Use the scalpel first: EDA makes e-discovery a successful operation
EDA can help legal departments carve away unneeded data, allowing them to focus on strictly whats most relevant to their cases.
November 17, 2011 at 01:56 AM
13 minute read
The original version of this story was published on Law.com
This article is part two of a series. To read part one, click here.
Would you like your appendix removed by a surgeon wielding a bone cutter instead of a scalpel? We wouldn't. And yet when legal professionals go through the EDRM process in e-discovery, they often hack away with the wrong tools because they don't know what operation they're performing, what procedures to follow or how to carry them out.
When surgeons embark on a procedure, they first identify what they're dealing with—its size and scope, and what the best and most minimally invasive way to operate will be. Similarly, in e-discovery, an early identification and understanding of the relevant custodians and the data entailed in the matter at hand is critically important for inside and outside counsel alike.
During litigation, owners and keepers of the electronic data relevant to the case, such as corporate employees, are called “custodians” because they have primary access to—or control over—that electronically stored information (ESI). Custodians generally are the primary source of ESI relevant to the matter. They typically store their information in many different formats, such as emails within a centralized server, documents stored on the local desktop or laptop, home folders located on a distributed corporate storage system, or even data stored in the “cloud” where it exists offsite on a remote server. Their ESI may be stored in centralized document management systems, or it may be scattered across many computers, programs and media such as thumb drives, CDs, smartphones and tablet computers.
The e-discovery team must ask the following questions:
- “Where is the data we need? “
- “How can we separate it from what we don't want?”
- “How can we find and preserve it easily without inconveniencing a lot of people?”
A well-executed early data assessment (EDA) process can help answer these questions. EDA and its technology tools help legal professionals to summarize the number of custodians and their disparate sources of ESI that must be identified early on, which leads to more accurate budgeting and strategy planning. If EDA is not conducted well and critical data is overlooked, underestimated or, worse, deliberately concealed or deleted, that breakdown in processes can lead to court sanctions, news headlines or worse.
EDA tools can be used to look at various drives and folders to determine where custodian ESI is located. In some cases, the custodian can be relied upon to tell legal and IT where the data is. Other times, custodians do not know what data they have, or have no idea that their data is relevant to a case. In those instances, relying solely on the custodian to tell legal and IT where the data is won't work so well.
Although there are myriad ways to get at custodians of interest and data of theirs that you may care about, a useful two-step strategy to consider using is:
- Step 1 – Identify and understand the systems implicated by the legal matter at hand where those systems are ones the custodians' control or use. These may be fairly obvious systems, such as the email system, workstations and servers and the document management system, but they also could be something more obscure.
- Step 2 – Survey the custodians and managers of the data contained in the systems identified in Step 1. The goal of surveying and “identifying” ESI likely to be relevant to a particular legal matter requires a balancing of legal defensibility with IT and other costs and custodian burden (e.g., system downtime, time away from regular job duties, etc.). While you want to use defensible methods, you also want to avoid imposing unneeded burden or causing unnecessary intrusion.
Surgical techniques
A combination of new, more- affordable EDA technologies and coordinated e-discovery plans can give parties to legal and regulatory matters a more accurate assessment of the ESI. This assessment can then be used to more precisely calculate the range of costs in a predictable manner for searching, reviewing and producing a set of relevant documents.
Touching custodians a minimum amount of times can be an effective strategy, for example: by encouraging them to answer questions even as they acknowledge a legal hold or answer merit-related interview questions.
Focused, surgical ESI identification processes can make the assessment more accurate, but they require slightly more custodian involvementalbeit with small, quick touches. This is far better than the costly and time-consuming traditional method of collecting and processing indiscriminately, then searching using keywords and file filters to shrink the haystack, and then reviewing in a relatively serial way. With a surgical approach, time is better spent on determining the merits of the matter rather than on tedious IT or ministerial tasks.
