ACEDS-Stroock 9-4-14 Webcast Presentation

16
Just the Basics: An E- Discovery Primer for Paralegals and Litigation Support September 3, 2014 Royce F. Cohen Michael Quartararo Stroock & Stroock & Lavan LLP

description

ACEDS-Stroock 9-4-14 Webcast Presentation

Transcript of ACEDS-Stroock 9-4-14 Webcast Presentation

Page 1: ACEDS-Stroock 9-4-14 Webcast Presentation

Just the Basics: An E-Discovery Primer for Paralegals and

Litigation Support

September 3, 2014

Royce F. Cohen

Michael QuartararoStroock & Stroock & Lavan LLP

Page 2: ACEDS-Stroock 9-4-14 Webcast Presentation

ACEDS Membership Benefits Training, Resources and Networking for the

E-Discovery Community

Join Today! aceds.org/join

Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking

Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More!

“ACEDS provides an excellent, much needed forum to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale

Page 3: ACEDS-Stroock 9-4-14 Webcast Presentation

ENTER‘STROOCK20’

Send questions and comments to Robert Hilson at [email protected]

Page 4: ACEDS-Stroock 9-4-14 Webcast Presentation

Presenters

Royce F. [email protected]

As Special Counsel at Stroock & Stroock & Lavan LLP, based in New York, Royce is a founding member and co-chair of Stroock’s eDiscovery and Information Governance Practice Group. She is also a member of the Sedona Conference, Working Group 1. Royce has extensive experience representing both insurers and reinsurers in complex insurance and reinsurance matters. She has led some of the firm’s largest electronic discovery projects, from the collection of ESI, through processing, review and production. She frequently speaks and moderates panel discussions and CLE presentations on topics related to electronic discovery and her reinsurance practice.

Michael [email protected]

As Director of Litigation Support Services at Stroock & Stroock & Lavan LLP, Mike is responsible for the development and implementation of Firm policy relating to electronic discovery and the development of ediscovery best practices, project-oriented protocols, and the design and delivery of training programs. As a member the Firm’s eDiscovery and Information Governance Practice Group, Mike regularly consults with attorneys and clients on electronic discovery issues. Mike is a certified Project Management Professional, a Certified E-Discovery Specialist, and a member of the ACEDS Advisory Board. He is also a part-time graduate instructor of ediscovery and project management and an advisory board member at Bryan University.

Page 5: ACEDS-Stroock 9-4-14 Webcast Presentation

Presentation Overview

• The Electronic Discovery Reference Model (EDRM)• Information Governance• Identification• Preservation• Collection• Processing• Review and Analysis• Production• Presentation

Page 6: ACEDS-Stroock 9-4-14 Webcast Presentation

First, the Facts

Hypothetical Scenario: • Party A and Party B enter into a contract incepting 1/1/09• Pursuant to the Contract, payments are made by Party B quarterly• Party B has not made a payment since 1/1/13• Party A files a complaint on 4/1/14 alleging that Party B breached the contract

among other allegations• You represent Party B• Party B has two offices – one in San Francisco and the other in Denver. • Each office has their own file server on which local user files are created and stored

related to that office. There is one email server for the entire company in San Francisco. All employees use Windows-based PCs in the office, except salespeople, who also utilize laptops while traveling. Senior and middle management have Blackberry and smartphone mobile devices, and all email on those devices passes through the email server. Text and phone messages are not captured or retained. Backup tapes exist for the previous 12 months only.

Page 7: ACEDS-Stroock 9-4-14 Webcast Presentation

The EDRM

Page 8: ACEDS-Stroock 9-4-14 Webcast Presentation

Information GovernanceInformation Governance (IG) pertains to a client organization’s internal policies and practices related to records and information management, including how they create, store, secure and manage ESI and paper documents.

• IG is a client Responsibility• IG maximizes the value of information and minimizes risk• IG saves time and reduces cost• It’s not just records management• And it’s not just policies

Is your client prepared for litigation?

Page 9: ACEDS-Stroock 9-4-14 Webcast Presentation

Identification

Identification is the process of identifying reasonably accessible sources of ESI and documents that may be relevant to litigation.• Confer with client and client IT personnel• Determining the scope of the project• Learn about the client systems (interviews, data map, questionnaire)• Identify people who may possess relevant information (Custodians)• Identify the relevant date range• Most common sources of ESI

– Email servers– File Servers– PCs and laptops

• Estimate the volume of potentially relevant ESI

Page 10: ACEDS-Stroock 9-4-14 Webcast Presentation

Preservation

Preservation is the process of ensuring that ESI is protected against alteration, deletion or destruction.• The preservation process involves two steps:

1. Implement a litigation hold within the client organization

2. Sequester the ESI (either through collection or otherwise)

• The obligation to preserve ESI stems from the common law• The obligation is the clients and counsel• Document the process

Page 11: ACEDS-Stroock 9-4-14 Webcast Presentation

Collection

Collection is the process of physically and defensibly gathering ESI and documents from identified sources within a client organization.• Factors to consider:

– Sources of ESI– Accessibility of data– Number of custodians– Size/volume of collection

• Collection tools and procedures• Acquisition report• Chain of custody documentation

Page 12: ACEDS-Stroock 9-4-14 Webcast Presentation

Processing

Processing: involves the use of software to convert ESI to forms more suitable for review and analysis.

• Two goals in processing:– Reduce volume of ESI– Unify ESI for systematic review

• Extract and index metadata and text• De-NISTing, De-duplication and Search• Reporting and exceptions• Deliverable: Tiff images, native files, metadata and text

Page 13: ACEDS-Stroock 9-4-14 Webcast Presentation

Review and Analysis

Document review and analysis is the process of reviewing and evaluating ESI and documents for content and context and then coding for responsiveness and privilege in preparation for production to other parties.• Goals• Define scope• Responsiveness Coding & Issue Coding• Confidentiality• General Rules• Use of Analytics/Predictive Coding• Quality Control

Page 14: ACEDS-Stroock 9-4-14 Webcast Presentation

Production

• Production is the process of preparing and delivering ESI and documents to other parties in appropriate forms and using appropriate delivery mechanisms.

• Identify documents to produce• Prepare a written production specification• Form of production• Quality control

Page 15: ACEDS-Stroock 9-4-14 Webcast Presentation

Presentation

• Presentation involves displaying ESI before people and audiences (at depositions, hearings, trials, etc.), to elicit further information, validate existing facts or positions, or persuade an audience.

• From one Million to one Hundred• Exhibit preparation• Using technology to present evidence

Page 16: ACEDS-Stroock 9-4-14 Webcast Presentation

Questions