The Festivus Airing of Grievances: eDiscovery ALSP edition

“I’ve got a lot of problems with you people and now, you’re gonna hear about it!”

So said Frank Constanza in an episode of the NBC sitcom, Seinfeld. Over the last couple decades since this famous episode, wherein Frank revives the holiday he invented called “Festivus,” we can’t help but think maybe Frank was onto something.

Sure, the Festivus “airing of grievances” isn’t quite as cheerful as hanging up stockings or drinking eggnog, but sometimes it needs to be done. This is particularly true in the field of eDiscovery and Alternative Legal Service Providers (ALSPs).

Over the last decade, eDiscovery has been through a period of rapid growth. As more and more savvy entrepreneurs see the profit potential of the industry, the more we see clients that have been burned by other service providers who cared more about their bottom line than their clients.

We have a bone to pick with those companies. There’s absolutely no reason why making money has to come at the cost of the clients, and we don’t want attorneys thinking they should just accept it.

Grievance #1: Not billing based on actual time.

Some service providers bill based on how much they anticipate a job should take rather than long a job actually took. You might even think “gee, that’s nice! I don’t have to pay extra when my vendor takes more time than a task should take.”

The flip side of this is that if your service provider estimates a job should take 3 hours but it only takes 30 minutes, they’re pocketing the rest. The client is quite literally paying for hours of labor that never actually happened. Therein lies our grievance. If the party that’s in charge of deciding how long a job “should” take also stands to profit from overestimating, that’s not exactly a system of checks and balances.

Another issue here is the increments of time vendors use. Some won’t break down their billables into anything smaller than an hour, meaning that tasks taking 31 minutes are sometimes billed as a full hour. Do that enough times over a large complex matter, and it adds up to a huge sum of money that once again, is for work that never really happened. For this reason, Contact bills in 15-minute increments to ensure the time our clients pay for lines up with the time the job actually took.

Do the work. Be honest with your clients about how long that work took and bill accordingly. Is that so hard?

Grievance #2: Overcollection

Collecting all the data under the sun is a great way for vendors to pad their check. So much so that they sometimes go ahead and do this even when there’s a miniscule chance that all the extra data will help their client’s case.

In eDiscovery, the amount of data that makes it through each stage of the EDRM affects how much money the client spends on the next step. If your vendor collects a lot of data, then your vendor can charge more for hosting and processing; if the vendor doesn’t narrow down THAT population of data, you continue to spend even more on review. Because collection is one of the earlier steps in the process, there’s huge profit potential for unscrupulous vendors who collect unnecessary data and move it further downstream even when the client will likely never see any ROI.  

For example, does it really make sense to collect a custodian’s iPhone AND their iPad when the devices likely hold similar information that can also be collected remotely from an iCloud backup? Some vendors might know darn well that the majority of what they collect will be redundant, yet they’ll still charge a client to do the collection and bill them for the hours it took to dedupe everything.

Like any other aspect of a legal case, the collection approach is going to vary. Sometimes it does just make sense to collect a lot of data; however, a good vendor with a strong forensics department will weigh the costs and potential rewards of collecting different sources and build a cost-effective strategy. They may even be able to steer you towards data sources you didn’t think of collecting that are more likely to hold relevant information you’re looking for, allowing you to reduce the total amount of data you collect.

Grievance #3: Collecting/elevating bulky files for no real reason

Oftentimes, service providers charge their clients on a per-GB basis. Naturally, some file formats are going to take more GB than others. Photos take more data than text files; audio files take more data than photos; video files take more than audio; there are also many other industry-specific file formats that fall outside the realm of pdfs and jpegs.

As mentioned above, every case is different and sometimes bulky files (i.e. expensive to host and process) just come with the territory. However, bulky files also provide a convenient way for money-grubbing ALSPs to charge clients more without providing more value.

Sometimes those files hold irrelevant information that could be eliminated from the data population. Other times, the same information can be converted to smaller file sizes that would save the client money, but the service provider chooses not to because they care more about a short-term profit than building a long-term relationship with their client.

Grievance #4: Not caring enough about their cases’ outcomes

Attorneys need to create positive outcomes for their clients. Sure, no attorney can feasibly deliver the outcomes that clients want 100% of the time, but they need a high-enough success rate to build and maintain a good reputation and keep their business alive.

