eDiscovery Explained - The Ultimate Guide
This guide explains the eDiscovery process in a simple to understand format.
What is eDiscovery?
First, we need to understand what the term discovery means, in relation to the subject.
Discovery is the term used for the initial phase of a lawsuit, where both parties discover and provide each other with relevant information.
eDiscovery, also known as e-discovery and electronic discovery can be best described as the multi-stage process that involves collecting electronically stored information, securing it, and making the data searchable for review. This information will be used as evidence in a lawsuit.
This guide focuses on eDiscovery for civil lawsuits, not criminal lawsuits.
The process starts from the time a lawsuit is reasonably foreseeable, all the way through to when the digital evidence is presented in a trial.
Here is a quick high-level overview of the e-discovery process.
Identification
Determining what data is required, who the custodians are (who has control over it) and where the data located.
Preservation
Ensuring the identified data is not deleted or modified.
Collection
Copying the data into a secure repository.
Processing, Review & Analysis
Reducing the collected data set down to relevant information.
Production
Producing the information to the other party.
Presentation
Presenting the information during trial.
Here’s some examples of data that could be identified as containing relevant information: Emails, Social Media Content, Text Messages, Voicemail, Instant Messages (Skype, Viber, WhatsApp etc.), Documents, Spreadsheets, Calendar Files etc. All data from these devices is known as ESI (electronically stored information).
ESI can be collected from numerous devices, such as phones, tablets, laptops, desktops and any other source that stores electronic data, including, but not limited to networked drives and online sources such as websites, apps and databases in the cloud.
Many electronic files also have associated data called “metadata”. For example, an image file may have metadata that includes when the picture was taken, where the picture was taken, the camera model, etc. Document metadata may include properties such as when the document was created, last modified, the author’s name, the time spent editing etc.
All this ESI can add up to a lot of data, it even has a term – “Big Data”. Big data results in increased costs (more discovery data to analyze), and an increased risk of spoilage (improper handling of ESI).
eDiscovery Stages
As mentioned, the electronic discovery process consists of multiple stages. In 2005, a model was developed as a framework that outlines the stages. It’s called the Electronic Discovery Reference Model (EDRM).
Electric Discovery Reference Model
The EDRM diagram represents a conceptual standard for the e-discovery process. Meaning that it does
not have to be followed literally. It’s intended for discussion and analysis, rather than a definitive
approach.
Information Governance
Information governance (IG) serves to support processes that an organization uses to maximize the value of its electronic information, while minimizing costs and risks associated with keeping that electronic information. It’s not really a step or stage in the eDiscovery process, it’s more about managing “big data” so that relevant data can be accessed quickly when needed.
Many organizations are yet to put IG into practice. That said, it is now becoming a conversation that many companies are starting to have.
You can find out more about IG here.
Collection Strategy
Before moving through the Identification, Preservation and Collection stages, it’s beneficial to build a strategy.
How do we identify what to collect?
How do we preserve the data?
How are we going to collect it?
The best approach is to develop an e-discovery collection strategy and plan which should be unique to each matter. For example, in some cases it may be important to collect data immediately. In other cases, early collection may not be necessary (the data is already preserved).
The strategy is then used to select a collection method and execute the collection plan.
What does the e-discovery collection strategy involve?
The collection strategy can vary depending on the matter. For example:
Things to consider usually include:
- Identifying the number of custodians to collect the data from. Whose data should ultimately be reviewed?
- Identifying relevant data. What’s important and what’s not?
- How will the data be preserved (prevent data spoliation)? For example, prevent the metadata changing.
- Why is the data is being collected from certain sources? It is important to consider why and how the data is being collected. Why choose one collection method over another?
- Data sources will be discussed in more depth in the next section.
- How accessible is the data (what are the data sources, and where are they located)?
- Are any special tools needed to collect the data?
- Is there any sensitive or encrypted data that warrants special measures?
- Who will be involved in the collection process (cross-functional team – legal, IT, experts)?
- Are there internal resources to help with the data collection?
- What is required to collect the data legally (litigation hold notice)?
- Which collection methods will be adopted?
- Planning for a Meet-and-Confer. Here the opposing parties meet and confer at least 21 days before the scheduling conference with the court in order to work out agreements on the preservation of ESI, the forms of ESI production, the methods that will be employed to filter out irrelevant information, and the protection for privileged information. The meet and confer will make eDiscovery more efficient, help reduce discovery disputes, and most importantly, get parties to the litigation’s most relevant information faster.
-
Draft an ESI Protocol. Shortly after the Meet-and-Confer, it is good practice to draft the ESI Protocol. This document is often entered by the judge as a formal order and controls the conduct of electronic discovery in the case.
The ESI protocol will contain the following information:- the scope of the ESI collection efforts
- the format in which electronic documents will ultimately be produced
- the handling of privileged information
This is all described in greater detail below.
Identifying What to Collect
Electronic discovery begins with identifying what to data to collect for review.
What electronically stored information (ESI) may be relevant to the case?
Who are the custodians?
Identification begins as soon as a lawsuit is reasonably foreseeable.
During this stage, interviews with key players and IT staff are conducted to establish what ESI may be relevant, where the relevant discoverable data is located, how the data can be collected, any special tools required, etc.
