E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation

Similar documents
E-Discovery for Backup Tapes. How Technology Is Easing the Burden

E-Discovery Research Roundtable: Buyers Perspectives on Challenges and Solutions

Director, Value Engineering

Meeting E-Discovery Challenges with Confidence

for Insurance Claims Professionals

From Information Management to Information Governance: The New Paradigm

Predictive Coding Helps Companies Reduce Discovery Costs

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Best Practices in Managed Document Review

Continuing Legal Education Program Course Catalog

PROFESSIONAL COUNSELSM

GUIDE TO ACHIEVING COMPLIANCE a South African perspective

Privacy in the Cloud Computing Era. A Microsoft Perspective

3 "C" Words You Need to Know: Custody - Control - Cloud

A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing

This is not your grandfather s litigation. BUT. ediscovery Services are not legal services.

ediscovery and Information Governance Practice Overview

Cloud Computing: Implications and Guidelines for Records Management in Kentucky State Government

As IDC looks back on ediscovery corporate technology priorities among the highly litigated industries in 2009, the following takeaways emerge:

Best Practices in Electronic Record Retention

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

How Cisco IT Uses SAN to Automate the Legal Discovery Process

Special Report: ROI of Records Management for Legal Discovery

A United States Based Telecommunications Firm Employs FTI Harvester to Address ediscovery Challenges in Microsoft SharePoint

Metadata, Electronic File Management and File Destruction

The Discovery-Ready Enterprise II: Challenges and Opportunities on the Road to Litigation Preparedness

10 WAYS TO TRANSFORM YOUR LAW FIRM WITH A BUSINESS APP

Jason Velasco 1/23/14. Webinar Sponsorship Partner

E-Discovery Best Practices

The Path to Managed Services in Discovery

Blueprint for Cloud-Based ediscovery. An evaluation framework for companies and firms bringing ediscovery in-house via the cloud

E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support

Village of Hastings-on-Hudson Electronic Policy. Internal and External Policies and Procedures

Understanding the Legal Risks of Cloud Computing. Navigating the Network Security and Data Privacy Issues Associated with Cloud Services

Expanding Your Practice with an Online Office By Stephanie Kimbro

Insights into Cloud Computing

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

The Importance of Privacy & Data Security in a Changing World

Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of

In-house Counsel s Next Cost Savings Frontier: Cost Minimization by Centralizing Litigation Document Collections

Governance Takes A Central Role As Enterprises Shift To Mobile

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

White Paper on Financial Institution Vendor Management

THOMSON IP MANAGER KNOWING IS INGENIOUS

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

E-Discovery Roundtable: The State of Information Governance and Advanced Analytics

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

The Disconnect Between Legal and IT Teams

COURSE DESCRIPTION AND SYLLABUS LITIGATING IN THE DIGITAL AGE: ELECTRONIC CASE MANAGEMENT ( ) Fall 2014

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology

Five Steps to Ensure a Technically Accurate Document Production

Reducing Total Cost and Risk in Multilingual Litigation A VIA Legal Brief

E-Discovery and Data Management. Managing Litigation in the Digital Age. Attorney Advertising

HIPAA BUSINESS ASSOCIATE AGREEMENT

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Defensible destruction:

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

10 Steps to Establishing an Effective Retention Policy

Critical Issues in Software Licensing. William A. Tanenbaum Chair, Technology, Intellectual Property & Outsourcing Group

Security in Fax: Minimizing Breaches and Compliance Risks

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski

E-Discovery Taboos: Pain Points among (and within) Clients, Counsel and Vendors Tuesday, April 29, :30 3:45

Advisory Committee on Professional Ethics. Appointed by the Supreme Court of New Jersey

What Data? I m A Trucking Company!