This isn’t necessarily true for eDiscovery vendors. For many ALSPs, the outcomes of cases don’t affect the bottom line as much as you might think they would. Assuming a company handles data in a timely manner without any spoliation issues, they can still make a pretty good buck and keep their reputation alive, even with a “losing record” in terms of those actual cases. Too many service providers are content to keep chugging along with this profitable, but lazy model.

Some are content to only return documents that match up with the specified keywords, even if there are others that might help win the case. ALSPs can play defense too. If they turn up documents that undermine their attorney’s current strategy, they can warn the attorney about that vulnerability while there’s still enough time to adapt. The best ALSPs can even help future matters run more smoothly.

 OR they could do none of this and just say “welp, we did our job, here’s your invoice.”

As an ALSP, your client gets paid to win. Ergo, if your services aren’t helping them win, how helpful are you?

What are your legal tech “grievances” this year? Let us know in the comments!

What Music Production Can Teach Us About Legal Technology

This past weekend, I binged the AppleTV+ series Watch the Sound with Mark Ronson. There are six episodes, and each one focuses on a different aspect of music production.

One of the recurring themes of each episode is how new technology changed music. The LinnDrum shaped pop; the 808 shaped hip hop; the distortion pedal shaped heavy medal; autotune shaped dance music.

Nearly every episode poses the question… does technology make music more human or less human? One man’s exciting innovation is another man’s existential threat. Time and time again, the answer was the same: it’s not up to technology to make or break music. It’s how musicians choose to use it. That is why I thought this series about music production would make excellent fodder for a discussion about legal technology.

A lot of legal tech is designed to achieve the same goals as different kinds of music tech. Some of it is meant to automate repetitive tasks, like a drum machine. Some of it is meant to reduce human error, like autotune; digital forensics tools expand the types of data we can collect for an investigation, the same way a synthesizer expanded the kinds of sounds that musicians have at their disposal. eDiscovery platforms can help you sift through existing data to build a case, similar to how sampling software lets producers turn bits and pieces of old records into new tracks. Some tech is more like Apple’s Garage Band program: its primary purpose is to make the job just plain easier, so that less specialized professionals can do work that once required highly technical, specially trained experts. 

All of this technology opens up a whole new world for legal teams. It’s not only a world that allows them to do business as usual in less time for less money; It’s a world where we get to redefine “business as usual” altogether, similar to how so many machines have revolutionized music.

One of the most interesting things about Watch the Sound is how the show features interviews with engineers who designed groundbreaking music technology. Usually, these engineers had no real agenda to change how music sounds. Instead, they just wanted to make it quicker and easier for people to make music that fit traditional norms of “good.” The sounds that are now considered calling cards for different types of tech– from Prince’s use of drum machines to T-Pain’s use of autotune– didn’t exist yet. It took those other visionaries getting ahold of the tech for real innovation to happen.

Roger Linn recorded acoustic drums and programmed them into his drum machines.

For example, Roger Linn designed the Linn-LM1, a favorite drum machine of Prince, and later the LinnDrum, which was used across the ‘80s pop landscape in songs such as “Maniac” by Michael Sembello and “Take On Me” by a-ha. Linn was the first person to record acoustic drums and program them into a drum machine. He made his machines this way because he felt other options on the market were too synthetic-sounding.

Yet… one of the most iconic beats ever made with one of Linn’s machines is on “When Doves Cry.” Prince achieved this sound by purposefully programming the drums to be out of tune. The beat is so iconic largely because it doesn’t sound like a human drummer.

Prince’s music is remembered today in part because he didn’t just use the drum machine as a cheap shortcut to bypass human drumming. He saw drum machines as an exciting new frontier of sounds that were previously unknown to human ears.

The best eDiscovery project managers approach their jobs in a similar fashion. They’re able to not only get through discovery more efficiently, but repurpose technology for other types of work. A lot of tech that was initially designed to help clients through complex litigation is now being used for other big data conundrums that require reviewing lots of data and sorting it into different buckets. Cyber breach review and data remediation come to mind, but I’m sure that list of alternative purposes will continue to grow as the world continues to create more and more data.