An alternative approach to touching the custodians is to use the readily available ESI, including metadata and derivate data (i.e., the data about that ESI), to gain a basic understanding of the lay-of-the-land, and to focus on those areas that seem most likely to be important. In virtually all civil e-discovery scenarios, neither the parties nor the courts expect perfection. They need a reasonable, logical and defensible approach—not a flawless one.
EDA need not start in a vacuum. Often a party or its counsel already has data from an earlier matter than can be reused for the new one. Sometimes a client has a structured set of information that can serve as a starting point. Using simple, low-cost solutions and techniques to understand, early on, the scope of the data across the matter and custodians can provide a highly valuable jumpstart.
EDA is a short, but important, operation
The EDA process does not have to be an expensive or cumbersome part of the EDRM process. Rather, it is the entire EDRM process writ smaller, designed with a narrower focus and conducted on a smaller scale. EDA also can become non-burdensome and low-cost when piggy-backed on other e-discovery tasks such as legal hold notification. Therefore, the process to be followed across the entire EDRM diagram can be interwoven with EDA tasks to build a successful legal strategy and save money starting early on and continuing throughout the life of the matter.
Many e-discovery providers already realize that EDA is a productive method to use at the start of case, whether they are using the term “EDA” yet or not. At this point, there are growing numbers of techniques and technologies that can help with the effort in an efficient way.
EDA is a highly effective and useful method to better understand the scope and issues that may arise with respect to the ESI related to a matte. It also is a way to predict costs and plan accurate e-discovery budgets. In fact, performing EDA early ensures a clearer discovery strategy and more predictable budgets throughout the life of a matter. Done well, EDA can help parties carve away substantial amounts of data they do not need, allowing them to focus their attention and resources on the data that matters most to their cases.
The net message is: Don't use a bone cutter if a scalpel will do.
This article is part two of a series. To read part one, click here.
Would you like your appendix removed by a surgeon wielding a bone cutter instead of a scalpel? We wouldn't. And yet when legal professionals go through the EDRM process in e-discovery, they often hack away with the wrong tools because they don't know what operation they're performing, what procedures to follow or how to carry them out.
When surgeons embark on a procedure, they first identify what they're dealing with—its size and scope, and what the best and most minimally invasive way to operate will be. Similarly, in e-discovery, an early identification and understanding of the relevant custodians and the data entailed in the matter at hand is critically important for inside and outside counsel alike.
During litigation, owners and keepers of the electronic data relevant to the case, such as corporate employees, are called “custodians” because they have primary access to—or control over—that electronically stored information (ESI). Custodians generally are the primary source of ESI relevant to the matter. They typically store their information in many different formats, such as emails within a centralized server, documents stored on the local desktop or laptop, home folders located on a distributed corporate storage system, or even data stored in the “cloud” where it exists offsite on a remote server. Their ESI may be stored in centralized document management systems, or it may be scattered across many computers, programs and media such as thumb drives, CDs, smartphones and tablet computers.
The e-discovery team must ask the following questions:
- “Where is the data we need? “
- “How can we separate it from what we don't want?”
- “How can we find and preserve it easily without inconveniencing a lot of people?”
A well-executed early data assessment (EDA) process can help answer these questions. EDA and its technology tools help legal professionals to summarize the number of custodians and their disparate sources of ESI that must be identified early on, which leads to more accurate budgeting and strategy planning. If EDA is not conducted well and critical data is overlooked, underestimated or, worse, deliberately concealed or deleted, that breakdown in processes can lead to court sanctions, news headlines or worse.
EDA tools can be used to look at various drives and folders to determine where custodian ESI is located. In some cases, the custodian can be relied upon to tell legal and IT where the data is. Other times, custodians do not know what data they have, or have no idea that their data is relevant to a case. In those instances, relying solely on the custodian to tell legal and IT where the data is won't work so well.