The ediscovery Balancing Act

How To Manage E-Discovery

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Dispelling E-Discovery Myths in Internal and Government Investigations By Amy Hinzmann

Effective Practices for Cloud Security

The Phoenix Corporate Legal Suite. Efficient Document, , and Matter Management for Law Departments and In-house Counsel

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

Insert Partner logo here. Financial Mobility Balancing Security and Success

E-Discovery Tip Sheet

Law Firm Professional Services Outsourcing White Paper

Achieving & Maintaining E-discovery Fitness

BYOD Policies: A Litigation Perspective

Taking care of what s important to you

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

Solving Key Management Problems in Lotus Notes/Domino Environments

Predictive Coding Defensibility and the Transparent Predictive Coding Workflow

ediscovery WORKFLOW AUTOMATION IN SIX EASY STEPS

Acknowledgments Introduction: Welcome to the Labyrinth. CHAPTER 1 Gathering the Evidence 1. CHAPTER 2 Third-Party Experts 25

E-DISCOVERY: A Primer

NSS Billing Contract Between. Innovative Healthcare Solutions

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. DECEMBER 2013

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

LSSA Guidelines on the Use of Internet-Based Technologies in Legal Practice

Strategies for assessing cloud security

legal hold data migrations: how to make the move

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

QBE European Operations Professional practices update

Conference Cooperation Proclamation

Guidance Statement GS 011 Third Party Access to Audit Working Papers

Managing General Agents (MGAs) Guideline

Securing The Cloud With Confidence. Opinion Piece

Proactive Data Management for ediscovery

CASE STUDY: Top 5 Communications Company Evaluates Leading ediscovery Solutions

Transcription:

E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation

TABLE OF CONTENTS Introduction... 3 IMPACT OF CLOUD COMPUTING... 3 Enforcing data management policies... 3 Protecting confidential information... 3 Ensuring timely access to data stored in the cloud... 3 Negotiating contracts with cloud providers... 4 IMPACT OF SOCIAL MEDIA... 4 Preserving data from social media sites... 4 Establishing social media policies... 4 Impact of Technology Assisted Review... 5 Moving to acceptance... 5 Understanding how the technology will be used... 5 Developing protocols and best practices for use... 5 Final Thoughts... 6 About Integreon... 6 E-Discovery Roundtable 2

Buyers Perspectives on the Impact of Technology Innovation Introduction Today s fast evolving technology landscape is challenging the ability of e discovery professionals to keep up. Where electronic discovery once focused on the preservation and production of email and other documents from internal systems, relevant data can now reside in the cloud and on social media sites which are outside of an organization s centralized information technology ( IT ) infrastructure. This complicates the issue of control over data, requiring that organizations implement increasingly sophisticated approaches for information governance and discovery planning. Equally challenging are rapidly advancing technology solutions that require the development of new best practices for ensuring the defensibility of discovery processes. One example is technology assisted review (a.k.a. predictive coding ), which has been touted by some as a groundbreaking solution in the struggle to contain escalating discovery costs. Technology innovations are dramatically re shaping e discovery and many organizations are now looking for ways to adapt. This was the topic of a recent roundtable discussion hosted by Integreon in which participants focused on three key trends: Cloud computing Social media Technology assisted review The participants of the roundtable were assembled from top corporations and law firms as a cross section of industry roles, including lawyers and litigation support professionals, IT managers, and compliance and records management experts. This report summarizes their perspectives on the impact that technology innovation is having on the discovery process and what organizations are doing to address the issues. IMPACT OF CLOUD COMPUTING Discussion amongst roundtable participants confirmed that most corporations are actively investigating the business benefits and implications of cloud adoption. Participants identified the need for control over data as the primary e discovery concern posed by the cloud. This relates to information governance, particularly for enforcing data management policies, protecting confidential information, and ensuring timely access for the collection of data. Enforcing data management policies Organizations that enforce their data management policies in the cloud can substantially minimize the risk of spoliation during discovery. Specifically is the need to manage data retention and destruction practices. Roundtable participants were unanimous in citing the importance of establishing contractual provisions to ensure cloud providers adhere to the organization s data management policies. Also noted was the need to consider provisions to address possible bankruptcy of the cloud provider and other unexpected major events that could have severe implications for discovery. Contracts that effectively support an organization s data management policies can serve as the cornerstone for a defensible discovery process able to withstand close scrutiny by the courts and regulatory bodies. Protecting confidential information Organizations that store data in the cloud must not only be concerned about their own discovery obligations but also the discovery obligations of their chosen cloud providers. Despite the presence of confidentiality agreements, cloud providers may be compelled by law to produce data that belongs to their clients. While organizations may not be able to prevent this, roundtable participants believed there are steps that can be taken to ensure prompt notification from cloud providers, which may enable an affected organization to take prudent legal action. Participants recommended that contracts with cloud providers should include both standard confidentiality terms and provisions to address situations in which cloud providers may be unable to ensure confidentiality. Ensuring timely access to data stored in the cloud When matters do arise, organizations that are able to quickly collect their data will be in the best position to assess risk, determine case strategy, and meet production deadlines. The challenge may be in collecting the data. It might not be E-Discovery Roundtable 3