Particularly skilled eDiscovery professionals push the limits of existing technology. Prince didn’t wait for Roger Linn to pre-program the drum setting he wanted; he took a machine and did something new and unexpected with it. We’re seeing this in legal tech as well, particularly with highly customizable programs such as Relativity. At Contact, our team developed Vu™ to help less-experienced Relativity users access the wealth of analytics data that already lives within the platform.

Of course with innovation often comes push back. Throughout the history of music, whenever new technology expanded the library of sounds that musicians could put on a record, there was inevitably someone complaining about how the new technology was “cheating” or “not real music.” Potential for progress often comes hand in hand with potential for regression.

Indeed, Watch the Sound also rightly points out how some aspects of music can only be done by humans. An episode about autotune mentions how sometimes the most emotive vocals aren’t 100% on pitch 100% of the time, and autotune can do more harm than good.

At one point, Mark Ronson plays a raw Lady Gaga vocal and says “there is no plugin in the world that can make you do this.”

At every turn, music producers have to make choices about when and how to use technology, and when to let human musicians do what only humans can. Does distorting a vocal drain it of all the emotion and humanity… or does it capture the angst and confusion that a song is trying to capture?

This is how legal teams need to work. Not only are their certain types of thinking that only humans can do… I’d wager there’s certain types of thinking only attorneys can do. No matter how advanced technology gets, there also needs to be someone at the helm making smart decisions about what work has to be done by an attorney, and what’s best left to technology.

That person needs to not only know that technology can help, but how it can help. It’s similar to how a skilled music producer doesn’t just have technology; they know what kinds of microphones and studio spaces give them the recordings they want; they know what other kinds of sounds can come from different instruments or other machines; they know how to mix it all together into a final song that works. They know when less is more, and when more is more. The best ones can harness technology in unexpected ways and make something like “When Doves Cry.”

The future of legal tech belongs to people who look at it the way Prince looked at drum machines: not to be a cheap imitation of humans, but to redefine our notions of what’s possible.

The Ghosts of Discovery Past, Present, and Future

Here at Contact Discovery, we talk a lot about the importance of preparing for the future. That oftentimes involves getting a better understanding of the past. The world of legal technology moves fast, so it’s easy to lose track of just how far we’ve come. However, past challenges can inform how we tackle present and future challenges. In some cases that involve older documents, we find ourselves working the past, present, and future all at once. It is in that spirit that we take this holiday season to reflect on our industry. Specifically, the Ghosts of Discovery Past, Present, and Future.  

The Ghost of Discovery Past = Paper

Before eDiscovery, there was just Discovery, with a nifty little thing called “paper.” Companies kept paper records as far as the eye could see. Tens of thousands of documents scattered across various offices, filing cabinets, and even warehouses. 

If there was litigation on the horizon, lawyers and their associates would have to manually go through these documents and hope they found information they could use to build a case. It required a lot of people, and it was much easier to miss metaphorical smoking guns if reviewers weren’t communicating effectively.  

In the earliest days of eDiscovery, practitioners scanned these documents so reviewers could read them on computer screens. This meant that documents no longer took up as much physical space, and reviewers wouldn’t have to spend as much time on site or reviewing copies upon copies in law firm storage rooms. However, it still paled in comparison to platforms such as Relativity and others that are common in today’s Discovery landscape.  

The Ghost of eDiscovery Present = Mobile Meets Global  

While the past was largely about taking paper documents and converting them to electronic documents, today’s world is different. Now, most of our communication originates electronically. That came with new challenges. How do you find server space to store all those documents? How do you make sure the right people have access and the wrong people don’t? How do you take advantage of technology like email threading and data analytics without letting relevant documents go unnoticed?   

For the most part, legal teams have figured out systems to combat those issues. However, there’s one innovation that’s still tripping up review teams: the mobile phone. While mobile phones have been with us for decades now, mobile chats supplanting email for professional communication is a relatively recent phenomenon.  

Many professionals would’ve scoffed at the idea of texting a teammate about a work assignment even five years ago. Now, it’s quite common for co-workers to talk shop over text as well as exchange more personal messages they would never email. Many businesses also rely on collaboration platforms such Microsoft Teams, which has seen its userbase skyrocket in light of the pandemic.  

