August 2019CIOAPPLICATIONS.COM9determinative regardless of case type, size or venue. On the negative, everyone wants to avoid a mistake in ESI that results in sanctions, an adverse inference jury instruction, or worse, a large damage award. So where to start to achieve the end goal of optimizing, organizing, and synthesizing data to a point that it can be used as evidence? It's time for the CLO to talk with the CIO to learn about what the attorneys will describe as technology-assisted approaches to outline, for each case, the e-discovery assignments, monitor progress, produce privilege logs, and track and manage any process exceptions which will then be completed by manual attorney analysis to classify documents. The CIO will describe the process as technology assisted review or predictive coding with the configurable IT system to allow for advancing ever new search techniques, including but not limited capabilities like document clustering, fuzzy searching, pattern recognition to reduce the amount of manual review. Did they both describe the same processagain yes and no, and for both sides, crossing the divide requires a lot of prior planning and a bit of trust. Trust begins with openness and foreknowledge, and when it comes to ESI and legal discovery this means common views via communications from both the CLO and CIO to the IT team and document custodians about expectations for the entire process. Here is an outline to summarize and communicate the entire process:· Define the time frame and explain the rapid pace of e-discovery and the at times, inflexible deadlines driven either by the judge / magistrate or an intractable opposing counsel· Litigation hold notice to all relevant custodians. There are a number of great programs to enable this and link it to the ESI program / vendor. · Determine what to search and hold by working with IT early to data map the organization and where the ESI resides--A non-exhaustive list may include email, voicemail, cell phones, laptops, PDAs, scanners, back up tapes, hard-copy files, text messaging, instant messaging and other social media, meta data and thumb / external drives (including the "cloud"). But never forget about paper, legacy, archived and non-standard data across all geographical locations· Appropriate key words and search terms to eliminate the unrelated and irrelevant as well duplication suppression· Common misspellings and alternative spellings for de-duplication· Communicate with opposing counsel prior to the search · Not all ESI searches are created equal· Metrics to track the effectiveness, accuracy and productivity of the e-discovery process.· Agree on the technology to conduct the ESI search whether it is data analytics and algorithms built into the in-house, SAS in the cloud, or an outsourced vendor technology. · Leverage this technology with "collaboration platforms," whereby all inside and outside team members, such as outside counsel, experts and vendors, are virtually connected and provided access to their respective e-discovery tasks.· Ensure there is consistency in relevance, materiality, privilege and confidentiality determinations. Assume the court will require and enforce strict accountability on claims for privilege of any document produced and avoid a reliance in litigation on a "claw-back" agreement with opposing counsel.· Prepare to satisfy the inevitable meet and confer obligations of FRCP 26(f) and be able to defend all of the ESI process and decisions made regarding production and privilege for the judge· Prepare for trial utilizing the ESI as evidence; yours and the production from the opposing side(s). It often helps to explain that just because it was produced does not mean that it will be admitted into evidence. Why does all this matter? We all want to win the case or successfully resolve a matter
<
Page 8 |
Page 10 >