It’s necessary to learn where potentially discoverable data resides to issue an effective legal hold.
Preservation
Once relevant electronically stored information (ESI) has been identified, it’s extremely important to ensure that the data is preserved, kept intact – not modified, corrupted or lost, the legal community refers to this as “spoliation”.
It’s important that data preservation is conducted properly, to avoid spoliation of metadata and/or files.
A legal hold is usually used to preserve ESI. A legal hold is a formal notice sent from the legal team, stating that a lawsuit is anticipated and the recipient (custodian) must preserve all ESI that may be relevant to the matter.
But it’s not only about ensuring ESI relevant to the matter is protected from spoliation, it’s also about trying to preserve only the necessary data. Preserving unnecessary data causes inefficiencies and increases costs and risk.
eDiscovery Collections
After electronically stored information (ESI) had been identified and preserved, it must ultimately be collected and stored in a secure repository for review.
The collection stage is often the most complex stage of eDiscovery, requiring professionals from both IT and legal to collaborate and ensure the extraction process is properly executed.
Relevant ESI may be stored across many different types of data sources, each one requiring different collection methodologies to ensure the data is collected properly.
Here’s a list of some common data sources that ESI may need to be collected from for electronic discovery.
Data Sources
1. Archive Data
2. Cloud Data
3. Mobile Data
4. Offline Data
5. Backups
6. Hidden Data
Once the data sources have been established, we are able to find out how much data is involved, how accessible the data sources are, and what specialized recovery processes and tools are required.
This knowledge then helps decide which data collection methodologies are best suited.
Typical Collection Methods
IT Assisted Collection
This is when the IT resources collect ESI under the supervision of the legal department. The IT staff are usually the most appropriate because they understand the scope of the company’s data and IT systems. This is the most common way to collect ESI.
Employee Self Collection
This is when custodians can copy relevant data to a specific location themselves (copy to portable hard drive). This can be risky and is not typically advised. It may result in errors, missed ESI and spoliation.
However, it may be viable for smaller cases with small amounts of traditional ESI such as emails and documents.
Remote Collection
There are different ways to perform remote collection. One way is to send the custodian or IT department a pre-encrypted hard drive that is connected to the computer or network. The collection expert is then given access to internal systems by remote access (TeamViewer, WebEx).
Another way is for the custodian or IT department to receive a pre-encrypted hard drive kit and initiate a process that mirrors device data onto the kit. The kit is then sent back to the collection expert for forensic analysis.
A third way employs the use of internal systems that are specifically designed for remote collections. This technology is relatively new, but will no doubt become more popular due to the efficiency and cost savings. These systems can include built in search and analysis tools resulting in more targeted ESI.
Collection Service (outside service provider is engaged)
A third-party collection service is used to perform the collection of ESI. These experts are likely to know the latest best practices, have all the specialized tools and follow set processes. Although it may come with increased cost, it may be worth it for organizations with little eDiscovery experience.
Processing, Review and Analysis
After collection, it’s time to process, review and analyze the information.
The processing part aims to reduce the dataset by removing irrelevant data.
The review stage involves reviewing and analyzing the ESI to determine which ESI is relevant to the case. A review team is selected based on the variables of the individual case, such as the amount of data, the deadline, and the budget.
Law firms or review service providers are usually engaged to handle the review and are typically paid by the hour. It’s the most expensive stage of the e-discovery process, accounting for about 75% of the total e-discovery cost.
A deep understanding of the case is necessary for an effective review, the reviewers need to know what to search and look for.
The review stage is obviously extremely important, it’s when the law firm gain a greater understanding about the case, helping them to develop a legal strategy.
During the review process, documents are coded or tagged to categorize them. Each review team has their own system, but it’s critical that everyone knows the system. For example, documents may be tagged as privileged (attorney-client privilege), irrelevant, relevant, further review needed etc. The documents are also numbered, which helps identify them later.
It’s also common practice to have some quality control measures in place to help ensure reviewers are tagging correctly.
Production
The review process results in a final set of documents that have been determined to be relevant to the case. Production means to “produce” the final set of documents to the opposing party.
Before the documents are exported both parties will agree on a production format. Formats can include native, near-native, image (TIFF and PDF) and paper.
A document in its native format will usually include associated metadata. Near-native may include some metadata, but image and paper will not include any metadata. However, additional files are created containing the metadata and other document information
A “load file” is often produced and included. A load file helps load and organize all the information within eDiscovery software so that the information can be searched and viewed. It also links documents to their metadata.
In the past, production involved large sending boxes of paper documents to the opposing party.
Presentation
The final stage of the eDiscovery process. This is when the ESI is presented as evidence during trial. The legal team will develop a presentation strategy to show the information at trial.
Conclusion
Develop a strategy and plan for each legal discovery request. It is going to help reduce risks and costs.
Can your organization respond to a legal discovery request quickly? To avoid fines and legal sanctions, organizations need to be able to find relevant ESI quickly and easily.
Leveraging the EDRM framework will help you prepare and meet the deadlines of legal requests. Utilizing eDiscovery solutions will help you to be proactive and ready to respond efficiently, saving you time and money.
Not sure how to handle a project?
We’ll be happy to discuss your options and offer recommendations. QUiVX offers consulting and training at no additional cost on various database management tools to streamline the review process.
Get started