This presents new challenges to legal teams. Not only are there technical challenges involved with more messages in a wider array of file formats, there’s also the change in user behavior. Personal and professional messages are more likely to comingle in a text chat than they are in an email thread. This raises privacy concerns and can increase the need for redactions.  

Apps like WhatsApp has also made it easier to communicate across national borders. As more Americans start having more conversations with people abroad, there’s more regulations that lawyers have to tiptoe around to maintain defensibility. The EU’s General Data Protection Regulation, enacted in 2018, helps protect the privacy of people who have communicated with someone under a legal hold. Even if your business isn’t based in the EU, you need to be mindful of this if anyone stateside was communicating with someone in Europe.  

When shopping around for legal technology partner in the present, look for teams that are GDPR compliant, even if you don’t necessarily do that much business abroad. Remember, as your business scales, your legal needs will as well, and it’s best to be prepared. Also avoid companies that are designing their discovery strategies exclusively around email communication. Some companies such as Contact offer software specifically designed for mobile data review. Even if your current technology doesn’t, at least ensure that your team isn’t neglecting these communications altogether.  

Future = Artificial Intelligence and Decentralization

As technology becomes more and more advanced, sheer man power won’t be the prized commodity it once was. In the past, most businesses relied on big name law firms with recognizable brands. They knew that top attorneys flocked to these reputable firms in droves, so why go through the trouble of investigating other options? That was really the only to get an edge over opposing counsel anyway: good attorneys and lots of them.   

More and more legal technology companies are starting to integrate artificial intelligence that can search and review documents faster than any human could. AI simulates an elite crew of top notch attorneys doing ALL your review, rather than a massive army of attorneys who bring varying levels of talent and experience to the equation. This technology is still in its infancy, but if used to its fullest potential, it will eliminate that need for sheer man power. Suddenly, one attorney will do review that might take 30 attorneys now.  

“The right people with the right technology can adapt quicker than large companies can, and that leads to positive outcomes.”  

– Rich Albright, Contact Discovery CBO

As AI helps make review more user friendly, companies on both the service side and the technology side are helping corporate counsel internalize more of their discovery. In this new frontier, businesses don’t need their law firms to be a one-stop shop, but can instead seek out strategic relationships with more specialized partners. 

“Smaller firms like Contact are winning victories in huge matters that never would’ve gone to a company our size 5-10 years ago,” says Rich Albright, CBO of Contact Discovery. “People are starting to figure out that a team of the right people with the right technology can adapt quicker than large companies can, and that leads to positive outcomes. They’re choosing quality over quantity and it’s paying off.”  

As the legal technology market becomes more decentralized, you can expect to see smaller companies that specialize in different steps of the EDRM or different types of technology to gain market share. This model empowers businesses to only pay for what they can’t internalize and make sure they’re getting the absolute best version of it. The internet also makes it easier than ever for clients to seek these partners out for themselves rather than trusting a larger law firm to make all the tech decisions for them.

What challenges are you facing in the present? Where do you think the future of legal tech is going? Let us know in the comments!  

Can Legal Tech Prove Santa is Real?: A Miracle on 34th St. Case Study

It’s the most wonderful time of the year, in part because it’s the best time to watch one of the great court cases of cinematic history. I’m referring of course to Miracle on 34th Street, a film that hinges on one lawyer’s ability to prove that Santa Claus is in fact Santa Claus.  

Our story begins when Kris gets a job playing Santa Claus at the flagship Macy’s store in Times Square. When Kris insists that he is the real Santa Claus, he’s committed to a mental institution. Kris’s friend, Fred Gailey, just so happens to be a lawyer and rushes to his rescue. Fred Gailey shocks the court when he announces that his game plan is to prove Kris’s true identity as Santa Claus.  

There’s also a cute kid who wants a house in the suburbs, but she’s not as important from a litigation support perspective.  

The original film was made in 1947, with a remake made in 1994. Needless to say, our way of storing information has changed since then, and that’s reshaped the way lawyers build court cases. How would the case in Miracle on 34th Street be different if it happened today, when records are stored electronically? Would Santa use a GPS or tag his locations on Instagram? Does he have “find my iPhone” on in case he gets stuck in a chimney again? Maybe he uses Microsoft Teams and Zoom to make sure the elves are still holding down the fort at the North Pole while he’s in New York. Let’s look at some more specific examples from the movie and how this information would be managed today.  
 

