Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.

Slides:



Advertisements
Similar presentations
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
Advertisements

E-Discovery in Government Investigations Jeane Thomas, Crowell & Moring LLP February 9, 2009.
Outline of Topics  Introduction  CPR, law and expectations  IT issues  Disclosure process.
A PROACTIVE APPROACH TO E-DISCOVERY March 4, 2009 Presented to the Corporate Counsel Section of the Tarrant County Bar Association Carl C. Butzer Jackson.
1 A Practical Guide to eDiscovery in Litigation Presented by: Christopher N. Weiss Aric H. Jarrett Stoel Rives LLP Public Risk Management Association (PRIMA),
5 Vital Components of Every Custodian Interview David Meadows, PMP, Managing Director – Discovery Consulting, Kroll Ontrack Dave Canfield, EJD, Managing.
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
W W W. D I N S L A W. C O M E-Discovery and Document Retention Patrick W. Michael, Esq. Dinsmore & Shohl LLP 101 South Fifth Street Louisville, KY
1 Best Practices in Legal Holds Effectively Managing the e-Discovery Process and Associated Costs.
Defensible Client File Collections 6 Common Roadblocks and Obstacles.
In-sourcing vs. Outsourcing eDiscovery & Litigation Support Good Idea or Bad?
Developing a Records & Information Retention & Disposition Program:
1 Fundamental Principles of Solution Design and Implementation Chapter 3.
1 © Copyright 2008 EMC Corporation. All rights reserved. Litigation Response Planning: eDiscovery Best Practices Stephen O’Leary Sr. eDiscovery and Compliance.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Business Consulting Services Agenda Discussion: Management Reports Discussion: Project Reports Discussion: Engagement Proposal Upcoming Events Review Project.
By Drudeisha Madhub Data Protection Commissioner Date:
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
* 07/16/96 The production of ESI continues to present challenges in the discovery process even though specific rules have been drafted, commented on, redrafted.
Software Testing Lifecycle Practice
Project Management : Techniques and Tools (60-499) Fall 2014 / Winter 2015.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
“PRESERVATION, COLLECTION, AND PRODUCTION OF DOCUMENTS AND ESI IN CONSTRUCTION CASES” PRESENTERS: John Foust Jones Day San Francisco, CA John Foust Jones.
Nathan Walker building an ediscovery framework. armasv.org Objective Present an IT-centric perspective to consider when building an eDiscovery framework.
Computer Forensics Principles and Practices
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
Chapter 11. Intro  What is Project Management?  Project Manager  Project Failures & Successes Managing Projects  PMBOK  SDLC Core Process 1 – Project.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
We Must Produce! Presented by: Terrence Coan, CRM – Director, RM Solution Line Lead Baker Robbins & Company Charlene Wacenske – Firmwide Records Manager.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
The E-Discovery Process-Overview PreservationCollectionAnalysis DiscoveryPlan ESIProcessingLegalReview Production Meet&Confer Rule 16 SchedulingConference.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Project Charters Module 3
Surviving eDiscovery: Technology Firm Perspective  Robert A. Cruz Sr. Director, eDiscovery Solutions, Proofpoint, Inc.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
RIM in the Age of E-Discovery RIM in the Age of E-Discovery FIRM Summer Program June 23, 2009 Christina Ayiotis, Esq., CRM Group Counsel– E-Discovery &
Business Consulting Services Engagement Proposal & Letter of Agreement Project Management Timelines/GANNT Chart.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
UNIVERSITY OF HOUSTON SUMMER III 2010 – 5297 E-DISCOVERY Vendors!
Project Management Methodology
Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
E-discovery Discussion. 2 Policies and Procedures Do you have a set of e-discovery policies and procedures? – Who is the lead for e-discovery efforts.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
1 1 Building RIM Programs Chattanooga Chapter of ARMA International by Helen Streck President and CEO Kaizen InfoSource LLC.
U.S. District Court Southern District of New York 229 F.R.D. 422 (S.D.N.Y. 2004)
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
BSBPMG501A Manage Project Integrative Processes Manage Project Integrative Processes Project Integration Processes – Part 2 Diploma of Project Management.
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
Project Management ISE 5101 Karl Smith Project Monitoring & Control I Project Meetings.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
Presenter: Igna Visser Date: Wednesday, 18 March 2015
Chapter 11 Project Management.
Leveraging the Data Map – A Case Study November 15, 2016
Information Technology & The Amendments to the Federal Rules of Civil Procedure Sonya Naar - DLA Piper US LLP Doug Herman - UHY Advisors FLVS, Inc.
6/22/2018 2:09 PM BRK3102 How Microsoft Legal drives down eDiscovery costs with machine learning in Office 365 Rachi Messing Senior Program Manager, O365.
Remote Collection What, When & Why.
The Office Is Out: Preservation And Collection In The Merry Old Land Of Office 365 June 26, v1.
Using the Checklist for SDMX Data Providers
Get the Data that Cures Your Headache
IT Preservation Holds and Public Information Requests
Software Testing Lifecycle Practice
Presentation transcript:

Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER

What are we talking about? PROJECT MANAGEMENT Process of planning, organizing, securing and managing resources to achieve specific goals EDISCOVERY PROJECTS Efforts to preserve, collect and analyze electronically stored information when the prospect of litigation arises MANAGEMENT OF EDISCOVERY PROJECTS The discipline of planning, organizing, securing and managing resources to bring about the successful completion of e-Discovery projects

KEY THEMES COMMUNICATION – No such thing as too much DOCUMENTATION – At every phase EXPERTISE – If you don’t have it, get it FLEXIBILITY – Projects are rarely static FRONTLOADING – Spend now to save later

Elements of Project Management COST Ensuring the project is completed within budget TIME Ensuring the project is completed in a timely fashion and deadlines are met SCOPE Ensuring the project includes all the required work and only the required work QUALITY Ensuring the project satisfies the needs for which it was undertaken

BEST PRACTICES

The Phases of E-Discovery Projects INITIATION PLANNING COLLECTION PROCESSING CULLING REVIEW PRODUCTION CLOSING

INITIATION Identify the objectives: what are we doing and why? – Define the project – Delineate goals, milestones, etc. – Institute a legal hold – Determine the budget early, if you can Create the team – What are the main activities needed for this project? – Who has expertise in this area? – Will we need an outside vendor? – Define roles and responsibilities

The Project Management Team

INITIATION: COMMON PITFALLS Failure to implement and monitor a legal hold Not understanding the scope or the scope creep

INITIATION: COST MANAGEMENT Understanding apples and oranges pricing from vendors – Collection costs – Processing costs – Hosting costs – Data storage fees What can be done in-house? – Billable time – Data storage fees

PLANNING Identify potentially relevant information Create a budget estimate Preserve potentially relevant information Consider tools to assist Create a plan document

Identification of Potentially Responsive Information START WITH THE CLIENT Interview client IT personnel, make them part of the team Review data map Interview potential custodians (what do they have and where?) Identify the types of ESI involved Where is ESI kept by the enterprise? Where is ESI really kept? Identify privacy or confidentiality issues Identify third parties who may have information Determine the need for forensics

Budgeting Prepare a budget estimate Templates are available Manage expectations – Best case v. worst case – Identify variables up front – Revise as variables become fixed Communicate – Appeal to your audience – Are you spending now to save later? – Are you putting client in the most defensible position?

Preservation of Potentially Responsive Information Suspend document destruction practices Identify and interview key players Issue and monitor litigation hold

PLANNING: COMMON PITFALLS Overlooking the value of the client’s IT personnel Collecting using Drag and Drop – usually not sufficient Not conducting custodian interviews Cross-border issues for international clients

PLANNING: COST MANAGEMENT When identifying key players, consider tiered approach. When interviewing key players, start with a questionnaire. When issuing a litigation hold, consider litigation hold software applications to automate the process of issuing and monitoring compliance. Know the volume and potential cost before you decide on a method of collection.

COLLECTION Identify the key players and physical location of data Determine who will be present for collection Manage expectations Determine chain of custody for data post- collection Document the process

COLLECTION: COMMON PITFALLS Sending a vendor to a collection without counsel Not being prepared for the collection Over collection Under collection Self-collection Cross-border issues

COLLECTION: COST MANAGEMENT Collection is typically charged at an hourly rate plus the cost of hard drives. Do we need to collect deleted files? Slack space? Consider a targeted collection Consider a remote collection

PROCESSING: WHAT IS IT? Steps taken by Litigation Support or a Vendor on collected data to make it ready for review and/or production Includes: – Data and metadata extraction – De-duplication – Filtering/searching – Data conversion – Creation of TIF images – Performing text extraction – Creating load files – Loading to Relativity for review – Exporting from Relativity for production

PROCESSING In-House v. Vendor – Timing – Volume – Budget Early analysis of data is critical

PROCESSING: COMMON PITFALLS Unilaterally deciding on search terms or date restrictions Global de-duplication of data and later discovering source of data is important Failure to account for source code Failure to address images and media files for review

PROCESSING: COST MANAGEMENT In-house v. vendor – Consider charges per GB or per hour – Consider cost of drives, disks or FTPs for deliverables – Consider storage fees

CULLING Filtering File types Prioritization of custodians De-duplication – Global or by custodian? ECA tools

CULLING: COMMON PITFALLS & COST MANAGEMENT Beware of hidden costs – For extracting data from ECA tools – For re-filtering Failure to document searches, record search terms and combinations of search terms

REVIEW Create review plan – Create a reasonable timeline – Single-tier or multi-tier – Logistics Staffing Training Supervision Quality control – Prioritization of review population – Privilege review and log

REVIEW: COMMON PITFALLS Failing to supervise a review team Failing to batch documents for review Failing to review hidden or extracted data in native review

REVIEW: COST MANAGEMENT Consider native review Consider technology assisted review Technical issues – Litigation Support time – Vendor time

PRODUCTION Coordinate with vendor and Litigation Support Consider special requirements Document in detail Quality control at every phase

PRODUCTION: COMMON PITFALLS Not being prepared – Know what form you agreed to, what form is required Not allowing enough time – To quality control – To resolve discrepancies

CLOSING Complete documentation Lessons learned Templates for future use

SUMMARY Project management is a valued skill Communication is key Get expertise when you need it Strive for defensibility

Questions