possible for an organization to send its own discovery team to collect data on site, since there can be conflicts with a cloud provider s obligations to protect the confidentiality of its other clients. Entrusting cloud providers to collect data on behalf of the organization can also raise the risk of the provider becoming involved in the matter as a third party. Remote access to data can be another challenge, due to bandwidth issues that can make it impractical to transfer large volumes of data (think terabytes) from the cloud. Roundtable participants recommended that contractual provisions should be established up front with cloud providers that will ensure a timely and adequate level of access for data collection. Negotiating contracts with cloud providers Because the cloud represents a relatively new and untested legal territory for contractual issues, roundtable participants reported that there is little real guidance available for how to structure cloud agreements to meet discovery obligations. As a first step, participants pointed out that knowing exactly where data will be stored is essential to understanding which legal or regulatory jurisdictions might apply. Unfortunately, provisions for data collection are not well established and there is little precedence for what will stand up during litigation. This means the negotiating process with a cloud provider can be lengthy. One law firm participant gave the example of a company that had recently adopted a hosted email system in which it took more than 90 days to negotiate terms that sufficiently addressed its discovery requirements. Participants recommended that when moving to the cloud, organizations should come to the negotiating table with a clear understanding of all the discovery requirements that a contract will need to address. IMPACT OF SOCIAL MEDIA Roundtable participants also discussed the implications of social media. Adoption of social media has increased dramatically over the past few years. Many of the participants believed organizations are not adequately addressing social media in their discovery readiness plans. Key gaps that participants highlighted were the lack of clear social media policies and enforcement practices as well as insufficient plans for preserving social media data in the event that a matter does arise. Preserving data from social media sites Participants felt that important questions about how data can be preserved from the growing variety of social media sites remain unanswered. Different social media sites may require different techniques for capturing data. In addition, the technology for preserving data from social media sites is still in its infancy. Some participants recommended that organizations should seek the advice of digital forensic experts to determine the best approach for specific sites. In this manner, an organization can show a reasonable effort at avoiding data spoliation in accordance with its discovery obligations. Establishing social media policies Participants strongly suggested that organizations put social media policies in place to minimize their risk, noting that relatively few organizations today have actually done so. Without such policies, employees may unknowingly put their employers as risk. Employers may also find themselves unable to address inappropriate behavior by its employees that use social media. Participants recommended a variety of provisions for social media policies, including: Allowable uses of social media by employees, noting important legal issues related to copyright, fair use, confidentiality, and proprietary information Specific behaviors that may result in the termination of employment Security and privacy considerations, such as recommendations for appropriate password protection Obligations for the retention, preservation and production of data, including clear explanation of employee responsibilities in the event of litigation hold notifications The general view was that social media policies with these provisions can reduce the risk of litigation and regulatory investigations occurring and can expedite the discovery process by ensuring everyone knows what to do when matters arise. Establishing social media policies, however, doesn t go far enough. Organizations must also ensure reasonable enforcement. There is some uncertainty about how to accomplish this, in part because monitoring technologies are generally inadequate. Participants recommend that an organization needs to at least distribute their social media policy to all employees and document acceptance of the policy by each employee. Some participants suggested that reasonable efforts at enforcement do not necessarily have to be perfect so long as good faith and enforcement consistency can be demonstrated. E-Discovery Roundtable 4