Employee Records  

One of the first indications that Kris might in fact be the real Santa Claus is his employee record at Macy’s. This lists Santa’s reindeer as Kris’s next of kin and says he’s from the North Pole. 

Today, these records would live in some kind of electronic database. Legal teams not only look at these records, but also have to think critically about how they might’ve been tampered with. That’s just the nature of electronic records vs. paper records. Honestly, who wouldn’t be suspicious if they saw a record that looks like this?:  

Kris Kringle's job application in Miracle on 34th Street | Miracle on 34th  street, 34 street, Movie quotes

Who has access to those records? Who has edit permissions? Can they access those records from personal devices as well as corporate owned devices? Is there any possible way that passwords could have fallen into the wrong hands? Those are the kinds of questions that a good forensics analyst can answer.  

To verify document integrity, analysts oftentimes look at something called “metadata.” That refers to information such as “date created,” “date last modified,” and “author.” All data comes with metadata, and since it’s not as easily editable as the records themselves, it often proves crucial in digital forensics investigations.  

Analysts can look at a hard drive and figure out if data was moved to other devices, if edit histories were deleted, etc. Assuming Macy’s had good information governance practices and required everyone with edit access to use different passwords, forensics teams could also deduce which passwords were used to make any edits. In some cases, they may even testify in court to assure judges that records are what they appear to be (or maybe that they’re not what they appear).  

Letters to Santa  

The “smoking gun” of the original 1947 movie are the thousands of letters to Santa Claus delivered to the New York City courthouse. Fred Gailey argues that the post office’s decision to deliver these letters to Kris equates to government validation of his true identity: Santa Claus.   

According to the USPS, kids still send hundreds of thousands of letters to Santa every year. The USPS even has a special address they ask people to use for such letters. This system means it’s unlikely that thousands of letters would be delivered to the courthouse like in the movie, since people have been instructed to address such letters to 123 Elf Road. 

However, snail mail is just one of numerous ways to get in touch with St. Nick these days. EmailSanta.com has been on the net since 1997. However, the site’s About Us page admits that it was built not by Santa himself, but by a man named Alan Kerr. There are also numerous Santa Claus Twitter accounts, albeit none of them have a blue checkmark.  

This is perhaps where Fred Gailey would have the biggest uphill battle if he were to try this case today. The Internet has made it infinitely easier for other people to claim they are Santa. Gailey would have to prove that 1) one of the numerous online Santa platforms is the definitive way to get in touch with the real Santa and 2) That Kris was the man behind such an account.  

Let’s assume that by 2020, Santa has gotten with the times and has a proper email account for children to email him with a parent’s supervision. Gailey wants to present Kris’s emails in court. During the Meet and Confer stage of litigation, Gailey and opposing counsel would agree on a certain amount of emails to review. This way, if Kris and Fred were trying to fake letters to Santa, opposing counsel could do their own forensic analysis and figure that out.  

Of course, since Kris really is Santa, there would be a few facts on his side. The litigation support team would be able to verify that he does receive numerous letters to Santa every year. Odds are those letters would be in various languages from all over the world. Sure, that makes it harder to put together a team for review, but it also makes it virtually impossible for opposing counsel to prove that Kris is faking it.   

The best way for Gailey to build a case is similar to the way many complex litigations happen now: build a narrative from both electronically stored information and real-life events. Imagine if Gailey could prove that 1) children asked for certain gifts in emails to Kris and 2) they actually received those same gifts and 3) those gifts didn’t come from parents or other relatives “playing Santa.”  

With presumably thousands of emails to Santa to choose from, this shouldn’t be that difficult. Platforms such as Relativity help review teams search for keywords in different emails. They could search for particularly high demand toys that parents would have trouble finding on their own. After finding such emails in review, Gailey could cross-reference them with Kris’s records of which children got which gifts, because obviously Santa knows the importance of maintaining such records. Nothing gets you on the naughty list as quickly as bad information governance.  Gailey could reach out to families and get them to testify on the stand that they did not know where these gifts came from.   

