E-discovery: Not as expensive as old habits
Remember the good-old days, when in retrospect the cost of document production was modest and of little object?
June 04, 2013 at 07:38 AM
12 minute read
The original version of this story was published on Law.com
Remember “the good-old days,” when in retrospect the cost of document production was “modest” and of little object? Today, the litigation world is different. Electronically stored information has exploded production costs. But maybe the problem is not so much technology but our antediluvian habits from the “good-old-days” and blindness to new methods and technologies.
For example, a huge litigation cost driver is e-discovery overcollection, but overcollection has three throwback causes and at least one neat modern solution. First, overcollection is first caused by the residue of discovery habits from the paper era; second, overcollection is caused by an irrational yet time-honored fear of sanctions; and third, overcollection is driven by an old-fashioned fear of data and software, prevalent among litigators. This is a potent, perfect storm that needs to be neutralized early in any case. The good news, discussed below, is that we now have a handy solution. But first, more on how we got to this deplorable state.
First, overcollection is, in part, caused by bad habits from the days of old, when document discovery was paper-based. Out would go the request for production of any and all documents “related to, about, or concerning” a particular topic, person, or issue in the litigation. The producing party would then gather “all” the potentially relevant documents, and those collected documents would be reviewed, redacted, stamped, and produced. This recipe from an increasingly distant era cooks up a mess in the ESI world. In an electronic world, no longer are relevant documents neatly stored as paper reports, memoranda, and correspondence in files or neatly labeled file folders and cabinets. Now, electronically stored and relevant information is jumbled and disorganized, and often haphazardly dropped into a number of storage locations. When you start collecting these entire locations to sequester and corral the relevant ESI, the volume of collected data becomes enormous while the percentage of relevant documents simultaneously dwindles. The rest is often the horrifying cost associated with tales of e-discovery gone wrong.
The second cause of overcollection stems from the fear of sanctions because of missing documents in the production. No one wants to experience the revelation, halfway or fully through the discovery process, that some important documents were not produced, and now the whole process must start over, at their expense. This fear of “missing documents” has been fueled in large part by disasters of custodian (witness) self-collection — few things lead to more trouble in e-discovery than custodians mucking around in their own data, trying to decide as non-lawyers what is relevant, altering metadata and documents by opening and moving files, and intentionally or negligently doing a poor collection job. Most employees are not trained in self-collection and view litigation as a distraction from operational concerns and responsibilities, and why would they worry anyway? Most employees do not have, in their annual reviews, a category for evaluating how well they performed the self-collection on documents for litigation.
The third cause of overcollection is simply the fear of data and software tools, endemic to a species I call the dataphobiac. Because internal self-collection is rightly frowned upon, the all-too-common reaction is to avoid dealing with the data at all and to retain outside forensics experts to harvest bit-stream complete copies of the hard drives of every possible custodian and location. This results in collections that on average contain 90% or more irrelevant information. This massive collection of junk, garbage, and irrelevant data must then be culled by deNISTing (removing the non-human created system files), de-duplication, and near de-duplication (identifying the copies and near copies), and then engaging in a search, analysis, and refining process using more or less sophisticated technologies ranging from key word searches to clustering and grouping, to email threading, to predictive analytics, and then it all needs to be reviewed. With such an approach, no wonder e-discovery has become dreaded as a budget buster with little value.
However, help has arrived! There is a middle ground between self-collection and forensic bit stream collection of entire drives. We can forensically collect only the active data needed from the key custodians, in a manner that preserves the file metadata. This may sound like a magic trick, but the technology is readily available and easy to learn and deploy, and Federal Rule of Civil Procedure 26(b)(2)(C)(iii) limits electronic discovery to what is proportional to the case.
Here's how it works: The custodian is sent a pre-configured remote drive, to be attached to the custodian's computer by a USB or other connection. The retained attorneys responsible for the collection then interview the custodian about the case facts and issues, and all custodian's data locations (e.g., an email folder). Based on that interview, relevant files are moved to the remote drive connected to the computer while preserving metadata and creating a legally defensible log.
Huge efficiencies are immediately accomplished through this process. Not only is relevant data identified and moved to the external drive for analysis, but the interviewing counsel learns about the case in an informed manner by talking to the custodian about how the custodian created, received, stored, and published data relevant to the litigation, all while viewing the custodian's computer with the custodian. This process allows the retained counsel to get a concrete and specific feel for the witness and the location of important information, which also facilitates an accurate earlier case evaluation.
Of course, having retained counsel travel to the custodian can still be expensive and intrusive … but why do that? We live in the Internet Age! Now, the retained counsel can ship the preconfigured drive and connect to the custodian and his or her computer from the law office or other remote location, using any number of very handy and staggeringly inexpensive screen-sharing applications—the retained counsel can thus view (and can control) the custodian computer as though he or she is sitting at the witness's side. Thus, retained counsel and the custodian witness meet online talk about the case, and collect only what is necessary. Once the data is copied to the pre-configured hard drive, the hard drive is appropriately labeled to create a chain of custody, encrypted, and shipped back to the lawyer by commercial courier. Other than the shipping of the hard drive, the entire process is accomplished over the Internet. Actually the copying process could be accomplished entirely over the Internet, but utilizing a connected external drive allows for quicker transfer speeds and minimizes “hiccups” over an Internet connection.
Ah, the joy of cutting significant costs while improving the quality of the discovery process. Indeed, supervised forensic activity collection creates savings on top of savings: retained counseling quickly begins to learn about the case; the interview process is effective, and the collection is streamlined; the metadata is preserved; a defensible collection record, log, and hash values are automatically created; and therefore retained counsel and expert fees are reduced.