Impact of Technology Assisted Review The final topic discussed at the roundtable was technology assisted review, which is a recent innovation that holds promise for significant cost reductions through the automated coding of documents for review. Roundtable participants were in consensus that this technology has seen limited adoption to date due to a lack of critical acceptance and guidance for how it can best be used within a defensible process. Moving to acceptance Most participants believed that technology assisted review would become more widely accepted once it is proven accurate and complete in the eyes of the courts and attorneys for whom defensibility of the discovery process is of essential importance. One participant noted the example of conceptual review, which has been around even longer and was slow to gain general acceptance because of similar concerns about defensibility. Another participant suggested that the heightened attention on legal innovation and cost saving approaches could help to accelerate acceptance of technology assisted review. Understanding how the technology will be used Roundtable participants also addressed recent claims that technology assisted review would replace large numbers of lawyers. Participants felt this notion has been exaggerated and that the technology has great potential to complement lawyers with improvements in workflow automation and quality control, efficiency gains in first pass review, and tighter integration and streamlining of the discovery process. Some participants even suggested an opportunity for the technology to be used by an opposing counsel to quickly sift through productions to find the most important documents, particularly those that the producing party might consider hot docs. Citing similar technology hype and misinformation about early case assessment, some participants stressed that care must be taken when considering the adoption of technologyassisted review. The technology clearly has the potential to improve process efficiency, but it should not be viewed as a miracle cure for e discovery. Developing protocols and best practices for use Roundtable participants recommended that organizations considering technology assisted review should first focus on developing protocols and best practices that would ensure process defensibility. One corporate participant noted that the outcomes do not have to be perfect, but that courts do expect reasonable efforts at managing potential errors. Multiple participants gave the example of false negatives, in which responsive documents might erroneously be identified as nonresponsive. The same error can be made regardless of whether technology or humans are reviewing documents. The critical element for defensibility is the presence of a documented process that reasonably assures results are produced in a consistent and accurate manner. E-Discovery Roundtable 5

Final Thoughts As many organizations consider adoption of the latest technology innovations, they should also consider the inherent risks in using such technologies without also developing the necessary governing policies and contractual arrangements needed from a legal discovery perspective. Technology can help to improve the discovery process, but an over reliance on technology can actually weaken an organization s position even before litigation starts. Roundtable participants all agreed that the key to ensuring a defensible process is the careful selection of technologies that will complement and enhance an organization s ability to meet its discovery obligations. About Integreon Integreon is the largest and highest impact provider of integrated legal, research and business support solutions to corporations and law firms. It is a trusted partner to 9 of the top 10 global law firms, the top 10 investment banks, and 17 of the top 50 global brands, enabling these organizations to improve profitability and freeing their leaders to focus on business growth. With 2,000 associates operating from 17 offices across North America, Europe, Asia and Africa, Integreon works collaboratively with its clients to address their specific support needs, including legal process outsourcing and e discovery/disclosure, market and competitive intelligence, due diligence and other business services. For more information about Integreon s full range of solutions, please visit www.integreon.com. E-Discovery Roundtable 6

For more information contact: marketing@integreon.com www.integreon.com Copyright 2013 by Integreon No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means electronic, mechanical, photocopying, recording, or otherwise without the permission of Integreon. COMPANY CONFIDENTIAL