Exploring these sorts of cases helps us understand how people in this space think on a day-to-day basis. Legal tech has to be about more than fast processing and aesthetically pleasing interfaces, though those certainly don’t hurt. It’s also about having the right people who understand how to build a case and know what to look for in discovery. If you were Fred Gailey, what would your discovery strategy be? How could you verify Kris’s identity and what kind of technology would make it easier? Let us know!  

A Trick-or-Treater’s Guide to the EDRM

The Electronic Discovery Reference Model, or EDRM, is a framework for dealing with documents that could be relevant to a legal investigation or litigation. Those who work within this framework on a daily basis understand it like the back of their hand. Such people are familiar with an all too common experience: having a stranger ask “What do you do?” and watching that stranger’s eyes glaze over as they try to explain the ins and outs of eDiscovery.

Luckily, the EDRM is more relatable than some might think. This time of year, many of us have fond memories of collecting something and making decisions about what to do with what we collect.

That’s right. We’re going to explain the EDRM through trick-or-treating. We’re going to reflect on how the EDRM might’ve helped us make better decisions about what candy to collect and make the best kinds of candy last longer. As a quick refresher, here’s what the EDRM looks like:

Step 1: Identify 

First, legal teams have to identify potential sources of relevant electronically stored information (ESI). Miss a source, and they could miss out on valuable information that could help their case.

Trick-or-treaters need to be similarly strategic. Just like a pending court deadline, there’s only so much time to gather candy. Are you better off going to a neighborhood where the houses are closer together and you can go to more of them? But then what if that neighborhood doesn’t have as many kids, and so a lot of the houses turn their lights out and don’t give out candy? Alternatively, some neighborhoods might have bigger houses that require more walking, but then give out more candy per house. Maybe you can strike the real pay dirt of trick-or-treating: the full size candy bar. What’s the best strategy?

Well, that depends on the trick-or-treater’s objective. Maybe Sally just wants to get as many pieces of candy as possible, while her sister Susie only likes chocolate candy and wants to focus on houses that have given out chocolate in the past.

In a similar fashion, every legal case is different. Some require casting a broad net to get as much information as possible, others required a narrowly tailored approach looking for more specific details. Experienced eDiscovery practitioners know when to pick which strategy.

Step 2a: Preserve

Preservation is one of the most important parts of the EDRM. When it’s time to present in court, you need to be able to prove that any documents you present are still in their original state. While preservation is one of the earlier steps of the EDRM, these things aren’t entirely linear. Preservation needs to be a priority for every other step of the EDRM as well. As case teams dive deeper and deeper into the discovery process, they have to maintain the integrity of the original documents.

This is similar to how trick-or-treaters should not eat any candy until someone verifies that everything is sealed in its original packaging. Even as a kid, I knew not to start eating candy while out and about in the “collection” phase. Instead, I had to bring my candy in and let a parent double check to make sure that everything was what it claimed to be. If something was partially unwrapped and we couldn’t be fully confident about what it was, we threw it out. I could only start eating candy AFTER we confirmed that candy’s integrity.

Step 2b: Collect 

This is it! The big night. Actually collecting that candy. We’ve figured out a strategy, and now we can go get all our candy. Each house is a source that gives us something slightly different. It’s also probably the most straightforward trick-or-treating to EDRM comparison so I won’t dwell on it too long.

In eDiscovery, practitioners obviously have to collect data before they can do much of anything else with it. Sometimes that means tracking down deleted data, or looking in places where other people wouldn’t think to look. Sometimes they do this collection remotely, other times onsite. Once teams have gone to all the right sources and gathered as much information as possible, they can start processing that information and help legal teams reach important conclusions.

Step 3a: Process

I mentioned earlier how when I was a kid, my parents would throw out any candy if it wasn’t fully sealed in its original packaging. Oftentimes in eDiscovery, that’s not a realistic option. There can be millions of dollars on the line, and legal teams can’t afford to simply “throw out” any evidence that has questionable integrity.

So how does a legal team reconcile this? They need defensible data, but some of the most important evidence to their case could be from deleted, edited, or corrupted files. Have no fear. Forensics and processing teams are here.