Remember “the good-old days,” when in retrospect the cost of document production was “modest” and of little object? Today, the litigation world is different. Electronically stored information has exploded production costs. But maybe the problem is not so much technology but our antediluvian habits from the “good-old-days” and blindness to new methods and technologies.
For example, a huge litigation cost driver is e-discovery overcollection, but overcollection has three throwback causes and at least one neat modern solution. First, overcollection is first caused by the residue of discovery habits from the paper era; second, overcollection is caused by an irrational yet time-honored fear of sanctions; and third, overcollection is driven by an old-fashioned fear of data and software, prevalent among litigators. This is a potent, perfect storm that needs to be neutralized early in any case. The good news, discussed below, is that we now have a handy solution. But first, more on how we got to this deplorable state.
First, overcollection is, in part, caused by bad habits from the days of old, when document discovery was paper-based. Out would go the request for production of any and all documents “related to, about, or concerning” a particular topic, person, or issue in the litigation. The producing party would then gather “all” the potentially relevant documents, and those collected documents would be reviewed, redacted, stamped, and produced. This recipe from an increasingly distant era cooks up a mess in the ESI world. In an electronic world, no longer are relevant documents neatly stored as paper reports, memoranda, and correspondence in files or neatly labeled file folders and cabinets. Now, electronically stored and relevant information is jumbled and disorganized, and often haphazardly dropped into a number of storage locations. When you start collecting these entire locations to sequester and corral the relevant ESI, the volume of collected data becomes enormous while the percentage of relevant documents simultaneously dwindles. The rest is often the horrifying cost associated with tales of e-discovery gone wrong.
The second cause of overcollection stems from the fear of sanctions because of missing documents in the production. No one wants to experience the revelation, halfway or fully through the discovery process, that some important documents were not produced, and now the whole process must start over, at their expense. This fear of “missing documents” has been fueled in large part by disasters of custodian (witness) self-collection — few things lead to more trouble in e-discovery than custodians mucking around in their own data, trying to decide as non-lawyers what is relevant, altering metadata and documents by opening and moving files, and intentionally or negligently doing a poor collection job. Most employees are not trained in self-collection and view litigation as a distraction from operational concerns and responsibilities, and why would they worry anyway? Most employees do not have, in their annual reviews, a category for evaluating how well they performed the self-collection on documents for litigation.
The third cause of overcollection is simply the fear of data and software tools, endemic to a species I call the dataphobiac. Because internal self-collection is rightly frowned upon, the all-too-common reaction is to avoid dealing with the data at all and to retain outside forensics experts to harvest bit-stream complete copies of the hard drives of every possible custodian and location. This results in collections that on average contain 90% or more irrelevant information. This massive collection of junk, garbage, and irrelevant data must then be culled by deNISTing (removing the non-human created system files), de-duplication, and near de-duplication (identifying the copies and near copies), and then engaging in a search, analysis, and refining process using more or less sophisticated technologies ranging from key word searches to clustering and grouping, to email threading, to predictive analytics, and then it all needs to be reviewed. With such an approach, no wonder e-discovery has become dreaded as a budget buster with little value.
However, help has arrived! There is a middle ground between self-collection and forensic bit stream collection of entire drives. We can forensically collect only the active data needed from the key custodians, in a manner that preserves the file metadata. This may sound like a magic trick, but the technology is readily available and easy to learn and deploy, and
Here's how it works: The custodian is sent a pre-configured remote drive, to be attached to the custodian's computer by a USB or other connection. The retained attorneys responsible for the collection then interview the custodian about the case facts and issues, and all custodian's data locations (e.g., an email folder). Based on that interview, relevant files are moved to the remote drive connected to the computer while preserving metadata and creating a legally defensible log.
Huge efficiencies are immediately accomplished through this process. Not only is relevant data identified and moved to the external drive for analysis, but the interviewing counsel learns about the case in an informed manner by talking to the custodian about how the custodian created, received, stored, and published data relevant to the litigation, all while viewing the custodian's computer with the custodian. This process allows the retained counsel to get a concrete and specific feel for the witness and the location of important information, which also facilitates an accurate earlier case evaluation.
Of course, having retained counsel travel to the custodian can still be expensive and intrusive … but why do that? We live in the Internet Age! Now, the retained counsel can ship the preconfigured drive and connect to the custodian and his or her computer from the law office or other remote location, using any number of very handy and staggeringly inexpensive screen-sharing applications—the retained counsel can thus view (and can control) the custodian computer as though he or she is sitting at the witness's side. Thus, retained counsel and the custodian witness meet online talk about the case, and collect only what is necessary. Once the data is copied to the pre-configured hard drive, the hard drive is appropriately labeled to create a chain of custody, encrypted, and shipped back to the lawyer by commercial courier. Other than the shipping of the hard drive, the entire process is accomplished over the Internet. Actually the copying process could be accomplished entirely over the Internet, but utilizing a connected external drive allows for quicker transfer speeds and minimizes “hiccups” over an Internet connection.
Ah, the joy of cutting significant costs while improving the quality of the discovery process. Indeed, supervised forensic activity collection creates savings on top of savings: retained counseling quickly begins to learn about the case; the interview process is effective, and the collection is streamlined; the metadata is preserved; a defensible collection record, log, and hash values are automatically created; and therefore retained counsel and expert fees are reduced.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllAfter 2024's Regulatory Tsunami, Financial Services Firms Hope Storm Clouds Break
2024 in Review: Judges Met Out Punishments for Ex-Apple, FDIC, Moody's Legal Leaders
Financial Watchdog Alleges Walmart Forced Army of Gig-Worker Drivers to Receive Pay Through High-Fee Accounts
Trending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250