Although there are myriad ways to get at custodians of interest and data of theirs that you may care about, a useful two-step strategy to consider using is:
- Step 1 – Identify and understand the systems implicated by the legal matter at hand where those systems are ones the custodians' control or use. These may be fairly obvious systems, such as the email system, workstations and servers and the document management system, but they also could be something more obscure.
- Step 2 – Survey the custodians and managers of the data contained in the systems identified in Step 1. The goal of surveying and “identifying” ESI likely to be relevant to a particular legal matter requires a balancing of legal defensibility with IT and other costs and custodian burden (e.g., system downtime, time away from regular job duties, etc.). While you want to use defensible methods, you also want to avoid imposing unneeded burden or causing unnecessary intrusion.
Surgical techniques
A combination of new, more- affordable EDA technologies and coordinated e-discovery plans can give parties to legal and regulatory matters a more accurate assessment of the ESI. This assessment can then be used to more precisely calculate the range of costs in a predictable manner for searching, reviewing and producing a set of relevant documents.
Touching custodians a minimum amount of times can be an effective strategy, for example: by encouraging them to answer questions even as they acknowledge a legal hold or answer merit-related interview questions.
Focused, surgical ESI identification processes can make the assessment more accurate, but they require slightly more custodian involvementalbeit with small, quick touches. This is far better than the costly and time-consuming traditional method of collecting and processing indiscriminately, then searching using keywords and file filters to shrink the haystack, and then reviewing in a relatively serial way. With a surgical approach, time is better spent on determining the merits of the matter rather than on tedious IT or ministerial tasks.
An alternative approach to touching the custodians is to use the readily available ESI, including metadata and derivate data (i.e., the data about that ESI), to gain a basic understanding of the lay-of-the-land, and to focus on those areas that seem most likely to be important. In virtually all civil e-discovery scenarios, neither the parties nor the courts expect perfection. They need a reasonable, logical and defensible approach—not a flawless one.
EDA need not start in a vacuum. Often a party or its counsel already has data from an earlier matter than can be reused for the new one. Sometimes a client has a structured set of information that can serve as a starting point. Using simple, low-cost solutions and techniques to understand, early on, the scope of the data across the matter and custodians can provide a highly valuable jumpstart.
EDA is a short, but important, operation
The EDA process does not have to be an expensive or cumbersome part of the EDRM process. Rather, it is the entire EDRM process writ smaller, designed with a narrower focus and conducted on a smaller scale. EDA also can become non-burdensome and low-cost when piggy-backed on other e-discovery tasks such as legal hold notification. Therefore, the process to be followed across the entire EDRM diagram can be interwoven with EDA tasks to build a successful legal strategy and save money starting early on and continuing throughout the life of the matter.
Many e-discovery providers already realize that EDA is a productive method to use at the start of case, whether they are using the term “EDA” yet or not. At this point, there are growing numbers of techniques and technologies that can help with the effort in an efficient way.
EDA is a highly effective and useful method to better understand the scope and issues that may arise with respect to the ESI related to a matte. It also is a way to predict costs and plan accurate e-discovery budgets. In fact, performing EDA early ensures a clearer discovery strategy and more predictable budgets throughout the life of a matter. Done well, EDA can help parties carve away substantial amounts of data they do not need, allowing them to focus their attention and resources on the data that matters most to their cases.
The net message is: Don't use a bone cutter if a scalpel will do.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllInternal Whistleblowing Surged Globally in 2024, So Why Were US Numbers Flat?
6 minute readInside Track: AI Is Sure to Fray Big Law's Devotion to Billable Hour
Trending Stories
- 1New York-Based Skadden Team Joins White & Case Group in Mexico City for Citigroup Demerger
- 2No Two Wildfires Alike: Lawyers Take Different Legal Strategies in California
- 3Poop-Themed Dog Toy OK as Parody, but Still Tarnished Jack Daniel’s Brand, Court Says
- 4Meet the New President of NY's Association of Trial Court Jurists
- 5Lawyers' Phones Are Ringing: What Should Employers Do If ICE Raids Their Business?
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250