Let’s imagine that one neighbor decided to make homemade treats for trick-or-treaters. And let’s say that treat was easily THE best treat that either Sally or Susie collected in their entire stash. We’ll say it’s a chocolate cookie with a gooey caramel filling meticulously decorated to look like a unicorn. It would break Sally and Susie’s heart if they had to throw it out.

However, mom and dad are a little wary about letting Sally and Susie eat a homemade treat. There’s no ingredient label like there would be on a mass-produced piece of candy, and they don’t really know this neighbor well enough to trust them. What can they do to make sure these treats are safe?

Well if you’re my mother, you might suggest looking at the treats under a microscope to try and figure out what’s in them. Technically, there are actual food science labs that would be able to take that unicorn cookie apart and determine for sure if there’s anything suspect in it.

Data engineers in digital forensics are the eDiscovery equivalent of such a lab. Those who specialize in data processing can deduce information that lay people can’t. They can use metadata to figure out which documents are the unicorn cookie-equivalents that need to be elevated for review. If there are corrupt files, they can intervene and potentially restore documents to their original state in a defensible way. If some documents are in older file formats than many modern computers wouldn’t recognize, they can convert them into more user-friendly formats.

Such experts are able to save “treats” that an ordinary mom and dad might’ve just thrown out. More importantly, they’re able to do this in a way that preserves document integrity, and oftentimes find metadata that helps them better organize documents prior to review.

Step 3b: Review

Sure, a lot of us probably just kept our trick-or-treating haul in one big stash and ate candy whenever we felt like it. But if you wanted to be strategic, you could also introduce a “review” step into things. Remember Susie, our trick-or-treater who only cared about chocolate candy? She might decide to sort her stash into different types of candy so she wouldn’t eat all the best kinds too quickly. Maybe she’ll try to trade the non-chocolate candies she doesn’t like for chocolate.

In the EDRM, Document Review is all about going through documents and coding them as relevant or irrelevant to litigators. They can also implement issue coding to organize relevant documents based on topic, similar to sorting chocolate candy based on sub categories like caramel or peanut butter. With a review team sorting information into the appropriate buckets, litigators can focus their attention on documents that actually matter.

Step 3c: Analyze

Okay. You have your pile of candy. You know exactly how many pieces you have, and how much of each kind you have. Now you can actually start making some strategic decisions. Maybe Susie will decide to trade some of her gummy worms for chocolate. Maybe Sally will decide to ration her candy to a certain number of pieces each week so it lasts longer. (Okay, she probably won’t, but she could!)

This is similar to the analysis phase of the EDRM, when you can start making decisions with full confidence that those decisions are based on reliable data. The review stage was all about figuring out what’s relevant, but the analysis stage goes beyond that. This is where relevant documents become an actual case. Review teams work alongside litigators to find important patterns and thread documents together into narratives that can sway a judge in their favor.

Step 4: Produce

Now that we have a real plan for what kinds of candy we’re going to eat when, and where we maybe have opportunities to improve our haul, we can work with other people who ALSO have candy hauls (and maybe didn’t put as much thought into review and analysis as we did!). We can try to trade some of the candy we don’t like for candy we do like, or maybe Sally will agree to take on Susie’s chores for a week if Susie gives over all her peanut butter cups.

In the litigation process, the “production” step is all about getting the relevant documents you’ve selected ready for the final step, presentation. They have to be in whatever formats were previously agreed upon and they have to be delivered by the previously agreed upon deadlines. 

Step 5: Present

Here it is. The moment everyone’s been waiting for: actually eating the candy! After putting so much thought into collecting and organizing this candy, we actually get to reap the benefits of that hard work. We can eat our favorite kinds without going through it too quickly, and knowing all our treats are exactly what they were supposed to be. If we REALLY wanted to, we could even store data about what candy we got from what houses so we make even more informed decisions next year. (It’s never too early to start teaching your kids about the importance of information governance!)

The final stage of the EDRM is presenting. Because we took careful consideration through each of the earlier stages of the EDRM, we can present a strong case in court. We can easily defend the integrity of our documents and the process we used to obtain that information. We were efficient enough to meet our deadlines. At the same time, we also didn’t let any relevant documents slip through the cracks, so opposing counsel can’t surprise us.