As the world increases its reliance on technology, many of our tools continue to grow and evolve, including Electronic Discovery (“eDiscovery”). eDiscovery refers to identifying, collecting and producing electronically stored information (“ESI”) in response to a request for production in a lawsuit or investigation. While eDiscovery has been around for many years, recent changes have altered the landscape. This article will discuss some of the common issues and present tips to recognize and resolve them.
Inefficiency Increases Document Review Costs
Inefficient processes significantly increase eDiscovery costs. Luckily, recognizing these inefficiencies and understanding how to correct them will minimize your document review costs. Three major inefficiencies that can be easily addressed are: (1) disproportionate time spent on search term negotiations, (2) junk attachments, and (3) excessive issue coding.
While inefficiency traps continue to plague many organizations, there are tools available to correct them. Your review team should work together to ensure that your document review is efficient and defensible every time.
While the demand for an attorney’s experience and judgment remains irreplaceable in the legal profession, with the rise of big data, machine learning can be a useful tool for helping legal teams make better decisions and predictions. It is undeniable that litigation, investigations, and regulatory compliance matters continue to see exponential growth in the amount of email, documents, spreadsheets, images, videos, audio files, third-party applications, chat, and other forms of data have become too extensive to review manually. TAR is initially trained by reviewers to identify relevant documents and then uses human judgments to continuously search for additional relevant documents to cull a data set and organize data.
With TAR, review teams can work faster and more efficiently. For example, a simple function in TAR shows a percentage of relevant documents found from a search inquiry. Review teams can have a reasonable basis to conclude their review once the search objective is satisfied. This function reduces the review time and allows review teams a head start on their collection of necessary documents.
Technological advances have changed the way enterprises communicate internally and externally. Collaborative applications like Slack, Microsoft Teams, and Jabber have become mainstays in recent years. The growing adoption of these collaborative applications has caused difficulties in ESI discovery since they can contain potential evidence in litigation, internal investigations, and compliance matters. Courts are becoming increasingly familiar with collaborative applications, and as such, they are more likely to compel production from these sources. The particularities and lack of uniformity of each collaborative application, however, presents challenges to discovery teams. Companies can take these steps now to prepare for successfully producing collaborative data in eDiscovery:
COVID has brought many changes to the legal profession. Lawyers have had to adjust to remote discovery and court proceedings, meeting with clients on Zoom, and operating outside traditional office walls. With remote work comes new challenges and concerns, including whether remote document review is safe and secure. Reviewers working from home need to take extra precautions to safeguard confidential information and should consider prying eyes from curious family members or the level of security provided by a home internet connection. Remote document review, however, can be performed safely if certain precautions are taken.
The most secure approach to performing document review requires reviewers to use a VPN tunnel or other type of secure portal when accessing the review platform. If neither a VPN nor a secure portal is an option, two-factor authentication should be implemented for any person remotely accessing the review platform.
Document reviewers should also follow the privacy policies of their law firm, company, or vendor. In addition, there are personal actions that can be followed to improve security:
Keeping these tips mind, following the organization’s policies, and regularly training reviewers on cybersecurity and cyber hygiene, will help ensure the security of your confidential data.
Under the Federal Rules of Evidence (“FRE”), a court cannot admit an item into evidence unless a party authenticates it and satisfies certain additional criteria. In regards to ESI, authentication typically occurs before a hearing or trial through requests for admission or an authenticity stipulation with participating parties. Where an agreement between the parties cannot be reached or a request for admission cannot be obtained, alternative methods can be utilized, including:
Discovery can make—or break—any litigation. Those conducting an eDiscovery search need to obtain the right information as efficiently as possible while avoiding soaring costs and lost time. State-of-the-art tools now exist to produce the best possible outcome for litigators who are both aware of these tools and know how to use them. Clients finding themselves in litigation would do well to hire outside counsel who know how to use those tools while avoiding common eDiscovery pitfalls.
Patrick Ross, Senior Manager of Marketing & Communications
EmailP: 619.906.5740
Suzie Jayyusi, Events Planner
EmailP: 619.525.3818