ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

Similar documents
Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

A Lawyer s Guide to ediscovery Processing

This Webcast Will Begin Shortly

Best Practices to Avoid Missing Key Evidence in Large Document Reviews

Viewpoint Review & Analytics

Shielding the Organization from Data Risk & E- Discovery Failures

Analytics Workflows for Smaller Cases. kcura LLC. All rights reserved.

Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud

Analytics Workflows for Smaller Cases and QC Workflows. kcura LLC. All rights reserved.

SEPTEMBER 2018

Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics

Los Angeles User Group

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

Washington DC User Group

Forensics and Electronic Documents: Critical Activities, Considerations, and Steps for Success

Nuix ediscovery Specialist

WHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR.

Tuesday, April 19, 2016

REFINING YOUR E-DISCOVERY REPORTING. How to cut through the noise and produce relevant reporting

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Conduent Legal and Compliance Solutions Viewpoint ediscovery Platform. Viewpoint Data Workflow & Management

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Three Common Techniques for E-Discovery Preservation

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

A Litigator's Guide to Going Native

Victor Stanley and the Changing Face

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Symantec Document Retention and Discovery

Pave the way: Build a value driven SAP GRC roadmap March 2015

By John P Collins, JD DTI, Director of Information Governance & Office 365 Consulting

7 Ways to Save Big Money on ediscovery

Cyber Risks in the Boardroom Conference

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

archiving with Office 365

Brainspace: Quick Reference

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Leading Authority Doug Kaminski On 3 Key Ways To Protect Your IP. #FearlessLaw on High Performance Counsel

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Handling Large Data Sets

Meta-Discovery Presents Challenges for Producing Parties

How to Jump-Start Early Case Assessment. A Case Study based on TREC 2008

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

Records Retention Policy

Miami User Group. Threading Workflows and Discussion. kcura LLC. All rights reserved.

White Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

D4 WHITEPAPER powered by people THREE METHODS OF EDISCOVERY DOCUMENT REVIEW COMPARED

25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar

Before Searching for Solutions It s All About the Data

Top 8 Healthcare Archiving and e-discovery Requirements

Cybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference

Avoiding the Top Meeting Mistakes. Mimi Almeida Jan Hennessey Jackie Klein Vintage Industry Professionals

The Hangover 2.5: Waking Up to Exchange 2010 Archiving and ediscovery Realities. Vision Session IM B29

Cyber Security and Data Management

Early case assessment Finding value beyond your next lawsuit

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.

Discovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family.

Enterprise Vault & e-discovery

Pinpoint Labs ESI Collection Tools

2010 E-discovery Best Practices from Real-World Cases

Welcome to Staying Ahead Webinar

Measuring Your. E-Discovery Program. Against Industry, 2015

Leveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference

Advanced Security Centers. Enabling threat and vulnerability services in a borderless world

Next Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today

7 Reasons to Worry About Your Current Archiving Strategy

London User Group August 18, 2016

The Trail of Electrons

Top 10 Mistakes to Avoid When Creating Productions

SECURE CLOUD BACKUP AND RECOVERY

PROFILE: ACCESS DATA

North American Market for Electronic Content Archiving

Deloitte Discovery Caribbean & Bermuda Countries Guide

Top 8 Healthcare Archiving & ediscovery Requirements

Start Now with Information Governance

NEW MICROSOFT FEATURES THAT WILL AFFECT EDISCOVERY IN THE FUTURE

Best Practices & Lesson Learned from 100+ ITGRC Implementations

The State of Data Center Health Management Strategy 2017

Exchange 2010 & 2013 Archiving & ediscovery Realities

Backup and Archiving for Office 365. White Paper

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

Why is Office 365 the right choice?

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Bring Your Own Device (BYOD)

The Power of the Inbox Tips and Tricks for Successful Marketing

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

IBM Atlas Suite Administrators Guide: Timer Tasks. for IBM Atlas Suite v6

UTAH VALLEY UNIVERSITY Policies and Procedures

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Transcription:

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive slides, recording and survey

SPEAKERS Matthew Verga Director, ediscovery Strategy Carolyn Young Senior Solutions Architect

TODAY S TOPICS A Data Targeting Perspective Data Targeting - Before Litigation - During Collection - During Processing - During ECA Strategy and Negotiation Conclusion - Key Takeaways - Questions and Answers

A DATA TARGETING PERSPECTIVE

A DATA TARGETING PERSPECTIVE Why does this matter? - Because of the high and ever-increasing cost of discovery 2012 Rand Corporation Study: - Median cost of ediscovery production was $1.8 million - Document review accounted for $0.73 of every $1.00 spent - the relationship between final costs and ESI volume is essentially a directly proportional one. Thus, volume reduction = cost reduction

A DATA TARGETING PERSPECTIVE What do we mean by a data targeting perspective? - Elevating technical considerations - Elevating strategic considerations - At each step: o What are the technically feasible options o Strategic value of culling versus retention o Interplay between technical, strategic, and legal

