Traversing the triangle
-
Upload
david-kearney -
Category
Technology
-
view
165 -
download
1
Transcript of Traversing the triangle
![Page 1: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/1.jpg)
Traversing ‘The Triangle’: Best Practices for Managing and Improving Law Firm-Client-Service Provider Relationships
Speakers: Lael Andara, Ropers MajeskiDavid Kearney, Cohen & GrigsbyEric Robinson, Kroll Ontrack
![Page 2: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/2.jpg)
2
ACEDS Membership Benefits
Training, Resources and Networking for the E-Discovery Community
Join Today! aceds.org/join or Call ACEDS Member Services 786-517-2701
Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking
Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More!
“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
![Page 3: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/3.jpg)
3
Topics We Cover Computer Assisted Review
International E-Discovery
Social Media
Cloud-Based Discovery
E-Discovery Malpractice
Workplace Privacy
State E-Discovery Rules
And Many More!
ACEDS Web Seminars Provide Vital Training
aceds.org/join
![Page 4: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/4.jpg)
Speakers
David Kearney, CEDS |Director of Technology Services | Cohen & Grigsby |Pittsburgh
Lael Andara |Litigation Partner |Ropers Majeski Kohn Bentley |Redwood City, CA
Eric RobinsonSolutions Architect Kroll OntrackRichmond, VA
![Page 5: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/5.jpg)
‘The Triangle’
Client
CounselService
Provider
![Page 6: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/6.jpg)
Why Should I Care?
• Unverified Qualcomm v. Broadcom
• Too many cooks Coquina Investments v. Rothstein and TD Bank
• Malpractice J-M Manufacturing Company, Inc. v. McDermott Will & Emery
• Finger pointing
• Duplicative production/efforts
• Inelastic
![Page 7: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/7.jpg)
War Stories
![Page 8: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/8.jpg)
Context of the Relationship
• “Just, speedy, and inexpensive determination”
• “Reasonable”
• “Proportional”
• “Cooperation”
• “eCompetence”
End Goal: Trial Exhibits
![Page 9: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/9.jpg)
Foundation to process
• Educate What does the client have?
• Educate What does the adversary have? • Educate What do third parties have?
• Collaborate Limit the scope by stipulation
![Page 10: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/10.jpg)
Three Goals: One Objective• Reduce cost
– Data map– Preservation– Collection – Processing
• Data privacy – Security – EU compliance
• Increase efficiency – Cooperate in ESI conferences– Production – Understand exposure early– Early resolution
![Page 11: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/11.jpg)
Discovery Goals
Evidence
Defensible Admissible Authenticate
Reduce cost
Data privacy Increase efficiency
![Page 12: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/12.jpg)
Discovery Timeline• Step one – Preservation notice to custodians and IT &
litigation hold to adversary
• Step two – Introduce Vendor and Client to facilitate trust and create shared objectives. Privacy in production in Production.
• Step three – Inventory and snapshot all data in possession or control of
client. This includes employee personal devices.
Data Hold
![Page 13: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/13.jpg)
Discovery Timeline• Step four– Preparation for preparation for meet & confer and
cooperate with opposing counsel on discovery protocol and plan Stipulation*
• Step five– Have vendor begin collection and process data.
Culling, keyword, etc.
• Step six– Review documents filtered as privileged. Issue
tagging and mark for production
![Page 14: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/14.jpg)
Building process
Time
Volume
Proportional
Services
Price
Budget
![Page 15: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/15.jpg)
Big Picture• Key
Requirements in the Contract
• Communication Infrastructure
![Page 16: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/16.jpg)
Time LibraryCost Data Preservation LibraryCost Data Preservation
Close of Discovery: June 4, 2013
DAYS68
© Lael Andara
Johnson & Johnson v. Shasta Tech., LLC, et al
Close of Discovery: June 4, 2013
DAYS68
5/12/1330(b)(6) Depo
5/10/13Preservation Update
5/22/13CMC
5/2/13Responses to RFPD
![Page 17: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/17.jpg)
LibraryTime Data PreservationCost
Budget
Jan. Feb.
MarchApril
MayJune
Cost
Hosting: $2,657/month Production Database
ARPAID
Last Update: 3/29/13
Johnson & Johnson v. Shasta Tech., LLC, et al
![Page 18: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/18.jpg)
Time PreservationCost Data Library
Johnson & Johnson v. Shasta Tech., LLC, et al
Collected8/2/12 12/3/12 3/17/13 Total Data
150 GB 12 GB 20 GB 182 GB
ProcessingProduction
Shasta Tech., SHASTA_0032089
Conductive Tech., CT_0052893
Pharmatech Inc., PHARM0005271
LifeScan, Inc., LSS00311833
Total Files 402,086
62%
6%
Database:
Last Update: 3/29/13
![Page 19: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/19.jpg)
Clarity of Expectations
![Page 20: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/20.jpg)
Managing and Monitoring Relationships
In the Bermuda Triangle of E-Discovery
![Page 21: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/21.jpg)
Counsel
Client
Service Provider
Transparent Process
![Page 22: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/22.jpg)
CounselService Provider
Client
Exclusion Process
![Page 23: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/23.jpg)
CounselVendor
Client
Attorney-Client Privilege
Communication Not Privileged
![Page 24: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/24.jpg)
Sample Language for Extending Privilege
• All work performed by Kroll Ontrack on this project will be conducted at the direction of and under the supervision of {Law Firm} in their capacity as counsel to {End-Client} on the {Name of Matter} and as such, all communications and documents exchanged between Kroll Ontrack, {Law Firm} and {End-Client} shall be protected by the attorney-client privilege and work product doctrine.
![Page 25: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/25.jpg)
Communication Infrastructure
Counsel
Client
Service Provider
![Page 26: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/26.jpg)
Relationship Protocol
Counsel
Client
Service Provider
![Page 27: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/27.jpg)
Cost Effective CommunicationCost Effective Communication
Client
Service Provider
Counsel
![Page 28: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/28.jpg)
CounselVendor
Client
Verification of Data
Quality Assurance Process
![Page 29: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/29.jpg)
Keys to Success!
Trust, but Verify
Define Accountability
Competence & Redundancy
Group buy-in
Active Communication of Process
Evolve with the Data
![Page 30: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/30.jpg)
Questions?
![Page 31: Traversing the triangle](https://reader035.fdocuments.net/reader035/viewer/2022062418/555b5112d8b42af36d8b5414/html5/thumbnails/31.jpg)
Thank You
Lael Andara | Partner | Ropers Majeski Kohn [email protected]
Eric Robinson | Solutions Architect | Kroll [email protected]
David Kearney | Director of Technology Services | Cohen & [email protected]
Traversing ‘The Triangle’