Tuesday, October 22, 2013

Data Locations, Format and Review


*Image Extracted from Google
 

Say what?

When it comes to accessing the electronic data you need from the opposing party in a civil suit it’s important to know what to do! I have linked the Fed.R.Civ.P. title of this blog to the Standing Order of the Honorable Frank D. Whitney. It is the basis on which Texas has built its guidelines for accessing electronically stored information for civil suits. I have also incorporated more of my notes from the Technology Summit 2013 at the Belo Mansion in Dallas, Texas in hopes it gives you good ideas on "What to Do When" trying to paddle your way through the deep end that is electronic discovery.
 
 
From my notes at the conference... Good suggestions to consider...
 
Let the custodian of the data tell you where it is located. You want to break up your search for data by custodian and date. Know who the key players were in regards to the information you are requesting and when you believe it happened.

Know if parts of the data you need are located on a home/personal computer. (We will get into work product shortly)

I have a stared point from the conference and it’s a list of things we as data locators need to do:

Be a frenamy!

Be prepared!

Is it in compliance with T.R.C.P. Electronic Discovery or Fed.R.Civ.P. 26?

T.R.C.P.

The conditions imposed by the Court for obtaining access to another party’s hard drive were taken directly from the Federal Rules of Civil Procedure and federal caselaw addressing electronic discovery.

            The Court stated that even if the requesting party makes this showing, courts should not permit the requesting party itself to access the opponent’s hard drive, but rather, should grant access only to a qualified expert. But the Court admonished that, as under the Federal Rules, courts are “generally discouraged” from ordering forensic examinations of another party’s hard drives because such examinations are “particularly invasive.”

            Further incorporating the Federal Rules on this issue, the Court stated that, before serving requests for electronic information, parties and their attorneys should discuss potential issues related to electronic discovery, similar to the conference requirement under Federal Rule of Civil Procedure 26(f)(3).

            The Court also summarized the procedure for obtaining electronic discovery under the Texas Rules of Civil Procedure:

1. The party seeking electronic discovery must make a specific request for that information (e.g., specifically request deleted emails and not just emails or documents);

2. The responding party must then produce any responsive electronic information that is reasonably available in the ordinary course of business;

3. If the responding party cannot retrieve responsive electronic information through reasonable efforts, the responding party must object on those grounds;

4. The parties should make reasonable efforts to resolve the dispute without court intervention;

5. If the parties are unable to resolve the dispute, and court intervention is sought by either party, the responding party must demonstrate that the requested electronic information is not reasonably available because of undue burden or cost;

6. Even if the responding party proves that the electronic information is not reasonably available, the requesting party may still obtain the information by showing that the benefits of production outweigh the burden imposed on the responding party;

7. If the requesting party meets its burden of showing that the benefits outweigh the burden on the responding party, the court may order production, but must protect sensitive information and employ the least intrusive means;

8. The requesting party must pay the reasonable expenses of any extraordinary steps required to retrieve and produce electronic information; and

9. Courts should not grant the requesting party direct access to the responding party’s electronic storage devices and should be extremely cautious to avoid undue intrusion.[1]

When collecting data good things to agree to according to the conference:

            1) Exclusion

            2) Limitations

            3) Format


IM’s and Voicemails are data you will want to avoid collecting

It was stated, at the conference, that a document is copied on average 19 times! With the mounds of data you have to comb through it seems ridiculous so, limit what you need to 1 copy.

We still search for documents with "search terms" but what is changing our old ways fast is Technology Assisted Review (Again, we will touch on this topic down the road) It’s a great idea to ask your vendor how they perform searches in the databases you are asking them to look in.

My notes say that 73% of the money a client spends is in data review so, reign in the review!

I have this stared in my notes as well and it’s a good one.   

            *Never agree to search terms!

The theme throughout my notes has been PLAN! PLAN! PLAN!

I think we will leave it at this and next post will be about Calling the Plays…

 

 

Tuesday, October 15, 2013

Big Data Dos and Don'ts


*Image extracted from Gooogle


Data Diving and the Dos and Don’ts

What is it? There was much discussion on this topic at this year’s Technology Summit 2013 at The Belo Mansion in Dallas held by Texas Lawyers. In a review of my notes from the seminar, I realized it didn’t quite explain what it is so I turned to Google and I came up with an article from my former employers CSC or Computer Sciences Corporation.  It is a few years old which had me a bit concerned but when I read it I knew I had to share it with you. Also… Make sure to check out my Do’s and Don’ts for Big Data at the bottom of the article and the last sentence is the most important one of this whole post… Enjoy and remember…

 


by Chris Sapardanis

Two years ago there were probably as many definitions of cloud computing floating around as there were reality shows on cable TV. Everyone knew it was the latest evolution of technology, but few had a clear understanding of how it worked or how important it could become for their business. Well, times have changed.