A DATA TARGETING PERSPECTIVE What you legally need to review and/or produce What it is technically feasible to do What efficiently uses available time and money

A DATA TARGETING PERSPECTIVE Sources File Types Dates Keywords

A DATA TARGETING PERSPECTIVE Desired Message Threads DATASET Desired Concept Clusters

A DATA TARGETING PERSPECTIVE This program is not about knowing it all Knowing it all is a full-time job you don t have time to do This program is about Familiarizing you with the range of options available Demonstrating how the options work together Equipping you to pose the right questions to the right people

BEFORE LITIGATION

DATA TARGETING BEFORE LITIGATION Don t wait for litigation to begin Proactive steps can be taken to reduce volumes and costs First, retention and remediation can be addressed - Critical first step - Clear policies and procedures - Categories and retention periods - Limiting duplicative retention - Remediation to compliance

DATA TARGETING BEFORE LITIGATION Second, proactive data mapping can be completed Benefits of pre-litigation data mapping Elements of a useful data map - Potentially relevant data stores - What records for what time periods - Searching and extraction options - Responsible individuals/roles - Employee-issued devices in use http://discovermodus.com/esi-data-mapping-webinar-presentation/

DURING COLLECTION

DATA TARGETING DURING COLLECTION Reactive data mapping Selecting custodians and sources Custodian interviews - Importance - Paper vs. electronic options Physical vs. logical acquisition - When to select which option?

DATA TARGETING DURING COLLECTION Selective Restoration - Forensic image and content reports o Usefulness o Limitations - Selection by directory, group or mailbox o Email o Loose files - Back-up tape options o Options and current technology - Selection by date o Limitations and risks File type filtering o Options and considerations

DURING PROCESSING

DATA TARGETING DURING PROCESSING Inclusion vs. exclusion - What is the difference? Directory or custodian filtering - Available options De-NISTing - What is it? - How is it executed?

DATA TARGETING DURING PROCESSING File-type filtering - Methods - Associated risks De-duplication - General method - Options available - Significance and impact - Document families

DATA TARGETING DURING PROCESSING Date range filtering - Methods - Associated risks and considerations Keyword filtering - Available options - What to look out for? - Better to wait?

DURING ECA

DATA TARGETING DURING ECA ECA vs EDA - EDA FTW (for the win) - Value increases with data volume - Many options, many tool-specific Random sampling - Utility and benefits - Sample sizes - Things you can learn

DATA TARGETING DURING ECA E-mail communication filtering - Sender and recipient - Domain names - Subject lines Keyword filtering - Simple, Boolean, fuzzy - ECA/EDA is the time o Best search tools o Best reporting options o Easiest iteration Objective decision making False positive keyword hits Privilege decisions Workflows for prioritizing o More responsive o Custodians

DATA TARGETING DURING ECA E-mail threading - Grouping, sequencing, content analysis, visualization - Organization versus disposition Near duplicate identification - Multiple techniques, variable thresholds - Organization versus disposition Conceptual analytics - Conceptual searching and clustering, categorization, CAR - Advantages and disadvantages

STRATEGY AND NEGOTIATION

STRATEGY AND NEGOTIATION The kitchen sink approach is not recommended Broad overview provided to show range Project specific strategies must be developed - Factors to consider o Available time o Available budget o Technological resources o Human resources o Matter-specific concerns

STRATEGY AND NEGOTIATION Data Targeting Before Litigation (EDRM IM Phase) Data Reduction During Collection (EDRM Identification, Preservation and Collection Phases) Retention, Remediation, Mapping Targeted Collection, Selective Restoration Data Targeting During Processing (EDRM Processing Phase) Data Targeting During ECA (EDRM Analysis Phase)* Directory Filtering, Custodian Filtering, De- NISTing, File-Type Filtering, Deduplication Date Range Filtering, Keyword Filtering Random Sampling, E-mail Communication Filtering, Keyword Filtering, Conceptual Analytics, E-mail Threading Review

STRATEGY AND NEGOTIATION Negotiation can be the most powerful tool of all Negotiation with opposing parties - Before, during, and after 26(f) - With judge, if necessary Negotiated agreements - Can limit scope - Can specify methodology - Can be incorporated into orders and enforced

CONCLUSION

KEY TAKEAWAYS Elevate technical and strategic considerations Understand the available options and limitations at each stage Consider the strategic value of culling versus retention Use technology to your advantage, but be consistent in your approach Document your decisions and rationales Seek expert help where needed

Q / A

ENGAGE WITH MODUS Modus email coming tomorrow with slides, recording, survey and invite to next webinar Visit us online at http://discovermodus.com/webinars/ for more information on next webinar on June 24 th at 1:00PM EDT entitled: Approaching TAR An Insider s Guide to Avoiding Common Problems Make sure to visit our website for valuable white papers, regular blog posts, ongoing surveys and more at www.discovermodus.com Including the white paper Zeroing In A Data Targeting Perspective On Reducing E-Discovery Cost covering the topics from this program Thank you!