set of information that can serve as a starting point. Using simple, low-cost solutions and techniques to understand, early on, the scope of the data across the matter and custodians can provide a highly valuable jumpstart.
EDA is a short, but important, operation
The EDA process does not have to be an expensive or cumbersome part of the EDRM process. Rather, it is the entire EDRM process writ smaller, designed with a narrower focus and conducted on a smaller scale. EDA also can become non-burdensome and low-cost when piggy-backed on other e-discovery tasks such as legal hold notification. Therefore, the process to be followed across the entire EDRM diagram can be interwoven with EDA tasks to build a successful legal strategy and save money starting early on and continuing throughout the life of the matter.
Many e-discovery providers already realize that EDA is a productive method to use at the start of case, whether they are using the term “EDA” yet or not. At this point, there are growing numbers of techniques and technologies that can help with the effort in an efficient way.
EDA is a highly effective and useful method to better understand the scope and issues that may arise with respect to the ESI related to a matte. It also is a way to predict costs and plan accurate e-discovery budgets. In fact, performing EDA early ensures a clearer discovery strategy and more predictable budgets throughout the life of a matter. Done well, EDA can help parties carve away substantial amounts of data they do not need, allowing them to focus their attention and resources on the data that matters most to their cases.
The net message is: Don't use a bone cutter if a scalpel will do.
This article is part two of a series. To read part one, click here.
Would you like your appendix removed by a surgeon wielding a bone cutter instead of a scalpel? We wouldn't. And yet when legal professionals go through the EDRM process in e-discovery, they often hack away with the wrong tools because they don't know what operation they're performing, what procedures to follow or how to carry them out.
When surgeons embark on a procedure, they first identify what they're dealing with—its size and scope, and what the best and most minimally invasive way to operate will be. Similarly, in e-discovery, an early identification and understanding of the relevant custodians and the data entailed in the matter at hand is critically important for inside and outside counsel alike.
During litigation, owners and keepers of the electronic data relevant to the case, such as corporate employees, are called “custodians” because they have primary access to—or control over—that electronically stored information (ESI). Custodians generally are the primary source of ESI relevant to the matter. They typically store their information in many different formats, such as emails within a centralized server, documents stored on the local desktop or laptop, home folders located on a distributed corporate storage system, or even data stored in the “cloud” where it exists offsite on a remote server. Their ESI may be stored in centralized document management systems, or it may be scattered across many computers, programs and media such as thumb drives, CDs, smartphones and tablet computers.
The e-discovery team must ask the following questions:
- “Where is the data we need? “
- “How can we separate it from what we don't want?”
- “How can we find and preserve it easily without inconveniencing a lot of people?”
A well-executed early data assessment (EDA) process can help answer these questions. EDA and its technology tools help legal professionals to summarize the number of custodians and their disparate sources of ESI that must be identified early on, which leads to more accurate budgeting and strategy planning. If EDA is not conducted well and critical data is overlooked, underestimated or, worse, deliberately concealed or deleted, that breakdown in processes can lead to court sanctions, news headlines or worse.
EDA tools can be used to look at various drives and folders to determine where custodian ESI is located. In some cases, the custodian can be relied upon to tell legal and IT where the data is. Other times, custodians do not know what data they have, or have no idea that their data is relevant to a case. In those instances, relying solely on the custodian to tell legal and IT where the data is won't work so well.
Although there are myriad ways to get at custodians of interest and data of theirs that you may care about, a useful two-step strategy to consider using is:
- Step 1 – Identify and understand the systems implicated by the legal matter at hand where those systems are ones the custodians' control or use. These may be fairly obvious systems, such as the email system, workstations and servers and the document management system, but they also could be something more obscure.
- Step 2 – Survey the custodians and managers of the data contained in the systems identified in Step 1. The goal of surveying and “identifying” ESI likely to be relevant to a particular legal matter requires a balancing of legal defensibility with IT and other costs and custodian burden (e.g., system downtime, time away from regular job duties, etc.). While you want to use defensible methods, you also want to avoid imposing unneeded burden or causing unnecessary intrusion.
Surgical techniques
A combination of new, more- affordable EDA technologies and coordinated e-discovery plans can give parties to legal and regulatory matters a more accurate assessment of the ESI. This assessment can then be used to more precisely calculate the range of costs in a predictable manner for searching, reviewing and producing a set of relevant documents.
Touching custodians a minimum amount of times can be an effective strategy, for example: by encouraging them to answer questions even as they acknowledge a legal hold or answer merit-related interview questions.
Focused, surgical ESI identification processes can make the assessment more accurate, but they require slightly more custodian involvementalbeit with small, quick touches. This is far better than the costly and time-consuming traditional method of collecting and processing indiscriminately, then searching using keywords and file filters to shrink the haystack, and then reviewing in a relatively serial way. With a surgical approach, time is better spent on determining the merits of the matter rather than on tedious IT or ministerial tasks.
An alternative approach to touching the custodians is to use the readily available ESI, including metadata and derivate data (i.e., the data about that ESI), to gain a basic understanding of the lay-of-the-land, and to focus on those areas that seem most likely to be important. In virtually all civil e-discovery scenarios, neither the parties nor the courts expect perfection. They need a reasonable, logical and defensible approach—not a flawless one.
EDA need not start in a vacuum. Often a party or its counsel already has data from an earlier matter than can be reused for the new one. Sometimes a client has a structured set of information that can serve as a starting point. Using simple, low-cost solutions and techniques to understand, early on, the scope of the data across the matter and custodians can provide a highly valuable jumpstart.
EDA is a short, but important, operation
The EDA process does not have to be an expensive or cumbersome part of the EDRM process. Rather, it is the entire EDRM process writ smaller, designed with a narrower focus and conducted on a smaller scale. EDA also can become non-burdensome and low-cost when piggy-backed on other e-discovery tasks such as legal hold notification. Therefore, the process to be followed across the entire EDRM diagram can be interwoven with EDA tasks to build a successful legal strategy and save money starting early on and continuing throughout the life of the matter.
Many e-discovery providers already realize that EDA is a productive method to use at the start of case, whether they are using the term “EDA” yet or not. At this point, there are growing numbers of techniques and technologies that can help with the effort in an efficient way.
EDA is a highly effective and useful method to better understand the scope and issues that may arise with respect to the ESI related to a matte. It also is a way to predict costs and plan accurate e-discovery budgets. In fact, performing EDA early ensures a clearer discovery strategy and more predictable budgets throughout the life of a matter. Done well, EDA can help parties carve away substantial amounts of data they do not need, allowing them to focus their attention and resources on the data that matters most to their cases.
The net message is: Don't use a bone cutter if a scalpel will do.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllRecent Layoff/Callback Litigation Underscores Perils Employers Face From Every Direction
5 minute readOld Laws, New Tricks: Lawyers Using Patchwork of Creative Legal Theories to Target New Tech
In-House Gurus Say Inattention to Human Side of Tech Adoption Can Derail Best-Laid Plans
5 minute readNike Promotes Legal Chief to Marketing Chief as New CEO Launches Turnaround
Trending Stories
- 1Infant Formula Judge Sanctions Kirkland's Jim Hurst: 'Overtly Crossed the Lines'
- 2Abbott, Mead Johnson Win Defense Verdict Over Preemie Infant Formula
- 3Preparing Your Law Firm for 2025: Smart Ways to Embrace AI & Other Technologies
- 4Greenberg Traurig Initiates String of Suits Following JPMorgan Chase's 'Infinite Money Glitch'
- 5Data-Driven Legal Strategies
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250