Cloud is maturing rapidly. At the IDC Directions 2011 conference in San Jose, Calif., Senior Vice President and Chief Analyst Frank Gens offered that 80 percent of new enterprise apps developed in 2011 will be distributed via the cloud, and by 2014, 30 percent of enterprise application spending will be on the cloud. But just as the market gets hot on cloud, the IT services industry is already abuzz about the next “big” thing: Big Data.

Today’s burgeoning Big Data movement is fueled by the social media revolution, billions of Internet users, and the increasing connectedness of our digital world. And just as hard to come by as definitions were in the early days of cloud, is nailing down exact figures on the amount of data being generated in the world and where it’s headed.

Gens says there will be 1.8 zettabytes (one zettabyte being one billion terabytes) of data stored in 2011, up 47 percent year-over-year, and that will grow to seven zettabytes in 2014. Another estimate by IDC and EMC predicts that by 2020 the “Digital Universe” will be 44 times bigger than it was in 20091.

But beyond the numbers, what exactly is Big Data, where’s it coming from, and why should anyone care? Organizations like CSC’s Leading Edge Forum (LEF) are working to answer these questions.

Exploring an emerging market

Our LEF provides CSC employees and clients with access to a powerful knowledge base and global network of innovative thought leaders. LEF members work to spot key emerging business and technology trends, and identify specific practices for exploiting those trends for business advantage.

“When innovations are emerging in the market, we too need some time to understand what’s being said, and what it means to our business and customers,” says Paul Gustafson, LEF director of Technology Programs. “Two years ago with cloud, everyone was doing it, no one was doing it, and it took us four volumes of research to sufficiently unpack and repack what we believed the cloud world was all about.”

It’s happening again with Big Data, but the term itself isn’t new.

People have been talking about Big Data for a while. Organizations such as NASA, NOAA (the National Oceanic and Atmospheric Administration), financial services companies, and healthcare entities have been grappling with the “data deluge” for years. Many times, they’ve looked to CSC for solutions. For example, one of CSC’s Chairman’s Award projects developed one of the world’s largest healthcare data warehouses that certainly could carry the label of “Big Data.”

However, this new data isn’t referred to as “big” just because of size. “It’s diversity of data; it’s complexity of data; it’s new ways to organize and manage the data; and it’s the new connections inherent in data,” Gustafson explains. “Some of that may be big, but it doesn’t all mean big.”

The emerging market of Big Data is about organizations tuning into new data arrangements that are more connected with their own propositions in an effort to discover new insights. This topic has inspired the LEF’s latest research and a report due later this year called “Data rEvolution.”

The report says no industry is exempt from the challenges or opportunities of the Data rEvolution. Even the U.S. government has called for all its agencies to have a “Big Data” strategy2.

The LEF’s research reveals progress across many fields as organizations seek to derive meaning from data. The report says data is increasingly driving our actions, whether for discovering more about the world around us, making financial decisions, or understanding customer behavior for better target marketing.

Dos and Don’ts of Big Data

Do

Do have a knowledge map

Do know the people in charge

Do go to the people who created the data

Do go to the custodians of the data

Do dress the same as the person you are interviewing

Don’t

DON’T go to IT

DON’T SEND AN ATTORNEY! People get nervous when they have to talk to an attorney! *Send your Paralegal… someone like me! 

 

                                                         

 

 

 

Monday, October 7, 2013

Technology Summit 2013 Notes







Technology Summit 2013 Notes
 
 
I had the pleasure of attending the Texas Lawyers Technology Summit 2013. There will be multiple posts on “What to Do in eDiscovery” from this summit so, as Thomas Jefferson said… “When you reach the end of your rope, tie a knot in it and hang on!” Here we go…
Find the “One”
-          Find the one vendor for everything.
-          If you have more than one vendor it causes finger pointing.
-          You avoid loss of data while transferring from one vendor to another.
-          Your one vendor will know the IT Department, systems you are working with and will intimately get to know your company
*Chain of Custody comes into play here
*Having hard documents
*Have a viable scrubbing policy for your company. It was stated that ½ of all documents are kept after retention policy.
 
Speak Up
-          A good vendor = Communication. Vendors are not mind readers. They need to know the dates by which you have to have the requested information delivered.
-          Know your company’s vendor policy and procedure.
Some important questions to ask your vendor
               How does your vendor want to receive data?
                How much advance notice does your vendor need to produce your request?
                                What format?
                What is cost effective?
                                PDF v. TIF
                *Use your vendor as a resource!
In Communication with vendor
                Clarify what you want always.
                *Unitization of documents is hardest part of all in regards to eDiscovery.
 
Make sure your vendor has a primary contact. A “go-to” person who can answer questions, resolve conflicts and adhere to the company’s policy, procedure and protocol. And make sure your “go-to” person knows how to influence results without using authority. 


 
Tip
 
Document management is constantly changing. Just like the updates to your smart phone, what worked yesterday may not work today and it is vital to have a plan that has human error built in.